International Journal of Computer Science and Informatics
Article Title
Abstract
Elliptic curve Cryptography with its various protocols implemented in terms of accuracy and fast observation of results for better security solution. ECC applied on two finite fields: prime field and binary field. Because it is public key cryptography so, it also focus on generation of elliptic curve and shows why finite fields are introduced. But for accurate observation we do analysis on category of cryptographic primitives used to solve given security problem. RSA & ECDSA both have basic criteria of production of keys and method of encryption and decryption in basic application as per security and other properties which are authentication, non-repudiation, privacy, integrity.
Recommended Citation
KAUR, AMANPREET and GOYAL, VIKAS
(2014)
"A COMPARATIVE ANALYSIS OF ECDSA V/S RSA ALGORITHM,"
International Journal of Computer Science and Informatics: Vol. 4:
Iss.
1, Article 2.
DOI: 10.47893/IJCSI.2014.1165
Available at:
https://www.interscience.in/ijcsi/vol4/iss1/2
DOI
10.47893/IJCSI.2014.1165
Included in
Computer Engineering Commons, Information Security Commons, Systems and Communications Commons