IJERT-Analysis of Elliptic Curve Cryptography for Mobile Banking (original) (raw)

Analysis of Elliptic Curve Cryptography for Mobile Banking

International journal of engineering research and technology, 2014

The tremendous increase in the use of mobile and wireless devices with limitations on power, bandwidth and low security postulates a new generation of Public Key Cryptography (PKC) schemes. We state Elliptic curve cryptography as a PKC scheme which is capable of fulfilling those requirements. Our paper examines the use of Elliptic Curve Cryptography (ECC) in such a constrained environment along with the other two aspects of ECC, namely its security and efficiency. In the paper, the performance of ECC is evaluated by comparing its different methods of implementation to find out the most efficient solution for mobile environment considering the constraints of battery life, processing power, memory, speed, bandwidth etc. The efficient method is then tested for mobile payment application. ECC encryption and decryption is implemented and tested on user module to check whether it is capable of handling all constraints and providing high security. The implementation is divided into two par...

Elliptic Curve Cryptography and Its Applications to Mobile Devices

The explosive growth in the use of mobile and wireless devices demands a new generation of PKC schemes that has to accommodate limitations on power and bandwidth, at the same time, to provide an adequate level of security for such devices. This paper examines the use of ECC in such constrained environments and discusses the basis of its security, explores its performance and lastly, surveys the use of ECC applications on the market today.

Public Key Cryptography for Mobile Payment

Ubiquitous Computing and Communication Journal, 2010

Since the mobile systems are growing quickly, the e-commerce will change gently to m-commerce. As a result, mobile security will become the one of the most important part of mobile system and will become the hottest area facing the mobile payment due to mobile networks directness. However, the appropriate encryption scheme for mobile communication must have small amount of data calculating and quick operation as of its inherent restrictions of small quantity and low calculating ability. The objectives of this paper are to look at mobile payment and its security. Also, to explain elliptic curve with public key encryption, authentication of security wireless milieu. Compare with the RSA scheme, an elliptic curve has shorter key size, smaller signature length, low calculating, fast operations and high security working.

A Detailed Study of Elliptic Curve Cryptography Algorithm and Its Performance.

International Journal of Engineering Sciences & Research Technology, 2013

In this paper, we propose a detailed study of Elliptic Curve Cryptography Algorithm and its performance..ECC can be used with fewer keys to give more security, high speed in a less bandwidth. While these advantages make ECC propose for mobile devices, they can provide computational burden on secure web servers. In resource constrained system, Elliptic Curve Cryptography is a promising alternative for public algorithms, because it provides similar level of security with proposed shorter keys than conventional integer based public key algorithm. ECC over binary field is taken up with special interest because the operation in binary filed operation, are thought to be more in space and efficient in time. However, the software implementation of ECC over binary field are still slow, especially on low end processors, which are used in small computing devices such as sensors node, mobile phone, etc. This proposed paper, studied the Cryptography algorithms and software implementation of ECC. Firstly, while implementing ECC with software, the choice of some architectural parameters like word size may affect the choice of algorithms or not, has been examined. Also, identification of software for low-end processors has been done. In addition, this paper has examined several implements to the instruction that architecture of an 8 bit processor and studied their impact on the performance of ECC with other algorithms. ECC is well is well suited for high speeds, lower power consumption, bandwidth savings, storage efficiencies, smaller certificates and it reduces computational time and also the amount of data transmitted and stored, and strong security for low-power devices in wireless networks.

Applications of Elliptic Curve Cryptography

2015

The point of this paper is to create a basis for apply efficient encryption schemes in wireless communications and in devices with low computing power and resources. Elliptic Curve Cryptography (ECC) fits well for an efficient and secure encryption scheme. It is more efficient than the traditional integer based RSA schemes because ECC utilizes smaller key sizes for equivalent security. A comparative study of ECC with RSA is made in terms of key size, computational power, size of data files and encrypted files. Also, another aim is to design an API to implement ECC encryption /decryption algorithm.

Improving e-payment security using Elliptic Curve Cryptosystem

Electronic Commerce Research, 2010

The use of e-commerce has been associated with a lot of skepticism and apprehension due to some crimes associated with e-commerce and specifically to payment systems. The secure socket layer (SSL) protocol is trusted in this regard to secure transactions for sensitive applications like e-commerce. Unfortunately, the use of SSL protocol causes slow response time on the server which is a major cause of frustration for on-line shoppers. In this paper, we propose a secured credit-debit card payment systems based on Elliptic Curve Cryptosystem (ECC). We first examined ECC algorithm over prime fields GF(p), implement our proposed method using a typical transaction involving credit/debit card numbers and compared the performance with RSA cryptosystem. Our result shows that ECC is faster in terms of response to transaction request and occupies less memory space than equivalent RSA system. Thus, these makes it more suitable public Key cryptography scheme for application in a constraint open environment like payment system where fast operations are needed.

Elliptic Curve Cryptography-A new approach to Public Key Cryptography

Elliptic curve cryptography (ECC) is an approach to public key Cryptography based on the algebraic structure of Elliptic curves over finite field. Elliptic curves are also used in several integer factorization algorithms that have applications in cryptography. An elliptic curve in cryptography was suggested independently by Neal Koblitz and Victor S. Millar in 1985. Elliptic curve cryptography algorithms entered wide use in 2004 to 2005.Cryptography comes from Greek words meaning “hidden writing”. Cryptography converts readable data or clear text into encoded data called cipher text. By definition cryptography is the science of hiding information so that unauthorized users cannot read it. It involves Encryption and decryption of messages. Encryption is the process of converting a Plain text into cipher text and decryption is the process of getting back the original Message from the encrypted text. ECC is a newer approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields, and considered a s a marvelous technique with low key size for the use r, and hard exponential time challenge for an intruder to break into the system. In ECC a 16 0 bits key, provides the same security as RSA [1] 1024 bits key, thus lower computation f aster cryptographic power is required. The advantage of elliptic curve cryptosystems is the absence of sub exponential time algorithms, for attack. As ECC uses less key size to provide more security, and for this advantage it is used to perform operations, running on smaller chips or m ore compact software. The public key cryptography- based r emote authentication schemes are not suitable for mobile devices, because of the limitation in the bandwidth, computational strength, power availability or storage in mobile devices. Elliptic Curve cryptography is very difficult to understand by attacker because it relies on Elliptic Curve Discrete Logarithm Problem known as ECDLP. So it is difficult to break.

An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security

SN Computer Science, 2020

Security breaches have been observed in different dimensions in mobile payment system. The violation of user's privacy is a common phenomenon in mobile payment transactions. This study presents an improved security scheme for a mobile payment system using elliptic curve cryptography over a binary field with International Mobile Equipment Identity to ensure higher security. The scheme uses a payment gateway for registration and maps all input text to elliptic curve points using ASCII values. Payment details are stored on the gateway, which is encrypted but decrypted only with merchant's decryption key. The proposed scheme was evaluated in terms of key size, security strength, computational power, memory capacity, encryption and decryption time and mobile phone battery. The result shows that the scheme provides integrity, confidentiality and privacy. The result also shows that the proposed scheme is time-efficient and computationally inexpensive for resourceconstrained environment like mobile payment system.

ELLIPTIC CURVE BASED SECURE MESSAGING SYSTEM

In this paper, an implementation of a secure messaging system based on Elliptic Curve Cryptography (ECC) is presented. Elliptic curve cryptography provides a methodology for obtaining high-speed, efficient, and scalable implementations of a messaging system. In this paper, we describe in detail the working and implementation of elliptic curve cryptographic techniques, and the results of our implementation of the elliptic curve cryptography and finally we will compare our results with the rival of ECC i.e., RSA [2]. Elliptic Curve cryptography is an emerging public key cryptosystem which provides the same degree of security as systems used in Secure Socket Layers (SSL) today with approximately one-eighth the key size [4]. This results in bandwidth savings, efficient implementation and compactness in silicon without any effect on security as compared to its rival, RSA [2]. We have used ECC for key exchange and Advance Encryption Standard (AES) for encryption. The implementation of ECC is based on polynomial representation of National Institute of Standards and Technology (NIST) approved curves over binary field. The system is developed using a host of available tools and libraries, meeting the prime requirements of ease of use. The developed system can easily be adapted to meet the need of any organization. With such attributes, the technology becomes especially useful for mobile devices and other small devices that are limited in the power, CPU performance, memory or bandwidth.