Efficient implementation of elliptic curve cryptography (ECC) for personal digital assistants (PDAs)

被引:6
|
作者
Dabholkar, A [1 ]
Yow, KC [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
elliptic curve cryptography; cryptosystem implementation for PDAs;
D O I
10.1023/B:WIRE.0000047066.74117.86
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless devices are characterized by low computational power and memory. In addition to this wireless environment are inherently less secure than their wired counterparts, as anyone can intercept the communication. Hence they require more security. One way to provide more security without adding to the computational load is to use elliptic curve cryptography (ECC) in place of the more traditional cryptosystems such as RSA. As ECC provides the same level of security for far less key sizes, as compared to the traditional cryptosystems, it is ideal for wireless security. In this thesis we will investigate the different ways of implementing ECC on wireless devices such as personal digital assistants (PDAs). We will present our findings and compare the different implementations. In our implementation ECC over the field F-2(n) using optimal normal basis representation gives the best results.
引用
收藏
页码:233 / 246
页数:14
相关论文
共 50 条
  • [31] FPGA Based Implementation of Elliptic Curve Cryptography
    Nawari, Mustafa
    Ahmed, Hazim
    Hamid, Aisha
    Elkhidir, Mohamed
    2015 WORLD SYMPOSIUM ON COMPUTER NETWORKS AND INFORMATION SECURITY (WSCNIS), 2015,
  • [32] Highly Area-Efficient Implementation of Modular Multiplication for Elliptic Curve Cryptography
    Rahman, Md Sazedur
    Hossain, Md Selim
    2020 IEEE REGION 10 SYMPOSIUM (TENSYMP) - TECHNOLOGY FOR IMPACTFUL SUSTAINABLE DEVELOPMENT, 2020, : 1078 - 1081
  • [33] Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things
    Liu, Zhe
    Seo, Hwajeong
    Castiglione, Aniello
    Choo, Kim-Kwang Raymond
    Kim, Howon
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 521 - 529
  • [34] Utilization of personal digital assistants (PDAs) by pediatric and emergency medicine residents
    Khan, Abu N. G. A.
    Frank, Joshua
    Geria, Rajesh
    Davidson, Steven
    JOURNAL OF EMERGENCY MEDICINE, 2007, 32 (04): : 423 - 428
  • [35] PKI, elliptic curve cryptography, and digital signatures
    Caelli, William J.
    Dawson, Edward P.
    Rea, Scott A.
    Computers and Security, 1999, 18 (01): : 47 - 66
  • [36] PKI, elliptic curve cryptography, and digital signatures
    Caelli, WJ
    Dawson, EP
    Rea, SA
    COMPUTERS & SECURITY, 1999, 18 (01) : 47 - 66
  • [37] PERSONAL DIGITAL ASSISTANTS - USERS - GIVE US CONNECTED PDAS WITH PCMCIA
    PERRATORE, E
    BYTE, 1994, 19 (06): : 34 - 34
  • [38] Design of an Efficient Elliptic Curve Cryptography Coprocessor
    MuthuKumar, B.
    Jeevananthan, Dr. S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 34 - +
  • [39] Efficient Elliptic Curve Cryptography for Embedded Devices
    Liu, Zhe
    Weng, Jian
    Hu, Zhi
    Seo, Hwajeong
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [40] Design of digital image encryption based on elliptic curve cryptography (ECC) algorithm and Radix-64 conversion
    Kalaichelvi, V
    Devi, P. Vimala
    Meenakshi, P.
    Swaminathan, S.
    Suganya, S.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (05) : 6697 - 6708