Research Article
Computer Information Processing System Based on RFID Internet-of-Things Encryption Technology
Table 3
Comparison of ECC and various cryptographic mechanisms.
| | Algorithm | Key length | Security | Execution efficiency |
| | AES | 132 | Strong | Poor efficiency | | DES | 56 | Weak | Poor efficiency | | PRESENT | 90 | Middle | Efficient | | ECC | 180 | Strong | Poor efficiency |
|
|