Abstract

The use of resource constrained devices is on the rise these days, and they are largely used to work with sensitive data. Data security becomes increasingly important for both producers and users nowadays, the main problem that renders these devices vulnerable is a lack of resources. Attackers could take advantage of these flaws to get access to sensitive information. Improving the speed of the devices and avoiding data loss, a carefully chosen, and well-verified mathematical encryption algorithm should be used. Because of its simplicity, the RSA (Rivest, Shamir, and Adleman) algorithm is a well-known public key cryptography used by lots of people. The digital signature algorithm (DSA) is the industry standard for digital signature algorithms. Elliptic curve cryptography (ECC) uses elliptic curves on limited region to encrypt public keys. A comparison of several of these cryptographic algorithms will be presented in this paper, to determine whether one has a better chance of succeeding.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call