Title :
Review paper: On, comparative study of embedded system architectures for implementation of ECC
Author :
Tungar, Anuja R R
Author_Institution :
MGM´´s JNEC, Aurangabad, India
Abstract :
Solutions to security problems are proposed to protect the architecture (secure architecture) and to secure data (cryptography). Security is based on five essential principles which are supposed to guarantee the correct execution of both, the program and the communication. These five principles are confidentiality (encryption), integrity, availability, authenticity and nonrepudiations. Embedded systems are designed to do some specific task. It often runs with limited computer hardware resources. When ECC is realized in special hardware or on a special hardware or on a smart card crypto co-processor, it gives an acceleration by the factor often to hundred for 160 bit ECC key compared to 1024 bit RSA key. Elliptic Curve Cryptography offers a significant improvement in processing delay, thus making many time critical applications feasible, because ECC requires much shorter key lengths.
Keywords :
coprocessors; embedded systems; public key cryptography; RSA key cryptography; authenticity principle; availability principle; confidentiality principle; cryptography; elliptic curve cryptography; embedded system architectures; integrity principle; nonrepudiation principle; smart card crypto coprocessor; Acceleration; Availability; Communication system security; Coprocessors; Data security; Elliptic curve cryptography; Embedded system; Hardware; Protection; Smart cards;
Conference_Titel :
Internet, 2009. AH-ICI 2009. First Asian Himalayas International Conference on
Conference_Location :
Kathmandu
Print_ISBN :
978-1-4244-4569-1
Electronic_ISBN :
978-1-4244-4570-7
DOI :
10.1109/AHICI.2009.5340279