Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

A Survey Report on Elliptic Curve Cryptography

Author : Ajit Karki 1

Date of Publication :30th December 2017

Abstract: Information is an asset that has a value like any other asset. As an asset, information needs to be secured from attacks. To be secured, information needs to be hidden from unauthorized access (confidentiality), protected from unauthorized change (integrity), and available to an authorized entity when it is needed (availability).During the last three decades, Computer networks created a revolution in the use of information. Information is now distributed. Authorized people can send and receive information from a distance using computer networks. Although the three above mentioned requirements- confidentiality, integrity, and availability- have not changed, they now have some new dimensions. Not only should information be confidential when it is stored; there should also be a way to maintain its confidentiality when it is transmitted from one computer to another. The scorching enlargement in the use of mobile and wireless devices demands a new generation of Public Key Cryptography schemes that have to accommodate limitations on power and bandwidth, at the same time, to provide an ample level of security for such devices. Elliptic Curve Cryptography (ECC) is rising as an attractive public-key cryptosystem for mobile/wireless environments. Compared to long- established cryptosystems like RSA, ECC offers the same security with smaller key sizes, which results in faster computations; lower power consumption, as well as memory and bandwidth savings. This is particularly useful for mobile devices which are typically limited in terms of their CPU, power and network connectivity. Nevertheless, the true crash of any public-key cryptosystem can only be evaluated in the context of a security protocol. Elliptic Curve Cryptography (ECC) has become the ideal choice for the insidious computing environment because of its suitability to the devices having limited bandwidth, battery power, less computational resources and less memory.

Reference :

Will Updated soon

Recent Article