Your Security Partner

ECC Overview

RSA and DSA cryptographic solutions have enjoyed wide use in applications ranging from anti-cloning to secure firmware updates.

But as security and performance requirements become more demanding within smaller more constrained environments, as found in Machine-to-Machine (M2M) applications, there is a necessity for smaller and faster signatures that simply are not available through RSA and DSA.

ECC provides the most security per bit of any known public-key scheme and therefore, ECC based signatures provide a smaller memory footprint, making them ideal for security authentication in M2M environments. TrustPoint Innovation's ECC based solution is ideally suited for M2M applications, where memory and bandwidth is most constrained.

About this Blog

The TrustPoint Innovation Blog covers security industry topics relating to Certificates, Elliptic Curve Cryptography (ECC), Machine-to-Machine (M2M) Communication, Near Field Communication (NFC), Vehicle-to-Vehicle (V2V) Communication, and more.

Recent Posts