loading page

A Study on Efficient Information Security using Elliptic Curves
  • +1
  • Hargeet Kaur,
  • Jay Sanghavi,
  • Abhi Vakil,
  • Shrey Shah
Hargeet Kaur
Pandit Deendayal Energy University School of Technology

Corresponding Author:hargeet.kaur@sot.pdpu.ac.in

Author Profile
Jay Sanghavi
Pandit Deendayal Energy University School of Technology
Author Profile
Abhi Vakil
Pandit Deendayal Energy University School of Technology
Author Profile
Shrey Shah
Pandit Deendayal Energy University School of Technology
Author Profile

Abstract

Nowadays, Internet of Things applications today use hardware security modules to ensure secure communication. The elliptic curve is a fundamental aspect of contemporary cryptography. Due to its smaller key requirement than other public key algorithms, the elliptic curve is frequently used in wireless installations, mobile networks, and credit cards. Elliptic Curve Cryptography has the advantage of increasing system performance, utilising fewer resources, and providing security for a smaller key than other techniques. The technique of Elliptic Curve is carefully studied in this article by developing a categorization based on previous analyses and evaluations in this subject.