A survey on security of mobile handheld devices through elliptic curve cryptography

Mobile hand-held devices find their best suited for military application, due to ability to deliver real-time voice data. Military applications demand stringent requirements in terms of data confidentiality, authentication. Security can be provided using strong encryption. There are various parameters which need to be considered such as power consumption, execution time, QOS. In this paper, analysis is done regarding various existing available papers which discuss the implementation of security methods for handheld devices on certain parameters.

[1]  Zoltán Ádám Mann,et al.  IMPLEMENTING ELLIPTIC CURVE CRYPTOGRAPHY ON PC AND SMART CARD , 2003 .

[2]  Kakali Chatterjee,et al.  Timestamp Based Authentication Protocol for Smart Card Using ECC , 2011, WISM.

[3]  Hyun-A Park Secure chip based encrypted search protocol in mobile office environments , 2016 .

[4]  Sharad Kumar Verma A Discussion on Elliptic Curve Cryptography and Its Applications , 2012 .

[5]  K. Sathish Kumar,et al.  An Experimental Study on Energy Consumption of Cryptographic Algorithms for Mobile Hand-Held Devices , 2012 .

[7]  Dr. E. Karthikeyan,et al.  Survey of Elliptic Curve Scalar Multiplication Algorithms , 2012 .

[9]  Amit Sinhal,et al.  Block based text data partition with RC4 encryption for text data security , 2016 .

[10]  Marisa W. Paryasto,et al.  Issues in Elliptic Curve Cryptography Implementation , 2009 .

[11]  Sheetal Kalra,et al.  Elliptic curve cryptography: survey and its security applications , 2011, ACAI '11.

[12]  Chu-Hsing Lin,et al.  Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[13]  Sheetal Kalra,et al.  Efficient password-authenticated key agreement protocol for smart cards based on ECC , 2013, Int. J. Multim. Intell. Secur..

[14]  Raju Nedunchezhian,et al.  Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing , 2014, Int. Arab J. Inf. Technol..