On Elliptic Curves Cryptography Council for Innovative Research INTRODUCTION (original) (raw)

Implementation of Text Encryption using Elliptic Curve Cryptography

Procedia Computer Science, 2015

Elliptic Curve Cryptography has been a recent research area in the field of Cryptography. It provides higher level of security with lesser key size compared to other Cryptographic techniques. A new technique has been proposed in this paper where the classic technique of mapping the characters to affine points in the elliptic curve has been removed. The corresponding ASCII values of the plain text are paired up. The paired values serve as input for the Elliptic curve cryptography. This new technique avoids the costly operation of mapping and the need to share the common lookup table between the sender and the receiver. The algorithm is designed in such a way that it can be used to encrypt or decrypt any type of script with defined ASCII values.

Text Encryption with Improved Elliptic Curve Cryptography

Journal of Advances in Mathematics and Computer Science

The security of data encrypted with an encryption algorithm should be guaranteed such that it is never easy for a third party to recover the message from the encrypted data. To this effect, ECC has been a reliable option. However, the base equation that defines the security of Elliptic Curve Cryptography (ECC) is in the form of a linear equation with one unknown which is easy to solve. The ease with which this equation can be solved is a weak point in the algorithm. Thus, the aim of this research work is to improve the security of ECC by improving the nature of its base linear equation. Elliptic curve arithmetic was used to develop the improved model. The encryption process was specifically targeted and improved from single to double encryption using separate encryption constant for each round of encryption. Simulation was done using a 256 bits key size on selected number of character inputs. Java programming language was used to simulate the model on Net Beans IDE. Results of the r...

IMPLEMENTATION OF ELLIPTIC - CURVE CRYPTOGRAPHY

IAEME Publication, 2020

Elliptic curve cryptography (ECC) is a procedure to generate public key between two distant partners namely, Alice and Bob used in public key cryptography. This method is based on the algebraic structure of elliptic curves over finite fields. ECC is important in the sense that it involve keys of smaller length in comparison to other non-Elliptic curve cryptography to provide equivalent security. During this work, we implement an algorithm in python programming language to generate public key using the method of ECC.

A New Cryptosystem for Encryption and Decryption Using Ellipitic Curves in Cryptography Over Finite Fields

2018

This paper considers the use of cryptography with elliptic curves. It is presented and defined a new cryptosystem algorithm for encryption and decryption using elliptic curves with more than one secret and public keys. Furthermore, it is described the mathematical concepts related to elliptic curves, particularly the discrete logarithm problem on elliptic curves. A description of the Diffie-Hellman algorithm on elliptic curves and elliptic curve encryption algorithm with the recipients' public keys are represented.

Elliptic Curves as Tool for Public Key Cryptography

Cryptography is the technique of transforming an intelligible message into unintelligible format so that the message can't be read or understood by an unauthorized person during its transmission over the public networks. A number of cryptographic techniques have been developed over the centuries. With technological advancement, new techniques have been evolved significantly. Public key cryptography offers a great security for transmitting data over the public networks such as Internet. The popular public key cryptosystems like RSA and Diffie-Hellman are becoming slowly disappearing because of requirement of large number of bits in the encryption and decryption keys. Elliptic Curve Cryptograph (ECC) is emerging as an alternative to the existing public key cryptosystems. This paper describes the idea of Elliptic Curve Cryptography (ECC) and its implementation through two dimensional (2D) geometry for data encryption and decryption. This paper discusses the implementation of ECC over prime field. Much attention has been given on the mathematics of elliptic curves starting from their derivations.

A Survey Report On Elliptic Curve Cryptography

International Journal of Electrical and Computer Engineering (IJECE), 2011

The paper presents an extensive and careful study of elliptic curve cryptography (ECC) and its applications. This paper also discuss the arithmetic involved in elliptic curve and how these curve operations is crucial in determining the performance of cryptographic systems. It also presents different forms of elliptic curve in various coordinate system , specifying which is most widely used and why. It also explains how isogenenies between elliptic curve provides the secure ECC. Exentended form of elliptic curve i.e hyperelliptic curve has been presented here with its pros and cons. Performance of ECC and HEC is also discussed based on scalar multiplication and DLP.

Data Security Using Elliptic Curve Cryptography

Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.

IJERT-An Implementation Of Elliptic Curve Cryptography

International Journal of Engineering Research and Technology (IJERT), 2013

https://www.ijert.org/an-implementation-of-elliptic-curve-cryptography https://www.ijert.org/research/an-implementation-of-elliptic-curve-cryptography-IJERTV2IS1419.pdf The internet is slowly becoming an increasingly dangerous mode of communication for all forms of highly sensitive data. The increased dependency by individuals, institutions and corporations over the Internet to carry out critical business processes have provided a playing field for the intruders to carry out different attacks on the system and on the network. The security to critically confidential information such as personal identity information, credit card details, online transactions and e-commerce is the need of the hour which depends on top of cryptography. It is thought that RSA is a very secure cryptography algorithm and almost all software products provide advanced data encryption are designed over it. The bit length for RSA has increased over the years to make the encryption very tough, which increases the processing time and storage requirement is the real concern for today. The objective of this paper is to propose an alternative algorithm for cryptography based on mathematical objects known as elliptic curves. The proposed algorithms provide a better security with shorter bit length than RSA. Hence elliptic curve cryptography is the only solution today where better security can be achieved with a smaller key size thereby reducing the processing overhead.

An Attempt to Improve Data Security in Text Based Cryptosystem Using Elliptic Curve Cryptography

—Data can be debilitated by hackers and spies. Cryptography helps us find better approaches to secure information in digital form. Elliptic Curve Cryptography (ECC) is favorable over numerous cryptographic systems because of smaller keys and quick key generation. This paper proposes a system which intends to provide multifold security in text based communication. The system has two main modules: encryption, and decryption. Encoding scheme which works on variable length text block mapping technique has been exhibited, thereby enhancing data security provided by ECC in text based cryptosystems. To leverage the advantages of ECC, it is being used in many applications. This papers attempts to utilize ECC in text based cryptosystems efficiently.