Abstract
This paper contains a complications related to access systems and their functionality. Several cryptographic algorithms were implemented using the public library Lib-Tom-Crypt and benchmarked on an ARM7-processor platform. The common coding schemes in use were ECC and RSA (asymmetric coding schemes), AES, 3DES and two fish (symmetric algorithms). The benchmark considered both code size and speed of the algorithms. The two asymmetric algorithms, ECC and RSA, are possible to be used in an ARM7 based access system. Although, both technologies can be configured to finish the calculations within a reasonable time-frame of 10 Sec.
Cite
CITATION STYLE
Tanwar, G. S., Singh, G., & Gaur, V. (2010). SECURED ENCRYPTION - Concept and Challenge. International Journal of Computer Applications, 2(3), 89–94. https://doi.org/10.5120/637-892
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.