Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Security

Theses/Dissertations

2008

Cryptography | Cell phone systems | Wireless communication systems

Articles 1 - 1 of 1

Full-Text Articles in Engineering

Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann Jan 2008

Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann

Theses

Mobile technologies with limited resources, such as smart phones or PDAs, have increased dramatically in popularity. However, the level of security provided for these technologies has not kept pace with the value of the data that they contain or transmit.

Wireless networks usually provide some security, in the form of encryption. GSM and GPRS use different forms of the A5 algorithm, and Wi-Fi uses WEP or WPA. These encryption algorithms have proven weaknesses and in some cases have been efficiently cracked. To improve the security of wireless networks, stronger encryption algorithms need to be developed. One of the most attractive …