Elliptic curve cryptography (ECC) and Pairings get more research attentions for computational constraint devices such as Pocket PCs and wireless sensors. As a result, computational evaluations of various cryptographic algorithms are highly desired to guide researchers to design effective communication protocols. In order to achieve this goal, we conduct comparative performance evaluations for Pocket PC and wireless sensors to study the computational ability to process cryptographic functions, such as point multiplication, Pairings, AES, and hash functions. Our study shows that current Pocket PC level devices are capable to process computational intensive cryptographic functions, such as Parings. However, purely software cryptographic solutions require long time to process cryptographic algorithms and special optimization methods must be used to improve the computation performance.
|Title of host publication
|2007 IEEE International Conference on Portable Information Devices, PIDs 2007
|Institute of Electrical and Electronics Engineers Inc.
|Published - 2007
|1st IEEE International Conference on Portable Information Devices, PIDs 2007 - Orlando, United States
Duration: Mar 25 2007 → Mar 29 2007
|1st IEEE International Conference on Portable Information Devices, PIDs 2007
|3/25/07 → 3/29/07
- Advanced Encryption Standard (AES)
- Elliptic Curve Cryptography (ECC)
ASJC Scopus subject areas
- Electrical and Electronic Engineering
- Computer Science Applications