Research Article
An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing
Table 3
Key size comparison between ECC and RSA.
| S. No | ECC key size (bits) | RSA key size (bits) | Key size ratio |
| 1 | 163 | 1024 | 1 : 6 | 2 | 256 | 3072 | 1 : 12 | 3 | 384 | 7680 | 1 : 20 | 4 | 512 | 15360 | 1 : 30 |
|
|