Optimising Security and Cryptography Across Diverse Environments
This item is available under a Creative Commons License for non-commercial use only
1.2 COMPUTER AND INFORMATION SCIENCE
In this paper, we discuss current key management systems and their limitations for diverse computing environments such as M-Commerce. We then assess Elliptic Curve Cryptography and Identity Based Encryption as alternatives to currently used schemes and present performance results of ECC in comparison with RSA. We then describe the architecture of the SAFEST project which provides cryptography services using ECC and IBE for diverse environments such as mobile computing. We also consider different applications for the system including Green IT. The motivation for this research is the emergence of ever more diverse computing environments, many of which have a need for cryptographic services. We have developed a hardware and software system that can provide digital signature and cryptography services for these diverse environments.
Connolly, M., & O'Reilly, F. (2009). Optimising security and cryptography across diverse environments. Ninth IT and T Conference, Technological University Dublin, Dublin, Ireland, 22nd.-23rd. October, 2009. doi:10.21427/aqvy-gd05