Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Improved Cryptography for Avoiding Data Frauds on Mobile Devices


Affiliations
1 MITCOE, Pune, India
     

   Subscribe/Renew Journal


Mobile devices are storage of lot of sensitive business as well as personal data. If mobile is stolen then the security of whole data will be lost. It causes damage to intellectual property of company as well as of individual. Traditionally, public key cryptography algorithm like RSA is used for providing security. As RSA impose computational burden in terms of execution time, memory, power and bandwidth, RSA can be replaced with Elliptic Curve Cryptography (ECC). Mobile devices are constrained in terms of power, memory and bandwidth etc. In my paper, I have implemented ECC over binary field (2m) and proved its results over RSA for mobile devices which are constrained in terms of power, memory and bandwidth etc. ECC is used for encryption of mobile‟s phone book contents, email addresses stored SMS contents and also scheduler information set in a mobile. I have reduced memory consumption by dynamically generating points of elliptic curve. As I am not encrypting text character by character, Size of cipher text gets reduced. Also cryptanalytic attack is avoided by avoiding repetition of patters.

Keywords

Elliptic Curve Cryptography (ECC), Cryptography, Security, RSA.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 180

PDF Views: 2




  • Improved Cryptography for Avoiding Data Frauds on Mobile Devices

Abstract Views: 180  |  PDF Views: 2

Authors

A. Sharmishta Desai
MITCOE, Pune, India

Abstract


Mobile devices are storage of lot of sensitive business as well as personal data. If mobile is stolen then the security of whole data will be lost. It causes damage to intellectual property of company as well as of individual. Traditionally, public key cryptography algorithm like RSA is used for providing security. As RSA impose computational burden in terms of execution time, memory, power and bandwidth, RSA can be replaced with Elliptic Curve Cryptography (ECC). Mobile devices are constrained in terms of power, memory and bandwidth etc. In my paper, I have implemented ECC over binary field (2m) and proved its results over RSA for mobile devices which are constrained in terms of power, memory and bandwidth etc. ECC is used for encryption of mobile‟s phone book contents, email addresses stored SMS contents and also scheduler information set in a mobile. I have reduced memory consumption by dynamically generating points of elliptic curve. As I am not encrypting text character by character, Size of cipher text gets reduced. Also cryptanalytic attack is avoided by avoiding repetition of patters.

Keywords


Elliptic Curve Cryptography (ECC), Cryptography, Security, RSA.