News Archive (1999-2012) | 2013-current at LinuxGizmos | Current Tech News Portal |    About   

Cryptography approach suits resource-constrained Linux devices

Jul 16, 2004 — by LinuxDevices Staff — from the LinuxDevices Archive — views

This primer provides a gentle yet thorough introduction to elliptical key cryptography (ECC), said to be ideal for resource-constrained embedded Linux systems because it provides more “security per bit” than other types of asymmetric cryptography. The paper is from Certicom, which markets Security Builder toolkits to embedded Linux developers.

Find out all about ECC by reading the complete whitepaper, which also explains symmetric and asymmetric key approaches, and the basic math behind RSA and Diffie-Hellman algorithms.

Read primer on Elliptical Curve Cryptography

 
This article was originally published on LinuxDevices.com and has been donated to the open source community by QuinStreet Inc. Please visit LinuxToday.com for up-to-date news and articles about Linux and open source.



Comments are closed.