An Efficient Protocol for Resource Constrained Platforms Using ECC

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 1

Abstract

At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift towards mobile e-commerce applications. This paper highlights that the existing authentication protocols, based on RSA asymmetric cryptography, are not appropriate for such devices due to their limitations in computing power, memory capacity, key sizes and cryptographic support. Therefore, an efficient protocol for resource constrained platforms that achieve a level of security similar to the one achieved by the protocols in use today is designed and implemented. This protocol is based solely on Elliptic curve asymmetric cryptography and the results prove that the performance achieved is good compared to RSA.

Authors and Affiliations

Mrs. S. Prasanna Ganesan

Keywords

Related Articles

Automatic detection of human and Energy saving based on Zigbee Communication

This paper proposes automatic detection of human and Energy saving room architecture to reduce standby power consumption and to make the room easily controllable with an IR remote control of a home appliance. To realize...

Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology

Commonly in encryption or decryption process some of the characters are inter changed by using some encryption and decryption algorithms (like DES, IDEA) with key. But in Bit Shifting and Stuffing (BSS) system to represe...

Discovery of students’ academic patterns using data mining techniques

Knowledge discovery is an emerging field which combines the techniques from mathematics, statistics, algorithms and Artificial Intelligence to extract the knowledge. Data mining is a main phase of Knowledge Discovery in...

A NEW APPROACH FOR VARIANT MULTI ASSIGNMENT PROBLEM

A large number of real-world planning problems called Combinatorial Optimization Problems share the following properties: They are Optimization Problems, are easy to state, and have a finite but usually very large number...

Application Firewall System

The main idea behind implementing such a project is to develop a firewall system which is a network security system that doesn’t permit the user to make any modifications on the application over the network. A firewall t...

Download PDF file
  • EP ID EP149902
  • DOI -
  • Views 100
  • Downloads 0

How To Cite

Mrs. S. Prasanna Ganesan (2010). An Efficient Protocol for Resource Constrained Platforms Using ECC. International Journal on Computer Science and Engineering, 2(1), 89-91. https://europub.co.uk/articles/-A-149902