Research Article

Computer Information Processing System Based on RFID Internet-of-Things Encryption Technology

Table 3

Comparison of ECC and various cryptographic mechanisms.

AlgorithmKey lengthSecurityExecution efficiency

AES132StrongPoor efficiency
DES56WeakPoor efficiency
PRESENT90MiddleEfficient
ECC180StrongPoor efficiency