Optimising Security and Cryptography Across Diverse Environments

Martin Connolly, Fergus O'Reilly

Research output: Contribution to conferencePaperpeer-review

Abstract

In this paper, we discuss current key management systems and their limitations for diverse computing environments such as M-Commerce. We then assess Elliptic Curve Cryptography and Identity Based Encryption as alternatives to currently used schemes and present performance results of ECC in comparison with RSA. We then describe the architecture of the SAFEST project which provides cryptography services using ECC and IBE for diverse environments such as mobile computing. We also consider different applications for the system including Green IT. The motivation for this research is the emergence of ever more diverse computing environments, many of which have a need for cryptographic services. We have developed a hardware and software system that can provide digital signature and cryptography services for these diverse environments.
Original languageEnglish
DOIs
Publication statusPublished - 2009
Externally publishedYes
EventNinth IT and T Conference - Dublin, Ireland
Duration: 22 Oct 200923 Oct 2009

Conference

ConferenceNinth IT and T Conference
Country/TerritoryIreland
CityDublin
Period22/10/0923/10/09

Keywords

  • key management systems
  • diverse computing environments
  • M-Commerce
  • Elliptic Curve Cryptography
  • Identity Based Encryption
  • RSA
  • SAFEST project
  • mobile computing
  • Green IT
  • cryptographic services
  • digital signature

Fingerprint

Dive into the research topics of 'Optimising Security and Cryptography Across Diverse Environments'. Together they form a unique fingerprint.

Cite this