Cryptography approach suits resource-constrained Linux devices
Jul 16, 2004 — by LinuxDevices Staff — from the LinuxDevices Archive — viewsThis primer provides a gentle yet thorough introduction to elliptical key cryptography (ECC), said to be ideal for resource-constrained embedded Linux systems because it provides more “security per bit” than other types of asymmetric cryptography. The paper is from Certicom, which markets Security Builder toolkits to embedded Linux developers.
Find out all about ECC by reading the complete whitepaper, which also explains symmetric and asymmetric key approaches, and the basic math behind RSA and Diffie-Hellman algorithms.
Read primer on Elliptical Curve Cryptography
This article was originally published on LinuxDevices.com and has been donated to the open source community by QuinStreet Inc. Please visit LinuxToday.com for up-to-date news and articles about Linux and open source.