SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 264
Public Key Infrastructure (PKI) understanding for VxWorks RTOS
using Asymmetric Encryption Algorithms and providing the efficient
solution for Trusted Platform Module(TPM)
Pooja Laxman Khyadgi1, Prof. Siddharth K. Gaikwad2
1Information Security Department, College of Engineering, Pune , Pune, India
2Computer Engineering Department, College of Engineering, Pune, Pune, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract –Security is becomingthebuzzword;weallaremore
concerned in safeguarding our data. Cryptography, the art of
writing is mainly used for data security. Especially in Real
Time Operating System, the data plays an important role. A
very famous Wind River’s VxWorks RTOS supports
cryptography and provides built in libraries for the same.
VxWorks use the trusted platform Modules (TPMs) to secure
the sensitive data and keys. TPMs uses the asymmetric
algorithm in order to save guard the data. Internally in TPMs
RSA algorithm is used to generate the keys or to sign digitally
when required. We in this paper are studying the behavior of
RSA algorithm and Elliptic Curve Cryptography (ECC) the
asymmetric encryption algorithms on the TPMs and conclude
to the use of specific algorithm on the TPMs, which increase
the efficiency of the RTOS ultimately.
Key Words: Public Key Infrastructure, Real Time Operating
System, Wind River VxWorks Workbench 4.0, Trusted
Platform Module, RSA, Elliptic Curve Cryptography
1. INTRODUCTION
In this world of high connectivity, security has become the
extreme priority task. Especially in the field of Real Time
Operating System (RTOS), compromising with security will
lead to a great loss. All the RTOS should satisfy the features
or characteristics likereliability,predictability,performance,
scalability and compactness. PKI defines the policestoadopt
such features in the system.
Thus in Wind River VxWorks RTOS PKI plays, an important
role to secure the data form the intruders. VxWorks usesthe
TPMs modules to perform the root level encryption or for
digitally signing the documents etc. With the increasing
connectivity and processing power, simple and traditional
algorithms are required to be updated or replaced. RSA is
having many shortcomings when compared with ECC the
asymmetric encryption algorithm. We are comparatively
studying both the asymmetric encryption algorithms to
choose the more efficient algorithm for the TPMs amongst
them which can increase overall efficiency of the system in
the PIK aspect. We present the results of analysis between
the RSA and ECC encryption algorithm on the Wind River’s
VxWorks Workbench 4.0.
This paper is organized as follows: section 1 deals with the
detailed introduction of the PKI and Wind River VxWorks
RTOS; section 2 explains the Asymmetric Encryption
Algorithm with sub headings of RSA and ECC encryption
algorithms; section 3 deals with the implementation results;
finally, section 4 provides the conclusion followed by the
acknowledgement and the references.
1.1 Public Key Infrastructure (PKI)
PKI handles the possible polices roles, rules, encryption,
digital certificates etc. in any of the operating system. PKI is
important to be clearly defined and implemented inorder to
achieve total integrity, authentication and reliability in any
specific system. Many times PKI assurethesecuretransferof
electronic data on the network by using the third party
verification. In VxWorks RTOS the PKI is achieved through
possible ways, which are mentioned below
i) Secure Boot & Secure Run time loader: Allow
Authenticated (signed) binaries to run and
decrypt and verify digital signatures
ii) Trusted PlatformModules(TPMs):Trusted Platform
Module (TPMs) actually are the small crypto
processors that can be used for performing
various tasks such as providing a secure
storage for true secure boot with full hardware
root of trust on the VxWorks system.
iii) Secure ELF (Digitally signed applications)
a. Encrypted Container: Uses AES algorithm
for storing the data at rest in a secure way.
b. Full disk encryption: Uses XEX-AES—to
ensure that even the file system metadata
is invisible when it is performed at the
partition level.
iv) Open SSL toolkit: Provides the full features for the
Transport Layer Security (TLS) and Secure
Socket Layer (SSL) protocols. It also includes
the libraries for the cryptographic standards
like AES, RSA, ECC, x.509 certificates.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 265
VxWorks also provides security features as in basic user
management by login credentials, SSL/SSH client/server
technology, firewalls, IPsec authentication etc. [1]
In the TPMs, the current algorithm used for encryption is
RSA. Below is the diagram depicting the scenario of the TPM
securing the data.
Fig 1. TPM using the RSA algorithm
Thus, we are able to see that the specific top-secret data is
encrypted using Open SLL and its AES 256-bit key is
wrapped by TPM using the RSA public key in the TPM
Encrypted block, which can be decrypted only bytheprivate
key of the RSA. Further the third level of security is provided
as the key produced by this TPM encrypted is securedbythe
root key, which is called as Storage Root Key (SRK) and is
stored permanently inside the TPM.
1.2 Wind River VxWorks RTOS
VxWorks is one of the RTOS used in manyembeddeddevices.
VxWorks RTOS is the industry’s leading device software
operating system. VxWorks was produced by Wind River
Systems in 1981 and now owned by Intel. VxWorks is
characterized by its determinism, performance, scalability,
and footprint which make more than 300 million devices
worldwiderun faster and more reliably.VxWorksisuniquely
applied to industries like aerospace and defense, industrial,
medical, consumer, and networking. Thus, VxWorks has
become the favorite choice of many leading innovators like
NASA, Boeing, Euro copter and many.
Many versions of VxWorks are begin released and the latest
version is VxWorks 7 released on 7 March 2014. Itisfamous
and widely used because of its many features like broad
support, expandable and upgradeable, scalable,
deterministic, reliable, optimized etc. [1] Optional Add-on
profiles also are available for the users. VxWorks is
componentized into core, middleware, network
technologies, and the Wind River Workbench development
suite. VxWorks support many types of schedulers for
multitasking. Reliability is ensured in VxWorks by
separating the kernel mode and user mode executions.
VxWorks also provides features as in IPNET stack, VxWorks
Simulator, System build, Debug shell etc. VxWorks features
can be separated into layers like application, middleware,OS
services, VxWorks core services, VxWorks Kernel. Board
support package is the fundamental building block of the
Entire system. Wind River even provides the feature of
Hypervisor to be implemented. Applications layer mostly
includes Wind River Network Acceleration Platform, Wind
River Tilcon GUI Engine, Software Defined Radio, JVM, and
Ada. Middleware layer consists of Web server, Web services,
OPC, fieldbus, Ipsec, etc.
Networking, Graphics, ErrorDetectionandReporting,Debug
and instrumentation servicesare included intheOSServices.
VxWorks Core OS includes file systems, I/O systems, Drivers
and Driver management. In VxWorks Kernel layer functions
included are related to Multi-core, interrupts, exception,
timers, semaphore, mutex, processors etc. Thus the multi
featured VxWorks is the good choice for the RTOS
applications.
2. Asymmetric Key encryption
Two different keys are used for encryption and decryption-
Public and Private in AsymmetricKey encryption.Thepublic
key is meant for encrypting and so it is available to anyone
on the network. Anyone who knows the Public Key of
receiver can encrypt the plaintext. Only the authorized
person is able to decrypt the cipher text through his own
private key. Private Key is kept secret from the outside
world. Asymmetric cryptography is also called as the public
key cryptography.
There are various asymmetric key algorithms such as Diffie-
Hellman, RSA, ECC, ElGamal, DSA etc. In this reference, we
have used the RSA and ECC algorithms for our study as after
the literature survey, between all the algorithms compared
with RSA, ECC proves to be more efficient. Before its
execution, let us understand these algorithms.
2.1 RSA
In 1977, Ron Rivest, Adi Shamir and Leonard Adleman
introduced a cryptographic algorithm, RSA, which is named
for the first letter in each of its inventors. [4] RSA can be
performed with different key sizes. RSA has its many
applications in various domains like security healthcare,
cloud, image processing etc. Here we need not to perform
the security key transfer as we do this in the symmetric
algorithms.
Here are the steps of RSA Algorithm [2]:
 The very first step of RSA Algorithm is selecting two
dissimilar prime number as a & b.
 In second step, N is calculated as N=a*b
 In the third step calculation of φ(N)=(a-1) *(b-1) is
performed.
 In the fourth step, e an integer is selectedasa public-key
and it is co-prime with φ(N)
 Finally, the inverse of e modulusφN)istakentoproduce
d, the private-key.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 266
For RSA Algorithm, the public-key involves two numbers N
and e while N forms the private-key together witha different
number d.
To encrypt the message: M (plain text) formula used is
M→Me(mod N)=C
To decrypt the message: C (cipher text) formula used is
C→Cd(mod N)=M
RSA uses two prime numbers (i.e a & b) to generate the
public and private keys. Encryption and Decryption is done
using these two different keys. The sender can encrypt the
message using the receiver’s public key and when the
message is transmitted to receiver, and then receiver can
decrypt it using his own private key.
Fig 2. RSA algorithm’s main Stages
The above diagram depicts the working of the RSA
algorithms and the usage of its keys. The Public key is used
while Encryption and the Private Key is used for the
Decryption purpose as depicted in the diagram.
Choosing the key size in RSA encryption plays a great
importance role. As the size of the key increases,thesecurity
level of the system, the complexity and the resistance of
encrypted text also increases automatically. RSA Algorithm
for cryptography consists of mainly three stages: Key
Generation Stage, Encryption Stage and Decryption Stage.
2.2 Elliptic Curve Cryptography (ECC)
ECC is a public key encryption technique based on elliptic
curve theory. In 1985, first time the use of elliptic curves in
cryptography was suggested independently by Neal Koblitz
and Victor S. Miller. This theory can be used to create faster,
smaller, and more efficientcryptographic keys.ECCperfectly
operates on groups of points over elliptic curvesandderives
its security from the hardness of the elliptic curve discrete
logarithm problem (ECDLP) [3]. Applications needing the
long-term security requirements mainly use ECC as it well
suites it.
The mathematical operations of ECC is defined over the
Elliptic curve y2 x3 ax b , where 4a3 27b2 0 .
For each value of the ‘a’ and ‘b’ gives a different ellipticcurve.
All sets of points (x, y) which satisfies the above equation
plus a point at infinity lies on the elliptic curve.
Fig 3. ECC algorithm Flow Chart
Above is shown the flow chart for the ECC algorithm, which
explains its main four steps as encode, encrypt, decrypt, and
finally decode. In the flow chartthemessageisdenotedbyM.
The public key is considered as a point in the curve Pm anda
random number is the private key k. The public key is
obtained by multiplying the private key with the generator
point G in the curve P. The Cipher text Cm is the pair of two
points (kG, Pm+kPb), where Pb is the public key of the
receiver. In decryption mode the first step is multiplying the
first point with the secret key of the receiver. Second step is
subtracting this from the second point to obtain the point on
the curve. The last step is decoding the message from the
achieved point.
Thus the ECC algorithm makes use of Elliptical curve to
perform its encryption and decryption. It is also used in
other applications as Digital signature, Key transfer etc.
3. Implementation Results
We have performed the test on the Wind River VxWorks
Workbench 4.0 with the Core Version: 1.7.0.0-
wb4_20160311. The configuration of the machine is 64-bit
Window’s 7 OS with 16 GB Ram. Below are the details of the
VxWorks workbench used.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 267
VxWorks Workbench 4.0 specifications:
This workbench is a development suite with Eclipse based
integrated environment. It consists to build system,
debugger, system analysis tools etc.Therearetwocompilers
available as listed below
a. LLVM for arm and Intel Architecture
b. GCC for Power PC Architecture
Many in build features like simulator, scope tools and
sources code analyzer, which help the developer to find out
the best results possible for them. Memory Analyzer, CPU
Profiler are the features provide to the user, which are
helpful for analysis. This workbench supports the
Architectures like ARM, POWER Architecture, and Intel,
Others on Demand. We have the debug shell, Kernel shell,
and core dump as options for building the codes as well
Below is the table showing up the details of the algorithms
when individually executed on the workbench with the
VxWorks simulator in the connected status.
Performance Analysis of both the Algorithms
Algorithms
Memory
Space
CPU
utilization
Execution
Time
RSA 92 -120 MB 43 -50 % 600-675 ms
ECC 100-170 MB 36-48 % 500- 600 ms
Table 1. Performance Analysis
Above table can be clearly understood by graphical
representation shown below.
Graph I. Memory utilization
From the above graph, it is evident that the memory
utilization of ECC is less than that compared with RSA.
Graph II. CPU Utilization
CPU utilization for both the algorithm is almost near to each
other’s.
Graph III. Execution Time Analysis
From the above graphs, we can conclude that RSA is taking
more time to complete its executionascomparedtoECC. The
Time taken by RSA is almost double that of the timetakenby
ECC.
3.1 Replacing the RSA by ECC to improve theefficiencyof
the TPM.
In RTOS with small memory space, the use of large key size
for encryption is not preferable as the RSA produces large
keys. The 256 bit ECC keys are equivalent to the 3072 bit
RSA keys. Also RSA is vulnerable to the brute force attack
and quantum computers. Scalability is the issue with RSA
algorithm. Thus after the actual performance weunderstood
that ECC is better in case of time and CPU utilization of the
system. Compared to RSA, ECC offers smaller key sizes,
faster calculations, savingofmemory, energyandbandwidth
and hence is better suited for small device especially RTOS.
[4]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 268
As in order to store the sensitive information, we are
depending on the RSAalgorithminsidetheTPMs ofVxWorks
RTOS. However, after our study we can say that using the
ECC Algorithm instead of RSAwouldprovetobebeneficial to
the entire RTOS in many aspects.
4. CONCLUSION
In this paper, we have presented the analysis after
implementation of the RSA and ECC algorithms on the Wind
Rivers VxWorks Workbench 4.0. From the analysis of these
asymmetric encryption algorithms, ECC is useful in TPMs to
increase the efficiency of the system as it takes less space,
less memory and less CPU resources benefiting the entire
RTOS. Thus after the actual comparison of the RSA and ECC
algorithm with different parameters, we can make our
conclusions, that for the TPMs of the VxWorks RSA
algorithms can be replaced with ECC Algorithm.
ACKNOWLEDGEMENT
I hereby acknowledge industry guide Mr. Ramakrishnan,
Ganesh for providing the guidance and support to complete
this project.
REFERENCES
[1] VxWorks: The Safe and Secure RTOS for the IOT by
WIND River Publications
[2] Ferdi SÖNMEZ and Mohammed Khudhair Abbas,
“Development Of A Client / Server Cryptography-Based
Secure Messaging System UsingRSAAlgorithm,”Journal
of Management Engineering and Information
Technology (JMEIT), Dec-2017.
[3] Padma Bh1, D.Chandravathi2 , P.Prapoorna Roja3,
“Encoding And Decoding of a Message in the
Implementation of Elliptic Curve Cryptography using
Koblitz’s Method,” (IJCSE) International Journal on
Computer Science and EngineeringVol.02,No.05,2010.
[4] Nils Gura, Arun Patel, Arvinderpal Wander,HansEberle,
*and Sheueling Chang Shantz, “ComparingEllipticCurve
Cryptography and RSA on 8-Bit CPUs, ” International
Association for Cryptologic Research 2004
[5] Darrel Hankerson, Julio Lopez Hernandez, Alfred
Menezes, Software Implementation of Elliptic Curve
Cryptography ver Binary Fields, 2000 Available at
http://citeseer.ist.psu.edu/hankerson00software.html
[6] Moncef Amara and Amar Siad,” Elliptical Cryptography
and its Applications,”2011 7th International Workshop
on Systems, Signal Processing and their Applications
(WOSSPA)
[7] Maryam Savari, Mohammad Montazerolzohour, Yeoh
Eng Thiam,” Comparison of ECC and RSA Algorithm in
Multipurpose Smart Card Application”.

More Related Content

What's hot

I psec cisco
I psec ciscoI psec cisco
I psec ciscoDeepak296
 
2008 08-12 SELinux: A Key Component in Secure Infrastructures
2008 08-12 SELinux: A Key Component in Secure Infrastructures2008 08-12 SELinux: A Key Component in Secure Infrastructures
2008 08-12 SELinux: A Key Component in Secure InfrastructuresShawn Wells
 
How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?Hannes Tschofenig
 
2008-01-23 Red Hat Overview to CUNY Information Managers Forum
2008-01-23 Red Hat Overview to CUNY Information Managers Forum2008-01-23 Red Hat Overview to CUNY Information Managers Forum
2008-01-23 Red Hat Overview to CUNY Information Managers ForumShawn Wells
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
Factors Affecting the System Safety || Linux
Factors Affecting the System Safety || LinuxFactors Affecting the System Safety || Linux
Factors Affecting the System Safety || LinuxZain Abid
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7Chaing Ravuth
 
Process behaviour modelling using lsm
Process behaviour modelling using lsmProcess behaviour modelling using lsm
Process behaviour modelling using lsmiaemedu
 
Software defined networking players
Software defined networking playersSoftware defined networking players
Software defined networking playersAmeer Sameer
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkVuz Dở Hơi
 
Futex Scaling for Multi-core Systems
Futex Scaling for Multi-core SystemsFutex Scaling for Multi-core Systems
Futex Scaling for Multi-core SystemsDavidlohr Bueso
 
Infrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfosec Europe
 
Slide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by SuzakiSlide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by SuzakiKuniyasu Suzaki
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...The Linux Foundation
 
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...Michelle Holley
 

What's hot (20)

Smart Object Architecture
Smart Object ArchitectureSmart Object Architecture
Smart Object Architecture
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
 
2008 08-12 SELinux: A Key Component in Secure Infrastructures
2008 08-12 SELinux: A Key Component in Secure Infrastructures2008 08-12 SELinux: A Key Component in Secure Infrastructures
2008 08-12 SELinux: A Key Component in Secure Infrastructures
 
How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?
 
2008-01-23 Red Hat Overview to CUNY Information Managers Forum
2008-01-23 Red Hat Overview to CUNY Information Managers Forum2008-01-23 Red Hat Overview to CUNY Information Managers Forum
2008-01-23 Red Hat Overview to CUNY Information Managers Forum
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
Factors Affecting the System Safety || Linux
Factors Affecting the System Safety || LinuxFactors Affecting the System Safety || Linux
Factors Affecting the System Safety || Linux
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
 
Process behaviour modelling using lsm
Process behaviour modelling using lsmProcess behaviour modelling using lsm
Process behaviour modelling using lsm
 
Software defined networking players
Software defined networking playersSoftware defined networking players
Software defined networking players
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
Futex Scaling for Multi-core Systems
Futex Scaling for Multi-core SystemsFutex Scaling for Multi-core Systems
Futex Scaling for Multi-core Systems
 
Infrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLC
 
Slide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by SuzakiSlide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by Suzaki
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
 
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
 

Similar to IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using Asymmetric Encryption Algorithms and Providing the Efficient Solution for Trusted Platform Module(TPM)

A Survey Embedded Systems Supporting By Different Operating Systems.pdf
A Survey   Embedded Systems Supporting By Different Operating Systems.pdfA Survey   Embedded Systems Supporting By Different Operating Systems.pdf
A Survey Embedded Systems Supporting By Different Operating Systems.pdfFiona Phillips
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_AppajiAppaji K
 
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded DayC:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded DayArik Weinstein
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
HiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationHiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationVEDLIoT Project
 
Kernel security of Systems
Kernel security of SystemsKernel security of Systems
Kernel security of SystemsJamal Jamali
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docx08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docxcroftsshanon
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET Journal
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsAM Publications
 
Embedded Os [Linux & Co.]
Embedded Os [Linux & Co.]Embedded Os [Linux & Co.]
Embedded Os [Linux & Co.]Ionela
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLinaro
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmIRJET Journal
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLIJNSA Journal
 

Similar to IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using Asymmetric Encryption Algorithms and Providing the Efficient Solution for Trusted Platform Module(TPM) (20)

A Survey Embedded Systems Supporting By Different Operating Systems.pdf
A Survey   Embedded Systems Supporting By Different Operating Systems.pdfA Survey   Embedded Systems Supporting By Different Operating Systems.pdf
A Survey Embedded Systems Supporting By Different Operating Systems.pdf
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded DayC:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
 
Vx works RTOS
Vx works RTOSVx works RTOS
Vx works RTOS
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
HiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationHiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentation
 
Kernel security of Systems
Kernel security of SystemsKernel security of Systems
Kernel security of Systems
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docx08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docx
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
 
Embedded Os [Linux & Co.]
Embedded Os [Linux & Co.]Embedded Os [Linux & Co.]
Embedded Os [Linux & Co.]
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devices
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 

Recently uploaded (20)

Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using Asymmetric Encryption Algorithms and Providing the Efficient Solution for Trusted Platform Module(TPM)

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 264 Public Key Infrastructure (PKI) understanding for VxWorks RTOS using Asymmetric Encryption Algorithms and providing the efficient solution for Trusted Platform Module(TPM) Pooja Laxman Khyadgi1, Prof. Siddharth K. Gaikwad2 1Information Security Department, College of Engineering, Pune , Pune, India 2Computer Engineering Department, College of Engineering, Pune, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract –Security is becomingthebuzzword;weallaremore concerned in safeguarding our data. Cryptography, the art of writing is mainly used for data security. Especially in Real Time Operating System, the data plays an important role. A very famous Wind River’s VxWorks RTOS supports cryptography and provides built in libraries for the same. VxWorks use the trusted platform Modules (TPMs) to secure the sensitive data and keys. TPMs uses the asymmetric algorithm in order to save guard the data. Internally in TPMs RSA algorithm is used to generate the keys or to sign digitally when required. We in this paper are studying the behavior of RSA algorithm and Elliptic Curve Cryptography (ECC) the asymmetric encryption algorithms on the TPMs and conclude to the use of specific algorithm on the TPMs, which increase the efficiency of the RTOS ultimately. Key Words: Public Key Infrastructure, Real Time Operating System, Wind River VxWorks Workbench 4.0, Trusted Platform Module, RSA, Elliptic Curve Cryptography 1. INTRODUCTION In this world of high connectivity, security has become the extreme priority task. Especially in the field of Real Time Operating System (RTOS), compromising with security will lead to a great loss. All the RTOS should satisfy the features or characteristics likereliability,predictability,performance, scalability and compactness. PKI defines the policestoadopt such features in the system. Thus in Wind River VxWorks RTOS PKI plays, an important role to secure the data form the intruders. VxWorks usesthe TPMs modules to perform the root level encryption or for digitally signing the documents etc. With the increasing connectivity and processing power, simple and traditional algorithms are required to be updated or replaced. RSA is having many shortcomings when compared with ECC the asymmetric encryption algorithm. We are comparatively studying both the asymmetric encryption algorithms to choose the more efficient algorithm for the TPMs amongst them which can increase overall efficiency of the system in the PIK aspect. We present the results of analysis between the RSA and ECC encryption algorithm on the Wind River’s VxWorks Workbench 4.0. This paper is organized as follows: section 1 deals with the detailed introduction of the PKI and Wind River VxWorks RTOS; section 2 explains the Asymmetric Encryption Algorithm with sub headings of RSA and ECC encryption algorithms; section 3 deals with the implementation results; finally, section 4 provides the conclusion followed by the acknowledgement and the references. 1.1 Public Key Infrastructure (PKI) PKI handles the possible polices roles, rules, encryption, digital certificates etc. in any of the operating system. PKI is important to be clearly defined and implemented inorder to achieve total integrity, authentication and reliability in any specific system. Many times PKI assurethesecuretransferof electronic data on the network by using the third party verification. In VxWorks RTOS the PKI is achieved through possible ways, which are mentioned below i) Secure Boot & Secure Run time loader: Allow Authenticated (signed) binaries to run and decrypt and verify digital signatures ii) Trusted PlatformModules(TPMs):Trusted Platform Module (TPMs) actually are the small crypto processors that can be used for performing various tasks such as providing a secure storage for true secure boot with full hardware root of trust on the VxWorks system. iii) Secure ELF (Digitally signed applications) a. Encrypted Container: Uses AES algorithm for storing the data at rest in a secure way. b. Full disk encryption: Uses XEX-AES—to ensure that even the file system metadata is invisible when it is performed at the partition level. iv) Open SSL toolkit: Provides the full features for the Transport Layer Security (TLS) and Secure Socket Layer (SSL) protocols. It also includes the libraries for the cryptographic standards like AES, RSA, ECC, x.509 certificates.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 265 VxWorks also provides security features as in basic user management by login credentials, SSL/SSH client/server technology, firewalls, IPsec authentication etc. [1] In the TPMs, the current algorithm used for encryption is RSA. Below is the diagram depicting the scenario of the TPM securing the data. Fig 1. TPM using the RSA algorithm Thus, we are able to see that the specific top-secret data is encrypted using Open SLL and its AES 256-bit key is wrapped by TPM using the RSA public key in the TPM Encrypted block, which can be decrypted only bytheprivate key of the RSA. Further the third level of security is provided as the key produced by this TPM encrypted is securedbythe root key, which is called as Storage Root Key (SRK) and is stored permanently inside the TPM. 1.2 Wind River VxWorks RTOS VxWorks is one of the RTOS used in manyembeddeddevices. VxWorks RTOS is the industry’s leading device software operating system. VxWorks was produced by Wind River Systems in 1981 and now owned by Intel. VxWorks is characterized by its determinism, performance, scalability, and footprint which make more than 300 million devices worldwiderun faster and more reliably.VxWorksisuniquely applied to industries like aerospace and defense, industrial, medical, consumer, and networking. Thus, VxWorks has become the favorite choice of many leading innovators like NASA, Boeing, Euro copter and many. Many versions of VxWorks are begin released and the latest version is VxWorks 7 released on 7 March 2014. Itisfamous and widely used because of its many features like broad support, expandable and upgradeable, scalable, deterministic, reliable, optimized etc. [1] Optional Add-on profiles also are available for the users. VxWorks is componentized into core, middleware, network technologies, and the Wind River Workbench development suite. VxWorks support many types of schedulers for multitasking. Reliability is ensured in VxWorks by separating the kernel mode and user mode executions. VxWorks also provides features as in IPNET stack, VxWorks Simulator, System build, Debug shell etc. VxWorks features can be separated into layers like application, middleware,OS services, VxWorks core services, VxWorks Kernel. Board support package is the fundamental building block of the Entire system. Wind River even provides the feature of Hypervisor to be implemented. Applications layer mostly includes Wind River Network Acceleration Platform, Wind River Tilcon GUI Engine, Software Defined Radio, JVM, and Ada. Middleware layer consists of Web server, Web services, OPC, fieldbus, Ipsec, etc. Networking, Graphics, ErrorDetectionandReporting,Debug and instrumentation servicesare included intheOSServices. VxWorks Core OS includes file systems, I/O systems, Drivers and Driver management. In VxWorks Kernel layer functions included are related to Multi-core, interrupts, exception, timers, semaphore, mutex, processors etc. Thus the multi featured VxWorks is the good choice for the RTOS applications. 2. Asymmetric Key encryption Two different keys are used for encryption and decryption- Public and Private in AsymmetricKey encryption.Thepublic key is meant for encrypting and so it is available to anyone on the network. Anyone who knows the Public Key of receiver can encrypt the plaintext. Only the authorized person is able to decrypt the cipher text through his own private key. Private Key is kept secret from the outside world. Asymmetric cryptography is also called as the public key cryptography. There are various asymmetric key algorithms such as Diffie- Hellman, RSA, ECC, ElGamal, DSA etc. In this reference, we have used the RSA and ECC algorithms for our study as after the literature survey, between all the algorithms compared with RSA, ECC proves to be more efficient. Before its execution, let us understand these algorithms. 2.1 RSA In 1977, Ron Rivest, Adi Shamir and Leonard Adleman introduced a cryptographic algorithm, RSA, which is named for the first letter in each of its inventors. [4] RSA can be performed with different key sizes. RSA has its many applications in various domains like security healthcare, cloud, image processing etc. Here we need not to perform the security key transfer as we do this in the symmetric algorithms. Here are the steps of RSA Algorithm [2]:  The very first step of RSA Algorithm is selecting two dissimilar prime number as a & b.  In second step, N is calculated as N=a*b  In the third step calculation of φ(N)=(a-1) *(b-1) is performed.  In the fourth step, e an integer is selectedasa public-key and it is co-prime with φ(N)  Finally, the inverse of e modulusφN)istakentoproduce d, the private-key.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 266 For RSA Algorithm, the public-key involves two numbers N and e while N forms the private-key together witha different number d. To encrypt the message: M (plain text) formula used is M→Me(mod N)=C To decrypt the message: C (cipher text) formula used is C→Cd(mod N)=M RSA uses two prime numbers (i.e a & b) to generate the public and private keys. Encryption and Decryption is done using these two different keys. The sender can encrypt the message using the receiver’s public key and when the message is transmitted to receiver, and then receiver can decrypt it using his own private key. Fig 2. RSA algorithm’s main Stages The above diagram depicts the working of the RSA algorithms and the usage of its keys. The Public key is used while Encryption and the Private Key is used for the Decryption purpose as depicted in the diagram. Choosing the key size in RSA encryption plays a great importance role. As the size of the key increases,thesecurity level of the system, the complexity and the resistance of encrypted text also increases automatically. RSA Algorithm for cryptography consists of mainly three stages: Key Generation Stage, Encryption Stage and Decryption Stage. 2.2 Elliptic Curve Cryptography (ECC) ECC is a public key encryption technique based on elliptic curve theory. In 1985, first time the use of elliptic curves in cryptography was suggested independently by Neal Koblitz and Victor S. Miller. This theory can be used to create faster, smaller, and more efficientcryptographic keys.ECCperfectly operates on groups of points over elliptic curvesandderives its security from the hardness of the elliptic curve discrete logarithm problem (ECDLP) [3]. Applications needing the long-term security requirements mainly use ECC as it well suites it. The mathematical operations of ECC is defined over the Elliptic curve y2 x3 ax b , where 4a3 27b2 0 . For each value of the ‘a’ and ‘b’ gives a different ellipticcurve. All sets of points (x, y) which satisfies the above equation plus a point at infinity lies on the elliptic curve. Fig 3. ECC algorithm Flow Chart Above is shown the flow chart for the ECC algorithm, which explains its main four steps as encode, encrypt, decrypt, and finally decode. In the flow chartthemessageisdenotedbyM. The public key is considered as a point in the curve Pm anda random number is the private key k. The public key is obtained by multiplying the private key with the generator point G in the curve P. The Cipher text Cm is the pair of two points (kG, Pm+kPb), where Pb is the public key of the receiver. In decryption mode the first step is multiplying the first point with the secret key of the receiver. Second step is subtracting this from the second point to obtain the point on the curve. The last step is decoding the message from the achieved point. Thus the ECC algorithm makes use of Elliptical curve to perform its encryption and decryption. It is also used in other applications as Digital signature, Key transfer etc. 3. Implementation Results We have performed the test on the Wind River VxWorks Workbench 4.0 with the Core Version: 1.7.0.0- wb4_20160311. The configuration of the machine is 64-bit Window’s 7 OS with 16 GB Ram. Below are the details of the VxWorks workbench used.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 267 VxWorks Workbench 4.0 specifications: This workbench is a development suite with Eclipse based integrated environment. It consists to build system, debugger, system analysis tools etc.Therearetwocompilers available as listed below a. LLVM for arm and Intel Architecture b. GCC for Power PC Architecture Many in build features like simulator, scope tools and sources code analyzer, which help the developer to find out the best results possible for them. Memory Analyzer, CPU Profiler are the features provide to the user, which are helpful for analysis. This workbench supports the Architectures like ARM, POWER Architecture, and Intel, Others on Demand. We have the debug shell, Kernel shell, and core dump as options for building the codes as well Below is the table showing up the details of the algorithms when individually executed on the workbench with the VxWorks simulator in the connected status. Performance Analysis of both the Algorithms Algorithms Memory Space CPU utilization Execution Time RSA 92 -120 MB 43 -50 % 600-675 ms ECC 100-170 MB 36-48 % 500- 600 ms Table 1. Performance Analysis Above table can be clearly understood by graphical representation shown below. Graph I. Memory utilization From the above graph, it is evident that the memory utilization of ECC is less than that compared with RSA. Graph II. CPU Utilization CPU utilization for both the algorithm is almost near to each other’s. Graph III. Execution Time Analysis From the above graphs, we can conclude that RSA is taking more time to complete its executionascomparedtoECC. The Time taken by RSA is almost double that of the timetakenby ECC. 3.1 Replacing the RSA by ECC to improve theefficiencyof the TPM. In RTOS with small memory space, the use of large key size for encryption is not preferable as the RSA produces large keys. The 256 bit ECC keys are equivalent to the 3072 bit RSA keys. Also RSA is vulnerable to the brute force attack and quantum computers. Scalability is the issue with RSA algorithm. Thus after the actual performance weunderstood that ECC is better in case of time and CPU utilization of the system. Compared to RSA, ECC offers smaller key sizes, faster calculations, savingofmemory, energyandbandwidth and hence is better suited for small device especially RTOS. [4]
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 268 As in order to store the sensitive information, we are depending on the RSAalgorithminsidetheTPMs ofVxWorks RTOS. However, after our study we can say that using the ECC Algorithm instead of RSAwouldprovetobebeneficial to the entire RTOS in many aspects. 4. CONCLUSION In this paper, we have presented the analysis after implementation of the RSA and ECC algorithms on the Wind Rivers VxWorks Workbench 4.0. From the analysis of these asymmetric encryption algorithms, ECC is useful in TPMs to increase the efficiency of the system as it takes less space, less memory and less CPU resources benefiting the entire RTOS. Thus after the actual comparison of the RSA and ECC algorithm with different parameters, we can make our conclusions, that for the TPMs of the VxWorks RSA algorithms can be replaced with ECC Algorithm. ACKNOWLEDGEMENT I hereby acknowledge industry guide Mr. Ramakrishnan, Ganesh for providing the guidance and support to complete this project. REFERENCES [1] VxWorks: The Safe and Secure RTOS for the IOT by WIND River Publications [2] Ferdi SÖNMEZ and Mohammed Khudhair Abbas, “Development Of A Client / Server Cryptography-Based Secure Messaging System UsingRSAAlgorithm,”Journal of Management Engineering and Information Technology (JMEIT), Dec-2017. [3] Padma Bh1, D.Chandravathi2 , P.Prapoorna Roja3, “Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz’s Method,” (IJCSE) International Journal on Computer Science and EngineeringVol.02,No.05,2010. [4] Nils Gura, Arun Patel, Arvinderpal Wander,HansEberle, *and Sheueling Chang Shantz, “ComparingEllipticCurve Cryptography and RSA on 8-Bit CPUs, ” International Association for Cryptologic Research 2004 [5] Darrel Hankerson, Julio Lopez Hernandez, Alfred Menezes, Software Implementation of Elliptic Curve Cryptography ver Binary Fields, 2000 Available at http://citeseer.ist.psu.edu/hankerson00software.html [6] Moncef Amara and Amar Siad,” Elliptical Cryptography and its Applications,”2011 7th International Workshop on Systems, Signal Processing and their Applications (WOSSPA) [7] Maryam Savari, Mohammad Montazerolzohour, Yeoh Eng Thiam,” Comparison of ECC and RSA Algorithm in Multipurpose Smart Card Application”.