A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA

Providing the security on the basis of encryption standards is considered as key challenges for achieving the integrity & confidentiality. There are three main public-key cryptosystem contenders. Each has a variable key size that can be increased to achieve higher security at the cost of slower cryptographic operations. The best attack known on each public-key cryptosystem requires an amount of computation determined by a security parameter which is related to the key size. The secondary factor is confidentiality i.e. ensuring that adversaries gain no intelligence from a transmitted message.

Provided by: mecs-press Topic: Security Date Added: Oct 2013 Format: PDF

Download Now

Find By Topic