Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Engineering
Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann
Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann
Theses
Mobile technologies with limited resources, such as smart phones or PDAs, have increased dramatically in popularity. However, the level of security provided for these technologies has not kept pace with the value of the data that they contain or transmit.
Wireless networks usually provide some security, in the form of encryption. GSM and GPRS use different forms of the A5 algorithm, and Wi-Fi uses WEP or WPA. These encryption algorithms have proven weaknesses and in some cases have been efficiently cracked. To improve the security of wireless networks, stronger encryption algorithms need to be developed. One of the most attractive …