Optimising Security and Cryptography Across Diverse Environments
Document Type
Conference Paper
Rights
Available under a Creative Commons Attribution Non-Commercial Share Alike 4.0 International Licence
Disciplines
1.2 COMPUTER AND INFORMATION SCIENCE
Abstract
In this paper, we discuss current key management systems and their limitations for diverse computing environments such as M-Commerce. We then assess Elliptic Curve Cryptography and Identity Based Encryption as alternatives to currently used schemes and present performance results of ECC in comparison with RSA. We then describe the architecture of the SAFEST project which provides cryptography services using ECC and IBE for diverse environments such as mobile computing. We also consider different applications for the system including Green IT. The motivation for this research is the emergence of ever more diverse computing environments, many of which have a need for cryptographic services. We have developed a hardware and software system that can provide digital signature and cryptography services for these diverse environments.
DOI
https://doi.org/10.21427/aqvy-gd05
Recommended Citation
Connolly, M., & O'Reilly, F. (2009). Optimising security and cryptography across diverse environments. Ninth IT and T Conference, Technological University Dublin, Dublin, Ireland, 22nd.-23rd. October, 2009. doi:10.21427/aqvy-gd05
Publication Details
Paper presented at the Ninth IT and T Conference, Technological University Dublin, Dublin, Ireland, 22nd.-23rd. October, 2009.