DocumentCode :
3648243
Title :
Elliptic Curves Cryptosystems approaches
Author :
Ion Tutănescu;Constantin Anton;Laurenţiu Ionescu;Daniel Caragaţă
Author_Institution :
University of Piteş
fYear :
2012
fDate :
6/1/2012 12:00:00 AM
Firstpage :
357
Lastpage :
362
Abstract :
This paper take in discussion an important area of security: Elliptic Curves Cryptosystems (ECC) are the next frontier in the use of security mechanisms by providing good security margins with lower computational cost. ECC´s domain is an important field emerged in information security. The elliptic curves (EC) are used for conceiving efficient factorization algorithms and for proving the primality. They are used in public key cryptosystems and in pseudorandom bit generators, too. The elliptic curves were also applied in Codes Theory, where they were used to create very good error protected codes. ECC is more and more considered as an attractive public-key cryptosystem for mobile/wireless environments. Compared to traditional public-key cryptosystems like RSA or Diffie-Hellman, ECC offers equivalent security with smaller key sizes; these result in faster computations, lower power consumption, as well as memory and bandwidth savings. ECC is especially useful for mobile devices, which are typically limited in terms of their CPU, power and network connectivity. In this paper, we aim to examine the security, implementation and performance of ECC applications on various mobile devices. Also, our goal is to compare ECC and conventional PKC performances. Doing these, we want to prove that ECC will become the next-generation of PKC.
Keywords :
"Elliptic curve cryptography","Mobile communication","Authentication","Generators","Sun"
Publisher :
ieee
Conference_Titel :
Information Society (i-Society), 2012 International Conference on
Print_ISBN :
978-1-4673-0838-0
Type :
conf
Filename :
6284992
Link To Document :
بازگشت