Elliptical curve cryptography (ECC)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar projects crazy
Active In SP
**

Posts: 604
Joined: Dec 2008
#1
13-06-2009, 07:03 PM


This innovative technology can produce smaller, faster and efficient cryptographic keys using the break through technique of elliptic curve equation rather than employing the traditional method of producing the key as the product of very large prime numbers. Although ECC can be used in collaboration with other public key encryption methods like the RSA, and Diffie-Hellman, it gains upper hand over the other encryption methods in the level of security it offers. A 164-bit ECC key can provide with an equivalent amount of security that a 1024-bit RSA key can give.

Apart from the smaller key size, which leads to faster processing along with the higher level of security, ECC consumes only less power, as well as saves on the memory and the bandwidth, that has today made ECC an attractive public-key cryptosystem for mobile/wireless environments. Developed by Certicom, a mobile e-business security provider and licensed by Hifn, a manufacturer of integrated circuitry and network security products today many manufacturers, including 3COM, Cylink, Motorola, Pitney Bowes, Siemens, TRW and VeriFone have today incorporated support for ECC in their products, welcoming the new era in public key encryption technique.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
don
Active In SP
**

Posts: 1
Joined: Jul 2009
#2
06-07-2009, 08:41 PM

please , give report
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Elliptical curve cryptography (ECC) computer science crazy 6 6,397 31-03-2014, 08:33 PM
Last Post: Guest
  COLOR EXTENDED VISUAL CRYPTOGRAPHY USING ERROR DIFFUSION seminar paper 2 2,061 07-10-2013, 08:47 PM
Last Post: Guest
  Filter a curve with one of the mirror filter tools in HyperGraph, HyperView seminar projects maker 0 343 21-09-2013, 04:56 PM
Last Post: seminar projects maker
  CHAOTIC QUANTUM CRYPTOGRAPHY pdf study tips 0 312 09-09-2013, 03:31 PM
Last Post: study tips
  A Probabilistic Model of Visual Cryptography Scheme with Dynamic Group report study tips 0 592 05-06-2013, 01:02 PM
Last Post: study tips
  Number Theory Algorithms and Cryptography Algorithms PPT study tips 0 378 20-05-2013, 04:25 PM
Last Post: study tips
  Cryptography and Network Security Report study tips 0 506 25-02-2013, 03:36 PM
Last Post: study tips
  ppt on Cryptography study tips 0 416 14-02-2013, 10:48 AM
Last Post: study tips
  CRYPTOGRAPHY and SECURITY seminar tips 0 396 13-02-2013, 04:46 PM
Last Post: seminar tips
  Embedded Extended Visual Cryptography Schemes seminar tips 0 378 12-02-2013, 04:04 PM
Last Post: seminar tips