Improving the Security of E-Passports with WDDL Logic and Elliptic Curve Cryptography
Journal Title: The International Journal of Technological Exploration and Learning - Year 2014, Vol 4, Issue 2
Abstract
This paper describes the security of E-passport with elliptic curves. The chip which is having the information about the passenger should occupy very less area & The chip information cannot be traceable. AS Compared to other public key cryptosystems such as AES and DES elliptic curve cryptography provides greater authentication and verification security. Contactless smart cards work only with ECC because other systems require too much induction energy. The physical implementations such as power consumptions should not allow the hacker to think about the private key information. Hence in FPGA technology WDDL logic can be used to prevent the hackers even though it consumes more power.
Authors and Affiliations
N. Sivasankari| Department of ECE, Kalasalingam University Virudhunagar, Tamilnadu, India, M. Kannan| Special Officer of Distance Education Annamalai University Virudhunagar, Tamilnadu, India
An Empirical Study on Rewarding Performance to Improve the Quality of Faculty in Private Management Institution in Area of Greater Noida Region
Greater Noida had emerged as one of the leading education hubs in India. Management Education Institute has gained a tremendous popularity as it helps them in getting richly paying jobs, however lack in required perfo...
Design of Low Power 12-bit Magnitude Comparator
The basic function in a microprocessor is magnitude comparison and also it is used in the field of digital signal processing, embedded systems so powerful magnitude comparator is needed. The objective of this paper i...
Application of BPNN for Bankruptcy Prediction
Bankruptcy prediction is widely studied all over the world as it caused severe impacts on the economy of a nation as it regulates the bank lending decisions and profitability. In the first place the paper throws light...
Enhanced Bit Compressed Authentication Approach to Prevent False Data Injection Attacks and Energy Wastage in Route Nodes Over Wireless Sensor Network
Sensor Nodes Offer a powerful Combination of Distributed Sensing, Computation and Communication. A sensor network is a static ad hoc network consisting of hundreds of sensor nodes deployed over an area to perform loca...
Implementation of Different Low Power Multipliers Using Verilog
Low power consumption and smaller area are some of the most important criteria for the fabrication of DSP systems and high performance systems. Optimizing the speed and area of the multiplier is a major design issue....