DocumentCode :
2498050
Title :
Review paper: On, comparative study of embedded system architectures for implementation of ECC
Author :
Tungar, Anuja R R
Author_Institution :
MGM´´s JNEC, Aurangabad, India
fYear :
2009
fDate :
3-5 Nov. 2009
Firstpage :
1
Lastpage :
3
Abstract :
Solutions to security problems are proposed to protect the architecture (secure architecture) and to secure data (cryptography). Security is based on five essential principles which are supposed to guarantee the correct execution of both, the program and the communication. These five principles are confidentiality (encryption), integrity, availability, authenticity and nonrepudiations. Embedded systems are designed to do some specific task. It often runs with limited computer hardware resources. When ECC is realized in special hardware or on a special hardware or on a smart card crypto co-processor, it gives an acceleration by the factor often to hundred for 160 bit ECC key compared to 1024 bit RSA key. Elliptic Curve Cryptography offers a significant improvement in processing delay, thus making many time critical applications feasible, because ECC requires much shorter key lengths.
Keywords :
coprocessors; embedded systems; public key cryptography; RSA key cryptography; authenticity principle; availability principle; confidentiality principle; cryptography; elliptic curve cryptography; embedded system architectures; integrity principle; nonrepudiation principle; smart card crypto coprocessor; Acceleration; Availability; Communication system security; Coprocessors; Data security; Elliptic curve cryptography; Embedded system; Hardware; Protection; Smart cards;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet, 2009. AH-ICI 2009. First Asian Himalayas International Conference on
Conference_Location :
Kathmandu
Print_ISBN :
978-1-4244-4569-1
Electronic_ISBN :
978-1-4244-4570-7
Type :
conf
DOI :
10.1109/AHICI.2009.5340279
Filename :
5340279
Link To Document :
بازگشت