Paper
22 April 2022 ECC, RSA, and DSA analogies in applied mathematics
Wenxin Yang
Author Affiliations +
Proceedings Volume 12163, International Conference on Statistics, Applied Mathematics, and Computing Science (CSAMCS 2021); 121632P (2022) https://doi.org/10.1117/12.2628013
Event: International Conference on Statistics, Applied Mathematics, and Computing Science (CSAMCS 2021), 2021, Nanjing, China
Abstract
The use of resource constrained devices is on the rise these days, and they are largely used to work with sensitive data. Data security becomes increasingly important for both producers and users nowadays, the main problem that renders these devices vulnerable is a lack of resources. Attackers could take advantage of these flaws to get access to sensitive information. Improving the speed of the devices and avoiding data loss, a carefully chosen, and well-verified mathematical encryption algorithm should be used. Because of its simplicity, the RSA (Rivest, Shamir, and Adleman) algorithm is a well-known public key cryptography used by lots of people. The digital signature algorithm (DSA) is the industry standard for digital signature algorithms. Elliptic curve cryptography (ECC) uses elliptic curves on limited region to encrypt public keys. A comparison of several of these cryptographic algorithms will be presented in this paper, to determine whether one has a better chance of succeeding.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Wenxin Yang "ECC, RSA, and DSA analogies in applied mathematics", Proc. SPIE 12163, International Conference on Statistics, Applied Mathematics, and Computing Science (CSAMCS 2021), 121632P (22 April 2022); https://doi.org/10.1117/12.2628013
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Cryptography

Computer security

Applied mathematics

Reliability

Electroluminescence

Information security

Data processing

Back to Top