DocumentCode
2966611
Title
Comparison of ECC and RSA Algorithm in Resource Constrained Devices
Author
Bafandehkar, Mohsen ; Md Yasin, Sharifah ; Mahmod, Ramlan ; Hanapi, Zurina Mohd
Author_Institution
Dept. of Comput. Sci., Univ. Putra Malaysia, Serdang, Malaysia
fYear
2013
fDate
16-18 Dec. 2013
Firstpage
1
Lastpage
3
Abstract
Nowadays, the usage of resource constrained devices is increasing and these devices are primarily working with sensitive data. Consequently, data security has become crucial for both producers and users. Limitation of resources is deemed as the major issue that makes these devices vulnerable. Attackers might exploit these limitations to get access to the valuable data. Therefore, carefully chosen and practically tested encryption algorithm must be applied to increase the device efficiency and mitigate the risk of sensitive data loss. This study will compare elliptic curve cryptography (ECC) algorithm with Key size of 160-bit and Rivest-Shamir-Adleman (RSA) algorithm with Key size of 1024-bit. As a result of this study utilizing ECC in resource constrained devices has advantages over RSA but ECC needs continues enhancement to satisfy the limitations of newly designed chips.
Keywords
public key cryptography; ECC algorithm; RSA algorithm; Rivest-Shamir-Adleman algorithm; data access; data security; device efficiency; elliptic curve cryptography algorithm; encryption algorithm; resource constrained devices; risk mitigation; sensitive data; sensitive data loss; Algorithm design and analysis; Elliptic curve cryptography; Elliptic curves; Encryption; Hardware;
fLanguage
English
Publisher
ieee
Conference_Titel
IT Convergence and Security (ICITCS), 2013 International Conference on
Conference_Location
Macao
Type
conf
DOI
10.1109/ICITCS.2013.6717816
Filename
6717816
Link To Document