A Study on Efficient Information Security using Elliptic Curves
- Hargeet Kaur,
- Jay Sanghavi,
- Abhi Vakil,
- Shrey Shah
Hargeet Kaur
Pandit Deendayal Energy University School of Technology
Corresponding Author:hargeet.kaur@sot.pdpu.ac.in
Author ProfileJay Sanghavi
Pandit Deendayal Energy University School of Technology
Author ProfileAbhi Vakil
Pandit Deendayal Energy University School of Technology
Author ProfileShrey Shah
Pandit Deendayal Energy University School of Technology
Author ProfileAbstract
Nowadays, Internet of Things applications today use hardware security
modules to ensure secure communication. The elliptic curve is a
fundamental aspect of contemporary cryptography. Due to its smaller key
requirement than other public key algorithms, the elliptic curve is
frequently used in wireless installations, mobile networks, and credit
cards. Elliptic Curve Cryptography has the advantage of increasing
system performance, utilising fewer resources, and providing security
for a smaller key than other techniques. The technique of Elliptic Curve
is carefully studied in this article by developing a categorization
based on previous analyses and evaluations in this subject.