Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6607
Title: Workload Characterization of Elliptic Curve Cryptography and Other Network Security Algorithms for Constrained Environments
Authors: Gupta, Mitesh
Saini, Hemraj [Guided by]
Keywords: Elliptic curve cryptography
Network security
Algorithms
Issue Date: 2015
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: Today, security is one of the foremost concerns in the transmission of data over the internet or over any other network. Also, in recent years, there are great speculations regarding cryptographic algorithms which are suitable for constrained environments, like mobile devices, where computing resources, power availability, communication bandwidth and available memory are limited, as the number of mobile users are increasing at a very fast pace due to which m-commerce is on boom and today accounts for around 50% of all the e-commerce traffic and this percentage is expected to increase in future. In this project, I will select a public key cryptosystem suitable for such environment and study their workload characteristics. Particularly, I will study and discuss about elliptic curve cryptography algorithms, which is an emerging public key cryptographic system for constrained environments. This allows fast software implementations because of reduced key sizes and computational efficiency, while preserving the same security levels as were offered by previous integer-based public-key algorithms. I will characterize the operations needed by elliptic curve cryptography for different key sizes and different levels of software optimization. I will try to show that this algorithm can be implemented efficiently using very less resources.
URI: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6607
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
WORKLO~1.PDF1.37 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.