Elliptical Curve Cryptography is better than RSA
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
mechanical engineering crazy
Active In SP
**

Posts: 226
Joined: Jul 2009
#1
28-08-2009, 02:39 AM


ABSTRACT

The main objective of our Project is to show that Elliptical Curve Cryptography is better than RSA. Which means than the ECC maintains a constant key size regarding the amount of data transferred i.e. the key size will be constant where as in RSA key size varies with increase in transfer of data. By having this type of properties this algorithm can be used in different applications efficiently. This algorithm is widely applicable to the huge organizations like military. As in the military network large amounts of very sensitive data has to be transferred, for it to happen very efficient cryptography has to be used. The different groups in the military are successfully using the ECC algorithm for secure transmissions.
The Elliptical Curve Cryptography (ECC) is a public key cryptography, which contains a pair of keys both a public key and a private key and a set of operations associated with the keys to do the cryptographic operations.
The algorithm consists of encryption and decryption process. When the data is transferred it must be encrypted by using some techniques of encryption process and after sending the data it must be received that will be the receiving end, where the data should be decrypted. The decryption will be done by using the private key. All the data that is transferred will be done in a systematic way all the facilities will be provided in sequence by following a particular order. Both ECC and RSA provide equivalent security but differ in using key sizes. ECC uses smaller key compared to RSA.
Finally the project and implimentation mainly deals about the comparison between ECC and RSA with the key size as the main point. Here we explained the problem by taking an example of a military organization, where the information is to be very sensitive and different levels of security is also implemented using Elliptical Curve Cryptography.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY ppt project girl 5 2,501 10-06-2014, 11:39 AM
Last Post: java projects
  A Novel Anti Phishing framework based on Visual Cryptography Report seminar projects maker 0 570 19-09-2013, 03:18 PM
Last Post: seminar projects maker
  A Novel Anti Phishing framework based on Visual Cryptography pdf study tips 0 674 13-08-2013, 04:27 PM
Last Post: study tips
  IMPLEMENTING RSA ENCRYPTION ALGORITHM TO ENHANCE THE DATA SECURITY OF CLOUD study tips 0 394 24-06-2013, 04:56 PM
Last Post: study tips
  FULL REPORT ON EMBEDDED EXTENDED VISUAL CRYPTOGRAPHY SCHEMES study tips 0 408 07-06-2013, 03:33 PM
Last Post: study tips
  DEFENDING SYN ATTACK IN TCP USING CRYPTOGRAPHY nit_cal 1 1,157 20-03-2013, 11:14 AM
Last Post: Guest
  Report on Embedded Extended Visual Cryptography Schemes study tips 0 429 23-02-2013, 12:18 PM
Last Post: study tips
  Enhanced Security for Online Exams Using Cryptography Abstract study tips 0 415 16-02-2013, 02:23 PM
Last Post: study tips
  PROJECT SYNOPSIS ON RSA Secure ID Tokens Using Bluetooth pdf project girl 0 342 04-02-2013, 11:32 AM
Last Post: project girl
  A Competitive Study of Cryptography Techniques over Block Cipher Report project girl 0 365 28-01-2013, 11:22 AM
Last Post: project girl