To Improve Cybersecurity, Think like a Hacker Case Harvard Case Solution & Analysis

To Improve Cybersecurity, Think like a Hacker Case Study Analysis

Elliptic Curve Cryptography (ECC)

The Elliptic Curve Cryptography (ECC) isa newly recognized and latest method of encryption that offers stronger means of security. The mathematical properties of the elliptic curve are used in the Elliptic curve cryptography (ECC) to produce thepublic key cryptographic systems. Like other public key cryptographic systems, the Elliptic Curve Cryptography is highly based on the number of functions of mathematics that are easy to compute in one direction but are challenging as well as difficult to reverse.

The advantages of the Elliptic Curve Cryptography includes; faster key generations& server authentication, smaller cipher texts, keys and signatures, fast signature, moderately fast decryption, and encryption, exceptionalprotocolsFH-ECMQV et al (authenticated key exchange) and special curves with the feature of the bilinear pairing. As it employs the short encryption key, it requires less power of computing and is faster as compared to other first generation encryption public key algorithm.

In contradiction to advantages, there are some drawbacks of the Elliptic Curve Cryptography such as; the ECC algorithm is tricky, complex as well as complicated to implement specifically the standard curves, the complex implementation of the ECC algorithm tend to increase the likelihood of errors of implementation hence lowering the algorithm security. Another drawback includes; signing with the generator of random number compromises the key, patent concerns particular for binary curves, unknown weaknesses of the newer algorithms and does not use DUAL_EC_DRBG. Additionally, there is some mathematical problem of Elliptic Curve Cryptography algorithm which includes; harder for hackers to break in comparison to the DSA and RSA, which demonstrates that the Elliptic Curve Cryptography algorithm ensures the safety of the infrastructure and web site as compared to the traditional modes in a more secure way.

In addition to this, the Elliptic Curve Cryptography is quite useful and helpful for today’s generation as a maximum number of people are shifting to smartphones. As the smartphone’s utilization extends to increase, the need for more flexible encryption is increasing for the businesses to meet the increasing requirements of security. The smaller size of keys demonstrates that the stronger encryption with less network bandwidth and computing power could be achieved tan RSA, this is specifically beneficial for the internet of things (IoT) and low powered mobile phone devices which are increasingly becoming ubiquitous.

The Elliptic Curve Cryptography is highly adaptable to the wide range of cryptographic protocols and schemes such as Elliptic Curve Integrated Encryption Scheme (ECIES), the Elliptic Curve Digital Signature Algorithm (ECDSA) and Elliptic Curve Diffie-Hellman (ECDH). TheElliptic Curve Cryptography finds application in the protocols of authentication which involves RFIDs, smart cards, digital signatures, wireless networks as well as other techniques of authentication (Abidi, Bouallegue, & Kahri, 2014). Some levels of protectionarerequired to be incorporated into the Elliptic Curve Cryptography based protocols in order to guarantee and ensure the near-total security against several forms of attacks including a man in the middle, denial of service (DoS) as well as database attacks (Khatwani, 2017). There isa number of potentialvulnerabilities to the elliptic curves including twist-security attacks as well as side-channel attacks. All of these attacks tend to threaten to invalidate the security that is provided by ECC to private keys (Stolbikova, 2016).................................

 

This is just a sample partical work. Please place the order on the website to get your own originally done case solution.

Share This

SALE SALE

Save Up To

30%

IN ONLINE CASE STUDY

FOR FREE CASES AND PROJECTS INCLUDING EXCITING DEALS PLEASE REGISTER YOURSELF !!

Register now and save up to 30%.