Open Access Open Access  Restricted Access Subscription Access

A Review on Elliptic Curve Cryptography for Embedded Systems


Affiliations
1 Tom Patrick Institute of Computer and I.T, Dr. Rafiq Zakaria Campus, Rauza Bagh, Aurangabad, (Maharashtra), India
2 Department of C.S. & I.T., Dr. B.A.M. University, Aurangabad. (Maharashtra), India
 

Importance of Elliptic Curves in Cryptography was independently proposed by Neal Koblitz and Victor Miller in 1985. Since then, Elliptic curve cryptography or ECC has evolved as a vast field for public key cryptography (PKC) systems. In PKC system, we use separate keys to encode and decode the data. Since one of the keys is distributed publicly in PKC systems, the strength of security depends on large key size. The mathematical problems of prime factorization and discrete logarithm are previously used in PKC systems. ECC has proved to provide same level of security with relatively small key sizes. The research in the field of ECC is mostly focused on its implementation on application specific systems. Such systems have restricted resources like storage, processing speed and domain specific CPU architecture.

Keywords

Elliptic Curve Cryptography Public Key Cryptography, Embedded Systems, Elliptic Curve Digital Signature Algorithm (ECDSA), Elliptic Curve Diffie Hellman Key Exchange (ECDH).
User
Notifications
Font Size

Abstract Views: 360

PDF Views: 182




  • A Review on Elliptic Curve Cryptography for Embedded Systems

Abstract Views: 360  |  PDF Views: 182

Authors

Rahat Afreen
Tom Patrick Institute of Computer and I.T, Dr. Rafiq Zakaria Campus, Rauza Bagh, Aurangabad, (Maharashtra), India
S. C. Mehrotra
Department of C.S. & I.T., Dr. B.A.M. University, Aurangabad. (Maharashtra), India

Abstract


Importance of Elliptic Curves in Cryptography was independently proposed by Neal Koblitz and Victor Miller in 1985. Since then, Elliptic curve cryptography or ECC has evolved as a vast field for public key cryptography (PKC) systems. In PKC system, we use separate keys to encode and decode the data. Since one of the keys is distributed publicly in PKC systems, the strength of security depends on large key size. The mathematical problems of prime factorization and discrete logarithm are previously used in PKC systems. ECC has proved to provide same level of security with relatively small key sizes. The research in the field of ECC is mostly focused on its implementation on application specific systems. Such systems have restricted resources like storage, processing speed and domain specific CPU architecture.

Keywords


Elliptic Curve Cryptography Public Key Cryptography, Embedded Systems, Elliptic Curve Digital Signature Algorithm (ECDSA), Elliptic Curve Diffie Hellman Key Exchange (ECDH).