Architecture of elliptic curve Cryptography using veriloghdl
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
The expansion of the worldwide communication networks such as
newlinethe internet and the increased dependency on digitized information in our
newlinesociety makes information more vulnerable to abuse If there are security
newlineproblems in these information systems users will fear that their sensitive
newlineinformation be monitored and business secrets stolen For these reasons it is
newlineimportant to make information systems more secure by protecting data and
newlineresources from malicious acts using crypto algorithms which are the core of
newlinesuch security system By encoding a message using crypto algorithms users
newlinecan make information transmitted over communication system almost
newlineimpossible to read by intruders Elliptic Curve Cryptosystems offer security
newlinecomparable to that of traditional asymmetric crypto systems such as those
newlinebased on the RSA algorithm and Digital signature algorithm with smaller keys and
newlinecomputationally more efficient algorithms The ability to use smaller keys and
newlinecomputationally more efficient algorithms than traditional asymmetric
newlinecryptographic algorithms are two main reasons for using Elliptic Curve
newlineCryptography
newline
newline