Efficient implementation of elliptic curve cryptography (ECC) for personal digital assistants (PDAs)

被引:6
|
作者
Dabholkar, A [1 ]
Yow, KC [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
elliptic curve cryptography; cryptosystem implementation for PDAs;
D O I
10.1023/B:WIRE.0000047066.74117.86
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless devices are characterized by low computational power and memory. In addition to this wireless environment are inherently less secure than their wired counterparts, as anyone can intercept the communication. Hence they require more security. One way to provide more security without adding to the computational load is to use elliptic curve cryptography (ECC) in place of the more traditional cryptosystems such as RSA. As ECC provides the same level of security for far less key sizes, as compared to the traditional cryptosystems, it is ideal for wireless security. In this thesis we will investigate the different ways of implementing ECC on wireless devices such as personal digital assistants (PDAs). We will present our findings and compare the different implementations. In our implementation ECC over the field F-2(n) using optimal normal basis representation gives the best results.
引用
收藏
页码:233 / 246
页数:14
相关论文
共 50 条
  • [21] POCKET COMPUTERS. APPLICATIONS FOR PERSONAL DIGITAL ASSISTANTS, PDAS
    Anton I Riera, Josep
    Juarez Gimenez, Juan Carlos
    Aznar Sorribes, Noemi
    Boixadera Vendrell, Mireia
    Ibanez Collado, Cristina
    Monterde Junyent, Josep
    REVISTA ROL DE ENFERMERIA, 2008, 31 (01): : 57 - 65
  • [22] Implementation and Performance Analysis of Elliptic Curve Cryptography using an Efficient Multiplier
    Renita, J.
    Elizabeth, Edna N.
    Asokan, Nandhini
    JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, 2022, 22 (02) : 53 - 60
  • [23] Efficient Implementation of Cryptography on Points of an Elliptic Curve in Residue Number System
    Bahenko, Mikhail
    Redvanov, Aziz Salimovich
    Deryabin, Maxim
    Chervyakov, Nikolay
    Nazarov, Anton
    Al-Galda, Safwat Chiad
    Vashchenko, Irina
    Dvoryaninova, Inna
    Nepretimova, Elena
    2019 INTERNATIONAL CONFERENCE ON ENGINEERING AND TELECOMMUNICATION (ENT), 2019,
  • [24] Efficient implementation of cancelable face recognition based on elliptic curve cryptography
    Eltaieb, Rania A. A.
    El-Banby, Ghada M. M.
    El-Shafai, Walid
    Abd El-Samie, Fathi E. E.
    Abbas, Alaa M. M.
    OPTICAL AND QUANTUM ELECTRONICS, 2023, 55 (09)
  • [25] Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
    Rathee, Geetanjali
    Saini, Hemraj
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (01) : 42 - 52
  • [26] An Efficient Encryption Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System
    Lee, Young Sil
    Alasaarela, Esko
    Lee, Hoon Jae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 63 - 70
  • [27] Using personal digital assistants (PDAs) to enhance the museum visit experience
    Micha, K
    Economou, D
    ADVANCES IN INFORMATICS, PROCEEDINGS, 2005, 3746 : 188 - 198
  • [28] Hardware Design and Implementation of Scalar Multiplication in Elliptic Curve Cryptography (ECC) over GF (2163) on FPGA
    Imran, Malik
    Kashif, Muhammad
    Rashid, Muhammad
    2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
  • [29] Using personal digital assistants (PDAs) to improve the quality use of pathology
    White, GH
    Thompson, C
    Shastri, R
    Phillips, PA
    CLINICA CHIMICA ACTA, 2005, 355 : S362 - S362
  • [30] Implementation of Elliptic Curve Cryptography in Binary Field
    Susantio, D. R.
    Muchtadi-Alamsyah, I.
    4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710