2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT) 2016
DOI: 10.1109/icacdot.2016.7877543
|View full text |Cite
|
Sign up to set email alerts
|

A critical review on Elliptic Curve Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The Certificate Authority (CA) ( 40 42 ) generates a pair of public-private keys ( 43 ) for all the users. We suggest to use asymmetric cryptosystem such as Elliptic Curve Cryptography (ECC) ( 44 ) with the key length of at least 384 bit, 5 which is equivalent to 7,680 bit RSA ( 45 ), for exchanging the key and then 256 bit key of Advanced Encryption Standard (AES), recommended by National Security Agency (NSA), for encryption and decryption ensuring secure communication. In addition, to ensure the integrity of data received from an external source, the SHA3-256 algorithm is used which guarantees that the data has not been modified.…”
Section: Methodsmentioning
confidence: 99%
“…The Certificate Authority (CA) ( 40 42 ) generates a pair of public-private keys ( 43 ) for all the users. We suggest to use asymmetric cryptosystem such as Elliptic Curve Cryptography (ECC) ( 44 ) with the key length of at least 384 bit, 5 which is equivalent to 7,680 bit RSA ( 45 ), for exchanging the key and then 256 bit key of Advanced Encryption Standard (AES), recommended by National Security Agency (NSA), for encryption and decryption ensuring secure communication. In addition, to ensure the integrity of data received from an external source, the SHA3-256 algorithm is used which guarantees that the data has not been modified.…”
Section: Methodsmentioning
confidence: 99%
“…Moreover, the generation of public keys demands significantly more time with the RSA technique compared to ECCs. These findings in the implementation phase provided a compelling rationale for the researchers to advocate for a transition from RSA to elliptic curve cryptography [21]. This study conducted an empirical performance assessment aimed at comparing and quantifying the performance of two encryption schemes: (1) RSA-based BROSMAP and (2) ECC-based BROSMAP, both on the client side (Android) and server-side (XAMPP).…”
Section: Related Workmentioning
confidence: 99%
“…The most fascinating thing about ECC was that it uses a smaller key size for the same level of security as the RSA cryptosystem provides. The basics of elliptic curves, algebra on it, and the benefits of using elliptic curve cryptography over RSA can be found in [6,10,15,17]. Balamurugan et.al [1] proposed a new approach to the ECC based on the application of matrices and ElGamal technique, further they claimed to provide high security for the encrypted messages.…”
Section: Introductionmentioning
confidence: 99%