ECC Overview

RSA and DSA cryptographic solutions have enjoyed wide use in applications ranging from anti-cloning to secure firmware updates.

But as security and performance requirements become more demanding within smaller more constrained environments, as found in Machine-to-Machine (M2M) applications, there is a necessity for smaller and faster signatures that simply are not available through RSA and DSA.

ECC provides the most security per bit of any known public-key scheme and therefore, ECC-based signatures provide a smaller memory footprint, making them ideal for security authentication in M2M environments. TrustPoint’s ECC based solution is ideally suited for M2M applications, where memory and bandwidth is most constrained.