Abstract
Mobile phone in day-to-day life has become an important communication device, subjected from formal and informal talks to sharing important and secure information. These secure information falls from personal communication to large business deals. Hence, there is a necessity to ensure security to the applications that are used to transfer confidential information. In order to satisfy the users' requirement, many cryptographic protocols are chosen based on confidentiality, integrity and performance. Public Key Cryptography is one such solution that meets the above mentioned attributes. Systems that use public key cryptography weigh computing power, key size to measure the efficiency of the protocol. This paper mainly focuses on the performance attributes of the various public key cryptography algorithms. Here, the algorithms RSA and ECC are studied and compared. These algorithms implemented, provide the necessary basic security components like confidentiality, authentication, integration and non-repudiation of services for a mobile communication. In addition to the performance characteristics of the algorithms studied, we also extend our research in analyzing the power consumed by these efficient cryptographic protocols. The protocols' energy efficiencies are measured based on the consumption of current, power against time.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have