Filters








1,049 Hits in 4.0 sec

Performance analysis of elliptic curve cryptography for SSL

Vipul Gupta, Sumit Gupta, Sheueling Chang, Douglas Stebila
2002 Proceedings of the ACM workshop on Wireless security - WiSE '02  
Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key cryptosystem for mobile/wireless environments.  ...  This paper presents a first estimate of the performance improvements that can be expected in SSL (Secure Socket Layer), the dominant security protocol on the Web today, by adding ECC support.  ...  We believe this trend bodes well for the future of Elliptic Curve Cryptography and not just for wireless environments.  ... 
doi:10.1145/570681.570691 dblp:conf/ws/GuptaGSS02 fatcat:xwrt5zv7srh6jd3pn4jycrnw6q

Web-Cloud-based Security Services Based-on Elliptic Curves Cryptosystem

Victor OnomzaWaziri, Hakimi Danladi, John K. Alhassan, Faiza Babakano Jada
2015 International Journal of Computer Applications  
This paper dwells theoretically on the application of Elliptic Curves Cryptography (ECC) for the web and Cloud and Cloud Computing environments.  ...  Notwithstanding, there is some remarkable deployment of ECC for web security currently ongoing This paper establishes the position and role of ECC in the web computing environment.  ...  and elliptic curves cryptography is based on the hardness of elliptic curves discrete logarithm problem).  ... 
doi:10.5120/20290-2146 fatcat:wp7g5gxt25fkll5wzcrax7c3qu

An Enhanced Elliptic Curve Cryptosystem for Securing Data

Edward Kwadwo, James Ben, Frimpong Twum
2018 International Journal of Computer Applications  
Elliptic curves are effective for digital signatures, key agreement, generators, pseudo-random and other related tasks.  ...  Elliptic Curve Cryptographic System necessitates smaller keys compared to non-ECC cryptography to offer equal security.  ...  of elliptic curve cryptography depends on the difficulty in solving the elliptic curve logarithm problem.  ... 
doi:10.5120/ijca2018917688 fatcat:sbn4oplcfnd2xjn7axxddpak6a

Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device

Seniman Seniman, Baihaqi Siregar, Rani Masyithah Pelle, Fahmi Fahmi
2021 Indonesian Journal of Electrical Engineering and Computer Science  
The Apache web server must also be configured to support this cipher suite by generating OpenSSL ECC (elliptic curve cryptography) certificate.  ...  ) for establishing secure communication.  ...  This research implements ECC SSL in the form of ECDHE ECDSA AES (elliptic curve diffie Hellman ephemeral -elliptic curve diffie-hellman digital signature -advanced encryption standard) based cipher suite  ... 
doi:10.11591/ijeecs.v22.i1.pp507-515 fatcat:kiqkmpx5jrernlbju3n5c2ug6a

Comparative Analysis of Cryptography Library in IoT

Uday Kumar, Tuhin Borgohain, Sugata Sanyal
2015 International Journal of Computer Applications  
The various libraries and their performance analysis listed down in this paper are consolidated from various sources with the aim of providing a single comprehensive repository for reference to the various  ...  cryptography libraries and the comparative analysis of their features in IoT.  ...  TinyECC: TinyECC is an Elliptic Curve Cryptography based library which can perform ECC-based PKC operations ([25], [29] ). Some of the most prominent features of TinyECC are: a.  ... 
doi:10.5120/20779-3338 fatcat:a2ojd2heqjcsxg6putberwiriy

Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS

B. Arunkumar, G. Kousalya
2022 Computer systems science and engineering  
The paper primarily focuses on analyzing the SSL/TLS cipher and elliptic curves.  ...  The paper also recommends the best elliptic curve cipher suites for E-Commerce and online banking servers, based on their power consumption, handshake execution time, and key exchange and signature verification  ...  The paper discusses a detailed analysis on Safe curves and Safe primes on elliptic curve cryptography that improves the efficiency and performance of the Cipher Suites, taking into account the needs of  ... 
doi:10.32604/csse.2022.018166 fatcat:3m7lyvsklbcjncmtek4tfaziza

Fog Computing: Comprehensive Approach for Security Data Theft Attack Using Elliptic Curve Cryptography and Decoy Technology

Mai Trung Dong, Xianwei Zhou
2016 OALib  
Elliptic Curve Cryptography (ECC) and decoy technology in such a constrained environment along with the other two aspects of ECC, namely its security and efficiency.  ...  In the article, the performance of ECC is compared with the other PKC applications which should prove that ECC performs well and is more suitable for Fog environments.  ...  This paper presents a analysis of the performance enhancements that can be expected in SSL, the dominant security protocol on the Web at present, by adding ECC support.  ... 
doi:10.4236/oalib.1102802 fatcat:hntozyqqnzgmbiiq6jwqw5lbea

Comparative Analysis of Cryptography Library in IoT [article]

Uday Kumar, Tuhin Borgohain, Sugata Sanyal
2015 arXiv   pre-print
The various libraries and their performance analysis listed down in this paper are consolidated from various sources with the aim of providing a single comprehensive repository for reference to the various  ...  cryptography libraries and the comparative analysis of their features in IoT.  ...  TinyECC: TinyECC is an Elliptic Curve Cryptography based library which can perform ECC-based PKC operations ([25] , [29] ). Some of the most prominent features of TinyECC are: a.  ... 
arXiv:1504.04306v1 fatcat:f6bisiy32zhwdblzfpasdjtk54

Fully Parameterizable Elliptic Curve Cryptography Processor over GF(2m) [chapter]

Tim Kerins, Emanuel Popovici, William Marnane, Patrick Fitzpatrick
2002 Lecture Notes in Computer Science  
In this paper we present an Elliptic Curve Point Multiplication processor over base fields GF(2 m ), suitable for use in a wide range of commercial cryptography applications.  ...  We discuss the performance of our processor for different Elliptic Curves and compare the results with recent implementations in terms of speed and security.  ...  Acknowledgement This work was carried out as part of an Enterprise Ireland Research Innovation Fund Project.  ... 
doi:10.1007/3-540-46117-5_77 fatcat:vteunkv66fgsfpzcxalehuui3a

ECC Based Intrusion Tolerance for Web Security [chapter]

Xianfeng Zhang, Feng Zhang, Zhiguang Qin, Jinde Liu
2004 Lecture Notes in Computer Science  
In this paper, a threshold decryption scheme based the Menezes-Vanstone elliptic curve cryptosystem is presented.  ...  Performance analysis shows that the architecture is characterized by excellent security as well as high efficiency.  ...  Currently, ECC (Elliptic Curve Cryptography) is regarded as an attractive cryptography that can provide greater strength, higher speed and smaller keys than other cryptography systems [3, 4] .  ... 
doi:10.1007/978-3-540-24679-4_179 fatcat:cctjatx3nzbfxd7x3pesnwcacy

Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

V. Gopinath, R. S. Bhuvaneswaran
2018 Computers Materials & Continua  
This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA).  ...  Analysis, comparison and simulation prove that the proposed system is more effective and secure for the Transaction rich applications in Cloud.  ...  This paper proposes a safe storage mechanism for transaction rich applications, especially for banking, using Elliptic Curve Cryptography, a public key cryptosystem.  ... 
doi:10.32604/cmc.2018.04006 fatcat:boy4ahaaz5c5pip5fbd2dqgnhi

Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks [chapter]

Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger
2008 Lecture Notes in Computer Science  
We integrated a generic public-key crypto library into this SSL stack to support elliptic curve cryptography over arbitrary prime and binary fields.  ...  With such countermeasures, however, the execution time of a typical SSL handshake increases by roughly 50%, but still completes in less than 160 msec on a 200 MHz iPAQ PDA when using an elliptic curve  ...  The information in this document reflects only the authors' views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ... 
doi:10.1007/978-3-540-89641-8_25 fatcat:bdzahwo3w5gdhjnpb4rz72za7i

A workload characterization of elliptic curve cryptography methods in embedded environments

I. Branovic, R. Giorgi, E. Martinelli
2003 Proceedings of the 2003 workshop on MEmory performance DEaling with Applications , systems and architecture - MEDEA '03  
Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key system for constrained environments, because of the small key sizes and computational efficiency, while preserving the same security  ...  level as the standard methods We have developed a set of benchmarks to compare standard and corresponding elliptic curve public-key methods.  ...  Related Work There is an intensive research ongoing in improving the efficiency of elliptic curve operations, as well as their performance analysis.  ... 
doi:10.1145/1152923.1024299 fatcat:gakqbd6x4rc3npomakanuej5t4

A workload characterization of elliptic curve cryptography methods in embedded environments

I. Branovic, R. Giorgi, E. Martinelli
2004 SIGARCH Computer Architecture News  
Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key system for constrained environments, because of the small key sizes and computational efficiency, while preserving the same security  ...  level as the standard methods We have developed a set of benchmarks to compare standard and corresponding elliptic curve public-key methods.  ...  Related Work There is an intensive research ongoing in improving the efficiency of elliptic curve operations, as well as their performance analysis.  ... 
doi:10.1145/1024295.1024299 fatcat:pc6zcdw5cngohibkugzhf5q5gu

Security through Elliptic Curve Cryptography in UID for Fetching Relevant Information Only

Aman Verma
2018 International Journal for Research in Applied Science and Engineering Technology  
of key generation and describes the use of elliptic curve cryptography for communication network.  ...  It uses elliptic curve cryptography system mechanism for generating pass code for mobile.  ...  ECC takes less time for encryption as well as decryption and ECC improves the SSL performance.  ... 
doi:10.22214/ijraset.2018.3652 fatcat:3igjuukdxrb7nblxtd7bcmlzka
« Previous Showing results 1 — 15 out of 1,049 results