An Efficient Protocol for Resource Constrained Platforms Using ECC

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 1

Abstract

At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift towards mobile e-commerce applications. This paper highlights that the existing authentication protocols, based on RSA asymmetric cryptography, are not appropriate for such devices due to their limitations in computing power, memory capacity, key sizes and cryptographic support. Therefore, an efficient protocol for resource constrained platforms that achieve a level of security similar to the one achieved by the protocols in use today is designed and implemented. This protocol is based solely on Elliptic curve asymmetric cryptography and the results prove that the performance achieved is good compared to RSA.

Authors and Affiliations

Mrs. S. Prasanna Ganesan

Keywords

Related Articles

REMOTE SENSING IMAGE COMPRESSION USING 3D-SPIHT ALGORITHM AND 3D-OWT

Remote Sensing is the gathering of information about a place from a distance. Such information can occur by sensors or satellite, without making any direct contact with that object. We present a new technique for the com...

Q-Value Based Particle Swarm Optimization for Reinforcement Neuro-Fuzzy System Design

This paper proposes a combination of particle swarm optimization (PSO) and Q-value based safe reinforcement learning scheme for neuro-fuzzy systems (NFS). The proposed Q-value based particle swarm optimization (QPSO) ful...

ACO Based Feature Subset Selection for Multiple k-Nearest Neighbor Classifiers

The k-nearest neighbor (k-NN) is one of the most popular algorithms used for classification in various fields of pattern recognition & data mining problems. In k-nearest neighbor classification, the result of a new i...

Multimodal Authentication For High End Security

In earlier days Traditional authentication method in computer systems are based on knowledge and token based. Unfortunately lot of drawbacks are in these systems. Passwords often be forgotten, disclosed or changed. A rel...

Structured System Test Suite Generation Process for Multi-Agent System

In recent years, Agent-Oriented Software Engineering (AOSE) methodologies are proposed to develop complex distributed systems based upon the agent paradigm. The implementation for such systems has usually the form of Mul...

Download PDF file
  • EP ID EP149902
  • DOI -
  • Views 128
  • Downloads 0

How To Cite

Mrs. S. Prasanna Ganesan (2010). An Efficient Protocol for Resource Constrained Platforms Using ECC. International Journal on Computer Science and Engineering, 2(1), 89-91. https://europub.co.uk./articles/-A-149902