Security through Elliptic Curves for Wireless Network in Mobile Devices

Authors

  • Dr. Ekambaram Kesavulu Reddy

Keywords:

design software, graphic design., OTN (optical transport network), optical control plane, SDON (software defined optical network), optiSystem, openflow, SDN (software defined network)., photonics., optics, light, lasers, journal manuscripts, LaTeX template., Four Universal Data Structures of 169 arrays, Liver (GSE14520, 357 patients), Breast(GSE42568, 116 patients), Colorectal (GSE8671, 63 patients), Renal (GSE66270, 28 patients)., Artificial Intelligence (AI), AI-generated works, innovation, authorship, originality, copyright law, Elliptic curve cryptography, Simple power Analysis, Differential Power analysis

Abstract

The basic principle is �A function is easy to evaluate but its invert is infeasible unless a secret key is known�.

It is mathematically proved that security of cryptographic does not imply its implementation security of system against Side-channel Attacks. The security of system lies in the difficulty of extracting k from P and Q. It is essential to secure the implementation of cryptosystems in embedded devices against side-channel attacks. These attacks monitor the power consumption or the Electromagnetic emanations of a device Ex smart cards or mobile devices. The attacker�s goal is to retrieve partial or full information about a long-term key that is employed in several ECSM executions.

We are implementing a secret key avoid to retrieving the valuable information by the attacker through Simple Power Analysis Attacks.

References

Downloads

Published

2024-11-20

How to Cite

Security through Elliptic Curves for Wireless Network in Mobile Devices. (2024). London Journal of Research In Computer Science and Technology, 24(2), 65-73. https://journalspress.uk/index.php/LJRCST/article/view/1450