A performance analysis on elliptic curve cryptography in network security

The world wide web is a most well known electronic protocol which allows us to perform massive wireless communication like military communication, commercial and other private communication. But there is a tremendous security crisis such that data security, integrity, theft, loss and presence of infected applications for a authentic communication through digital medium that is why research and development on cryptography gets huge importance by every government as well as commercial sector and private sector. There are many robust cryptographic technique already have tested. Elliptic curve cryptography is a one type of public key cryptosystem like RSA, Diffie — Hellman. The main advantage of ECC is that it allows equal security for a smaller key size than the key size used RSA, that is why ECC reduces the processing overhead. This paper represents a brief review with some statistical results on how ECC has becomes the latest trend in the present and future cryptographic scenario.

[1]  Sharad Kumar Verma A Discussion on Elliptic Curve Cryptography and Its Applications , 2012 .

[2]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[3]  Antoine Joux,et al.  A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.

[4]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[5]  Neal Koblitz,et al.  An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm , 1998, CRYPTO.

[6]  Kin Choong Yow,et al.  A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIPTICAL CURVE CRYPTOGAPHY FOR ENERGY-CONSTRAINED DEVICES , 2010 .

[7]  Mohsen Machhout,et al.  Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor , 2010, International journal of Network Security & Its Applications.

[8]  Vipul Gupta,et al.  An End-to-End Systems Approach to Elliptic Curve Cryptography , 2002, CHES.

[9]  Peter Gemmell,et al.  Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack , 2001, Journal of Cryptology.

[10]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.

[11]  A. Enge,et al.  Elliptic Curves and Their Applications to Cryptography , 1999, Springer US.

[12]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[13]  A. Chandrasekhar,et al.  Encryption of Data using Elliptic Curve over Finite fields , 2012, ArXiv.

[14]  A. Chandrasekhar,et al.  Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields , 2011 .

[15]  K R Chandrasekhara Pillai,et al.  Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment , 2010 .