Elliptic curve cryptography on PocketPCs

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

The commercial use of small mobile computer devices by enterprise and government organizations is on the rise as wireless networking is becoming very popular and evolving very fast. Elliptic Curve Cryptography (ECC) seems very useful for providing a high level of security on these devices with small key sizes compared to the traditional public-key cryptographic systems. In this work we implement the National Institute of Standards and Technology (NIST) recommended ECC algorithms on Pocket PCs. The programs are written in Java since a vast array of Internet applications service infrastructure is designed around Java technology. We show that Elliptic Curve Digital Signature Algorithm (ECDSA) can run in a suitable time with sufficient level of security.
Original languageEnglish
Pages (from-to)23-34
Number of pages12
JournalInternational Journal of Security and its Applications
Volume3
Issue number3
StatePublished - Dec 1 2009

Keywords

  • Cryptography
  • Elliptic curves
  • Network security
  • NIST

Fingerprint

Dive into the research topics of 'Elliptic curve cryptography on PocketPCs'. Together they form a unique fingerprint.

Cite this