Explore chapters and articles related to this topic
Securing Future Autonomous Applications Using Cyber-Physical Systems and the Internet of Things
Published in Amit Kumar Tyagi, Niladhuri Sreenath, Handbook of Research of Internet of Things and Cyber-Physical Systems, 2022
S. Sobana, S. Krishna Prabha, T. Seerangurayar, S. Sudha
Elliptic curve digital signature algorithm (ECDSA) is an alternative of the digital signature algorithm (DSA). It uses the concept of elliptic curve cryptography (ECE) where the bit size of the public key is twice that of the security level. ECC is a type of public key cryptography based on the algebraic structure of elliptic curves over finite fields. ECDSA requires smaller keys than RSA to provide equivalent security and hence more efficient. ECDSA is used for digital signatures, key agreements, and pseudo-random generators. As an example, if the security level is 50 then the public key would be 100 bits and attacker require 2^50 attempts to find out the private key, whereas for DSA the size of the public key is at least 1024 bits. The signature size is about 4 times the security level measured in bits [130].
Review on Communication Security Issues in IoT Medical Devices
Published in B.K. Tripathy, J. Anuradha, Internet of Things (IoT), 2017
R. Somasundaram, Mythili Thirugnanam
Elliptic curve cryptography (ECC) is a public key cryptography developed in 1985 by Victor Miller and Niel Koblitz. ECC is a solid cryptographic algorithm compared to other public key cryptographic algorithms like RSA. ECC is a mathematical structure of elliptic curves over limited fields. Compared to the RSA public key algorithm, ECC is very secure. It is difficult to discover huge prime numbers in RSA, whereas ECC is more secure and furnishes equal security while generating little key size. ECC is thought to be exceptionally valuable for wearable devices, smart phones, and IoT implantable medical devices (IMDs). ECC’s public key brings about data transfer capacity utilization and quick computation capability. Algebraic formula of ECC is as shown below. d
Algebraic Geometry
Published in Paul L. Goethals, Natalie M. Scala, Daniel T. Bennett, Mathematics in Cyber Research, 2022
A relatively new yet well understood field of cryptography, elliptic curves allow for a reasonable level of security with much less bits (160-250 compared to 1024-3072 bits for RSA). With a sufficiently short key size, RSA can be faster than elliptic curve cryptography (ECC), but ECC still results in fewer computations and takes up less bandwidth. Elliptic curve cryptography (ECC) is used in public-key cryptography and is primarily used in key agreement and digital signature verification but may be used in many other applications. As we look towards the future, we can assume ECC will be more and more common as we develop smaller devices that need to be secured (see Washington (2008) for more details).
An Improved 2-Factor Authentication Scheme for WSN Based on ECC
Published in IETE Technical Review, 2023
Bhanu Chander, Gopalakrishnan Kumaravelan
Elliptic Curve Cryptography (ECC) is a special kind of public-key cryptography built on mathematically programmed elliptic curves that require smaller key sizes. Thus, it could be an appropriate target for resource-constrained situations. Famous well-known researchers Victor Miller projected ECC in 1885, then Neal Koblitz in 1985. An elliptic curve over a finite field demarcated as the set of every (x, y) ∈ Fp × Fp such that = + ax + b, here a, b ∈ Fp and mod p ≠ 0, and a prominent point at infinity which O. symbolizes. It should assume that the Gateway node is more computationally efficient than sensor nodes and holds a secured database where the list of registered sensor nodes is stored. In addition, every sensor node and Gateway node hoard their corresponding individualities in memory formerly than network placement.
Secure android IoT mobile and collaborative machine learning for controlling the management of enterprise
Published in Journal of Control and Decision, 2022
Hamza Mohammed Ridha Al-Khafaji, Refed Adnan Jaleel
There are two keys in Elliptic Curve Cryptography (ECC): a key of public and a key of private, which are produced by the two communicating devices, respectively. The key of public is distributed to all devices, however, the client encrypting or decrypting the communication keeps the private key concealed and secret. Elliptic curve cryptography is used in a wide range of protocols and security applications today, including digital signatures and Diffie Hellman key agreement methods. In comparison to previous methods of public-key cryptography, this one has some intriguing advantages. With recent developments in composite number factoring, this is a viable alternative to RSA's public-key encryption (Belghazi et al., 2019; Dar et al., 2021) techniques. Figure 3 shows a schematic classical cryptographic data communication.
CLEA-256-based text and image encryption algorithm for security in IOD networks
Published in Cogent Engineering, 2023
Snehal Samanth, Prema K V, Mamatha Balachandra
ECC has been used increasingly for the past few decades now. ECC is a public key cryptographic protocol that can be used for the implementation of digital signatures and key agreements, as well as encryption and decryption. ECC algorithm provides high security and efficiency even for small key sizes. Over a finite field Fp, where p > 3 and p is a prime, the standard equation of an elliptic curve is given by Equation 1. NIST has defined several ECC curves over very large primes, such as secp192r1, secp224r1, secp256r1, secp384r1, and secp521r1. ECC has been used for several applications like bitcoin, Secure Shell (SSH), Transport Layer Security (TLS), etc. (Bos et al., 2014).