Performance Comparison of Elliptical Curve and RSA Digital Signature on ARM7

The increasing use of network-connected embedded devices and online transactions creates a growing demand of network security for embedded systems. The security requirements, such as authentication, confidentiality and integrity, always make computationally intensive processes and can easily become the bottleneck of the related applications. Digital signatures are used in message transmission to verify the identity of the sender of the message and to ensure that the message has not been modified after signing. They are essential for verifying the authenticity of a message.

Provided by: International Association of Computer Science & Information Technology (IACSIT) Topic: Security Date Added: Jan 2012 Format: PDF

Find By Topic