Computer Engineering / Bilgisayar Mühendisliği
Permanent URI for this collectionhttps://hdl.handle.net/11147/10
Browse
3 results
Search Results
Conference Object The Performance Results of Ecdsa Implementation on Different Coordinate Systems(Tafford Publishing, 2008) Atay, SerapElliptic Curve Cryptography has a high computational cost due to arithmetic operations of point addition and point doubling. But the cost can be reduced if different coordinate systems utilized. This paper shows that the performance of an elliptic curve digital signature algorithm (ECDSA) can be significantly increased by using different coordinate systems.Article Citation - Scopus: 9Challenges for the Security Analysis of Next Generation Networks(Elsevier Ltd., 2011) Atay, Serap; Masera, MarceloThe increasing complexity of information and telecommunications systems and networks is reaching a level beyond human ability, mainly from the security assessment viewpoint. Methodologies currently proposed for managing and assuring security requirements fall short of industrial and societal expectations. The statistics about vulnerabilities and attacks show that the security, reliability and availability objectives are not reached and that the general threat situation is getting worse. With the deployment of Next Generation Networks e NGNs, the complexity of networks, considering their architecture, speed and amount of connections, will increase exponentially. There are several proposals for the network and security architectures of NGNs, but current vulnerability, threat and risk analysis methods do not appear adequate to evaluate them. Appropriate analysis methods should have some additional new characteristics, mainly regarding their adaptation to the continuous evolution of the NGNs. In addition, the application of security countermeasures will require technological improvements, which will demand further security analyses. This paper evaluates the current vulnerability, threat and risk analysis methods from the point of view of the new security requirements of NGNs. Then, the paper proposes to use autonomic and self-adaptive systems/applications for assuring the security of NGNs.Conference Object Citation - WoS: 2Citation - Scopus: 4Computational Cost Analysis of Elliptic Curve Arithmetic(Institute of Electrical and Electronics Engineers Inc., 2006) Atay, Serap; Koltuksuz, Ahmet; Hışıl, Hüseyin; Eren, ŞabanElliptic curves are proposed for the asymmetrical cryptography by Neal Koblitz and Victor Miller in 1986 separately. Elliptic curve cryptography (ECC) is utilized by hardware embedded solutions on mobile equipments and smart cards after 2000. Currently, software implementation of ECC faces the computational speed problem. One of the proposed solutions is to do the arithmetic operations on different Euclidean coordinate systems. This paper concentrates on the research of this technique and delineates the performance results of the implementation of the aforementioned technique on the different cryptographic libraries such as CRYMPIX, GMP and MIRACL.
