International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Science , Computer Science and Engineering

Volume4,December 2017,

Topic : A Survey Report on Elliptic Curve Cryptography

Authors:Ajit Karki ||

Abstract:Information is an asset that has a value like any other asset. As an asset, information needs to be secured from attacks. To be secured, information needs to be hidden from unauthorized access (confidentiality), protected from unauthorized change (integrity), and available to an authorized entity when it is needed (availability).During the last three decades, Computer networks created a revolution in the use of information. Information is now distributed. Authorized people can send and receive information from a distance using computer networks. Although the three above mentioned requirements- confidentiality, integrity, and availability- have not changed, they now have some new dimensions. Not only should information be confidential when it is stored; there should also be a way to maintain its confidentiality when it is transmitted from one computer to another. The scorching enlargement in the use of mobile and wireless devices demands a new generation of Public Key Cryptography schemes that have to accommodate limitations on power and bandwidth, at the same time, to provide an ample level of security for such devices. Elliptic Curve Cryptography (ECC) is rising as an attractive public-key cryptosystem for mobile/wireless environments. Compared to long- established cryptosystems like RSA, ECC offers the same security with smaller key sizes, which results in faster computations; lower power consumption, as well as memory and bandwidth savings. This is particularly useful for mobile devices which are typically limited in terms of their CPU, power and network connectivity. Nevertheless, the true crash of any public-key cryptosystem can only be evaluated in the context of a security protocol. Elliptic Curve Cryptography (ECC) has become the ideal choice for the insidious computing environment because of its suitability to the devices having limited bandwidth, battery power, less computational resources and less memory..

Keywords: Cryptography, ECC, Integrity, Authentication.

Download Paper

DOI: 01.1617/vol4/iss12/pid86793

Related Articles

Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.

Authors: Avinash Singh || Ram Singar Verma

Doi : 01.1617/vol4/iss03/pid34591

Volume4 ,March 2017.

Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State

Authors: Abubakar Siddiq Ango || Abdulsalam Waheed Abdulfatah, Idrissa Djibo

Doi : 01.1617/vol3/iss09/pid91783

Volume3 ,September 2017.

Decentralized Trust Management and Trust Worthiness of Cloud Environments

Authors: Qhubaib Syed || Syed Afzal Ahmed,Syed Abdul Haq

Doi : 01.1617/vol4/iss4/pid21386

Volume4 ,April 2017.

Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients

Authors: Sindhura Rao || Ashwini S,Kusuma Mohanchandra

Doi : 01.1617/vol4/iss4/pid82074

Volume4 ,April 2017.

Multilevel Authentication System

Authors: Nichita Silva Lobo || Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares

Doi : 01.1617/vol4/iss4/pid82135

Volume4 ,April 2017.

Stock Prediction Using Clustering And Regression Techniques

Authors: Shalini Lotlikar || Megha Ainapurkar

Doi : 01.1617/vol4/iss4/pid39708

Volume4 ,April 2017.

Brain Tumor Detection using Image Segmentation

Authors: Siddhi N. Nerurkar ||

Doi : 01.1617/vol4/iss4/pid02845

Volume4 ,April 2017.

Video Mining using Query by Example

Authors: Rosebud Valadares ||

Doi : 01.1617/vol4/iss4/pid89542

Volume4 ,April 2017.

Fuzzy Opinion Mining for Product Recommender System

Authors: Aarti Bandodker ||

Doi : 01.1617/vol4/iss4/pid03652

Volume4 ,April 2017.

Aadhaar and Server based Electoral system

Authors: Yugansh Garg || Sakshi Mishra

Doi : 01.1617/vol4/iss4/pid69053

Volume4 ,April 2017.



Editor Image

Dr. Allon Guez
Professor, Drexel University,

View more



Google Scholar Profile

Thomson Reuters ID : q-6288-2016.
ORCiD Research ID : 0000-0001-9540-6799

All Issues


Journal Code : IJERCSE
Electronic ISSN : 2394-2320
Impact Factor : 4.890
Frequency : monthly
Contact :