Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6607
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGupta, Mitesh-
dc.contributor.authorSaini, Hemraj [Guided by]-
dc.date.accessioned2022-09-23T11:35:04Z-
dc.date.available2022-09-23T11:35:04Z-
dc.date.issued2015-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6607-
dc.description.abstractToday, security is one of the foremost concerns in the transmission of data over the internet or over any other network. Also, in recent years, there are great speculations regarding cryptographic algorithms which are suitable for constrained environments, like mobile devices, where computing resources, power availability, communication bandwidth and available memory are limited, as the number of mobile users are increasing at a very fast pace due to which m-commerce is on boom and today accounts for around 50% of all the e-commerce traffic and this percentage is expected to increase in future. In this project, I will select a public key cryptosystem suitable for such environment and study their workload characteristics. Particularly, I will study and discuss about elliptic curve cryptography algorithms, which is an emerging public key cryptographic system for constrained environments. This allows fast software implementations because of reduced key sizes and computational efficiency, while preserving the same security levels as were offered by previous integer-based public-key algorithms. I will characterize the operations needed by elliptic curve cryptography for different key sizes and different levels of software optimization. I will try to show that this algorithm can be implemented efficiently using very less resources.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectElliptic curve cryptographyen_US
dc.subjectNetwork securityen_US
dc.subjectAlgorithmsen_US
dc.titleWorkload Characterization of Elliptic Curve Cryptography and Other Network Security Algorithms for Constrained Environmentsen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
WORKLO~1.PDF1.37 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.