Elliptical Curve Cryptography is better than RSA
#1

ABSTRACT

The main objective of our Project is to show that Elliptical Curve Cryptography is better than RSA. Which means than the ECC maintains a constant key size regarding the amount of data transferred i.e. the key size will be constant where as in RSA key size varies with increase in transfer of data. By having this type of properties this algorithm can be used in different applications efficiently. This algorithm is widely applicable to the huge organizations like military. As in the military network large amounts of very sensitive data has to be transferred, for it to happen very efficient cryptography has to be used. The different groups in the military are successfully using the ECC algorithm for secure transmissions.
The Elliptical Curve Cryptography (ECC) is a public key cryptography, which contains a pair of keys both a public key and a private key and a set of operations associated with the keys to do the cryptographic operations.
The algorithm consists of encryption and decryption process. When the data is transferred it must be encrypted by using some techniques of encryption process and after sending the data it must be received that will be the receiving end, where the data should be decrypted. The decryption will be done by using the private key. All the data that is transferred will be done in a systematic way all the facilities will be provided in sequence by following a particular order. Both ECC and RSA provide equivalent security but differ in using key sizes. ECC uses smaller key compared to RSA.
Finally the project mainly deals about the comparison between ECC and RSA with the key size as the main point. Here we explained the problem by taking an example of a military organization, where the information is to be very sensitive and different levels of security is also implemented using Elliptical Curve Cryptography.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: mram better, news of karmasang than today, learning curve star, ece mini project at less than 100 rupees, seminar on an approach to better quality mortar and concrete, elliptical cu, rsa denver,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cheating Prevention in Visual Cryptography project topics 3 2,816 07-10-2013, 02:00 PM
Last Post: Guest
  Cryptography with DNA binary strands seminar class 1 2,255 15-11-2012, 12:17 PM
Last Post: seminar details
  DEFENDING SYN ATTACK IN TCP USING CRYPTOGRAPHY nit_cal 1 1,910 30-10-2012, 04:56 PM
Last Post: Guest
  Virtual Private Network (RSA) project topics 1 1,777 30-11-2011, 09:59 PM
Last Post: VickyBujju
  STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY IN COMPUTER FORENSICS smart paper boy 0 1,643 29-08-2011, 10:00 AM
Last Post: smart paper boy
  RSA – Public Key Cryptography Algorithm seminar class 1 2,061 13-08-2011, 12:03 AM
Last Post: ja_mir05
  CLASSICAL CRYPTOGRAPHY seminar class 0 967 12-05-2011, 12:45 PM
Last Post: seminar class
  MINIMIZING EXECUTION TIME OF GRID-BASED CRYPTOGRAPHY WITH AES ALGORITHM seminar class 0 1,404 04-05-2011, 04:27 PM
Last Post: seminar class
  Enhancing Iris Biometric Recognition System with Cryptography and Error Correction seminar class 0 1,475 04-05-2011, 11:29 AM
Last Post: seminar class
  CRYPTOGRAPHY & INFORMATION SECURITY seminar class 0 1,158 28-04-2011, 02:56 PM
Last Post: seminar class

Forum Jump: