SECURED ENCRYPTION - Concept and Challenge

  • Tanwar G
  • Singh G
  • Gaur V
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

This paper contains a complications related to access systems and their functionality. Several cryptographic algorithms were implemented using the public library Lib-Tom-Crypt and benchmarked on an ARM7-processor platform. The common coding schemes in use were ECC and RSA (asymmetric coding schemes), AES, 3DES and two fish (symmetric algorithms). The benchmark considered both code size and speed of the algorithms. The two asymmetric algorithms, ECC and RSA, are possible to be used in an ARM7 based access system. Although, both technologies can be configured to finish the calculations within a reasonable time-frame of 10 Sec.

Cite

CITATION STYLE

APA

Tanwar, G. S., Singh, G., & Gaur, V. (2010). SECURED ENCRYPTION - Concept and Challenge. International Journal of Computer Applications, 2(3), 89–94. https://doi.org/10.5120/637-892

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free