Efficient implementation of elliptic curve cryptography (ECC) for personal digital assistants (PDAs)

被引:6
|
作者
Dabholkar, A [1 ]
Yow, KC [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
elliptic curve cryptography; cryptosystem implementation for PDAs;
D O I
10.1023/B:WIRE.0000047066.74117.86
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless devices are characterized by low computational power and memory. In addition to this wireless environment are inherently less secure than their wired counterparts, as anyone can intercept the communication. Hence they require more security. One way to provide more security without adding to the computational load is to use elliptic curve cryptography (ECC) in place of the more traditional cryptosystems such as RSA. As ECC provides the same level of security for far less key sizes, as compared to the traditional cryptosystems, it is ideal for wireless security. In this thesis we will investigate the different ways of implementing ECC on wireless devices such as personal digital assistants (PDAs). We will present our findings and compare the different implementations. In our implementation ECC over the field F-2(n) using optimal normal basis representation gives the best results.
引用
收藏
页码:233 / 246
页数:14
相关论文
共 50 条
  • [41] Programmable implementation of time-area efficient Elliptic Curve Cryptography for entity authentication
    Arunachalam, Kamaraj
    Perumalsamy, Marichamy
    INFORMACIJE MIDEM-JOURNAL OF MICROELECTRONICS ELECTRONIC COMPONENTS AND MATERIALS, 2022, 52 (02): : 89 - 103
  • [42] Area-Time Efficient Hardware Implementation of Modular Multiplication for Elliptic Curve Cryptography
    Islam, Md Mainul
    Hossain, Md Selim
    Shahjalal, Md
    Hasan, Moh Khalid
    Jang, Yeong Min
    IEEE ACCESS, 2020, 8 : 73898 - 73906
  • [43] Elliptic Curve Cryptography:: Java']Java implementation issues
    Martínez, VG
    Sánchez-Avila, C
    García, JE
    Encinas, LH
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 238 - 241
  • [44] An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
    Pandey, Jai Gopal
    Mitharwal, Chhavi
    Karmakar, Abhijit
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 66 - 72
  • [45] Improvement and Implementation of One Elliptic Curve Cryptography Algorithm
    Kong, Qingyan
    INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT (EBM2011), VOLS 1-6, 2011, : 2438 - 2440
  • [46] Implementation of Text Encryption using Elliptic Curve Cryptography
    Singh, Laiphrakpam Dolendro
    Singh, Khumanthem Manglem
    ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 73 - 82
  • [47] Fast software implementation of binary elliptic curve cryptography
    Bluhm, Manuel
    Gueron, Shay
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2015, 5 (03) : 215 - 226
  • [48] Measuring ELF fields produced by mobile phones and personal digital assistants (PDAs)
    Silva, M.
    BIOELECTROMAGNETICS, 2007, 28 (07) : 580 - 581
  • [49] Algorithm and implementation of elliptic curve public key cryptography
    Gong, Shu
    Liu, Wenjiang
    Rong, Mengtian
    Gaojishu Tongxin/High Technology Letters, 2004, 14 (03):
  • [50] Demystifying elliptic curve cryptography : Curve selection, implementation and countermeasures to attacks
    Dhanda, Sumit Singh
    Singh, Brahmjit
    Jindal, Poonam
    JOURNAL OF INTERDISCIPLINARY MATHEMATICS, 2020, 23 (02) : 463 - 470