Date of Publication :30th December 2017
Abstract: Information is an asset that has a value like any other asset. As an asset, information needs to be secured from attacks. To be secured, information needs to be hidden from unauthorized access (confidentiality), protected from unauthorized change (integrity), and available to an authorized entity when it is needed (availability).During the last three decades, Computer networks created a revolution in the use of information. Information is now distributed. Authorized people can send and receive information from a distance using computer networks. Although the three above mentioned requirements- confidentiality, integrity, and availability- have not changed, they now have some new dimensions. Not only should information be confidential when it is stored; there should also be a way to maintain its confidentiality when it is transmitted from one computer to another. The scorching enlargement in the use of mobile and wireless devices demands a new generation of Public Key Cryptography schemes that have to accommodate limitations on power and bandwidth, at the same time, to provide an ample level of security for such devices. Elliptic Curve Cryptography (ECC) is rising as an attractive public-key cryptosystem for mobile/wireless environments. Compared to long- established cryptosystems like RSA, ECC offers the same security with smaller key sizes, which results in faster computations; lower power consumption, as well as memory and bandwidth savings. This is particularly useful for mobile devices which are typically limited in terms of their CPU, power and network connectivity. Nevertheless, the true crash of any public-key cryptosystem can only be evaluated in the context of a security protocol. Elliptic Curve Cryptography (ECC) has become the ideal choice for the insidious computing environment because of its suitability to the devices having limited bandwidth, battery power, less computational resources and less memory.
Reference :
-
- N.Koblitz, "Elliptic curve cryptosystems, in Mathematics of Computation,"1987, 203-209.
- V.Miller, "Use of elliptic curves in cryptography", Crypto 85, 5.
- L.Uhsadel, A. Poschmann and C.Paar, "An Efficient General Purpose Elliptic Curve Cryptography," In ECRYPT Workshop, SPEED-Software Performance Enhancement for Encryption and Decryption,2007, 95- 104.
- Vanstone, S.A., “Next generation security for wireless: elliptic curve cryptography”, Elsevier „Computers and Security‟, Vol. 22, No. 5, July 2003, 412-415.
- C. Coarfa, P. Druschel and D. Wallach, “Performance Analysis of TLS Web Servers”, Network and Distributed Systems Security Symposium ‟02, San Diego,California, Feb.2002.