FIGURE
2: DoS ATTACKS
V. ELLIPTIC CURVE CRYPTOGRAPHY Symmetric cryptography offers developers
strong, high
performance security for bulk data encryption and is well
suited to wireless environments. However, the secure distribution of
keys to every user in a symmetric cryptosystem presents a significant
logistical challenge. And once distributed, these systems cannot
guarantee the identity of communicating parties or non-repudiation.
Public-key cryptography resolves these problems using a pair of keys –
one private and one public [9][11]. Unfortunately, the large
key sizes required in public-key cryptography make it less than ideal as
a solution for bulk data encryption, especially in wireless environments
which may be constrained by bandwidth and processing power. With these
cryptosystem limitations in mind, application developers also need to
deliver a flexible set of security options that can satisfy the
different needs of widely varying user groups such as consumers and
enterprise employees. So the solution is a cryptosystem that leverages
the advantages of both symmetric and public-key cryptography is one
possible solution. represents a significant barrier in terms of
development time, expense, and on-going support costs. So
here comes the need for ECC i.e. a strong, efficient cryptosystem which
must maintain equivalent security for its private and public keys. ECC
is an ideal public-key algorithm for memory and processor-limited
wireless applications because its key size scales linearly.