Title: Application of Elliptic Curves in Designing Lightweight Cryptographic Techniques


Authors:

Reema Jain

jain.reema@vgu.ac.in
Department of Mathematics, Vivekananda Global University, Jaipur (INDIA)

Pages: 71-74


Abstract:

Besides the traditional computing environment now a day's Ubiquitous Computing has evolved. Ubiquitous Computing also known as pervasive  computing is an advanced computing concept where computing is made to appear everywhere and anywhere. Ubiquitous computing can occur using any device, in any location, and in any format in which a user interacts with the computer, which can exist in many different forms, including laptop computers, tablets, terminals and phones. Furthermore there are applications in which devices have restricted processing capabilities, memory capacities, bandwidth support, power consumption, software support. Also the processing environment is so heterogeneous that predicting any behavior of any device may
seem unfeasible. Security is an important issue in Ubiquitous Computing environment due to the heterogeneity of devices used in communication. Currently Elliptic Curve based cryptographic solutions have revolutionized the arena of security. The Elliptic Curve based solutions are usually based on difficulty of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP). The Elliptic Curve based systems can attain to a desired security level
with significantly smaller size keys than that of required by other public key cryptographic schemes. Using of Elliptic Curves we can make Light Weight Cryptographic Schemes for ubiquitous computing environment, which can be applied to the lower computational power devices, like smart card based applications, e-applications, mobile applications and many more, due to their lower computational cost and communication overhead. This paper elaborates the use of Elliptic Curves in designing Light Weight Cryptographic Techniques which are suitable for resource constrained devices at the same time providing all the security  attributes like message confidentiality, authentication, integrity, unforgeability and non-repudiation, along with encrypted
message authentication and forward secrecy of message confidentiality .

Keywords: