Light Weight Implementation of Stream Ciphers for M-Commerce Applications

Reading time: 3 minute
...

📝 Original Info

  • Title: Light Weight Implementation of Stream Ciphers for M-Commerce Applications
  • ArXiv ID: 1404.4791
  • Date: 2014-04-21
  • Authors: Researchers from original ArXiv paper

📝 Abstract

In today's world the use of computer and telecommunications networking is essential for human life. Among these, mobile tools and devices due to availability, have found a special impact on everyone life. This feature addition to providing sample facilities such as financial transactions at any place and time has raised the Sensitivities about security of these devices. In order to provide security, numerous techniques have been proposed which due to the limitations of mobile devices; an algorithm should be taken that have the ability to function for light weight ubiquitous computing. In this paper, four eSTREAM candidates from software profile were taken into account and analyzed and implemented by using J2ME technology. Then these algorithms were implemented on a variety of mobile phones and are compared with each other in terms of execution time and finally the obtained Results are expressed.

💡 Deep Analysis

Deep Dive into Light Weight Implementation of Stream Ciphers for M-Commerce Applications.

In today’s world the use of computer and telecommunications networking is essential for human life. Among these, mobile tools and devices due to availability, have found a special impact on everyone life. This feature addition to providing sample facilities such as financial transactions at any place and time has raised the Sensitivities about security of these devices. In order to provide security, numerous techniques have been proposed which due to the limitations of mobile devices; an algorithm should be taken that have the ability to function for light weight ubiquitous computing. In this paper, four eSTREAM candidates from software profile were taken into account and analyzed and implemented by using J2ME technology. Then these algorithms were implemented on a variety of mobile phones and are compared with each other in terms of execution time and finally the obtained Results are expressed.

📄 Full Content

In today's world the use of computer and telecommunications networking is essential for human life. Among these, mobile tools and devices due to availability, have found a special impact on everyone life. This feature addition to providing sample facilities such as financial transactions at any place and time has raised the Sensitivities about security of these devices. In order to provide security, numerous techniques have been proposed which due to the limitations of mobile devices; an algorithm should be taken that have the ability to function for light weight ubiquitous computing. In this paper, four eSTREAM candidates from software profile were taken into account and analyzed and implemented by using J2ME technology. Then these algorithms were implemented on a variety of mobile phones and are compared with each other in terms of execution time and finally the obtained Results are expressed.

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut