Text Encryption with Improved Elliptic Curve Cryptography (original) (raw)

Implementation of Text Encryption using Elliptic Curve Cryptography

Procedia Computer Science, 2015

Elliptic Curve Cryptography has been a recent research area in the field of Cryptography. It provides higher level of security with lesser key size compared to other Cryptographic techniques. A new technique has been proposed in this paper where the classic technique of mapping the characters to affine points in the elliptic curve has been removed. The corresponding ASCII values of the plain text are paired up. The paired values serve as input for the Elliptic curve cryptography. This new technique avoids the costly operation of mapping and the need to share the common lookup table between the sender and the receiver. The algorithm is designed in such a way that it can be used to encrypt or decrypt any type of script with defined ASCII values.

An Attempt to Improve Data Security in Text Based Cryptosystem Using Elliptic Curve Cryptography

—Data can be debilitated by hackers and spies. Cryptography helps us find better approaches to secure information in digital form. Elliptic Curve Cryptography (ECC) is favorable over numerous cryptographic systems because of smaller keys and quick key generation. This paper proposes a system which intends to provide multifold security in text based communication. The system has two main modules: encryption, and decryption. Encoding scheme which works on variable length text block mapping technique has been exhibited, thereby enhancing data security provided by ECC in text based cryptosystems. To leverage the advantages of ECC, it is being used in many applications. This papers attempts to utilize ECC in text based cryptosystems efficiently.

On Elliptic Curves Cryptography Council for Innovative Research INTRODUCTION

2013

Elliptic curve cryptography is an asymmetric key cryptography. The points on two dimensional elliptic curve are used for declaration of data encryption & decryption. It include public key generation on the elliptic curve and private key generation to decrypt the data. The present paper deals with an overview of Elliptic curve cryptography (ECC) and its implementation through coordinate geometry for data encryption. We introduce a new approach in the form of cardan's method to find points on X axis at elliptic curve over finite field and form public key cryptographic system and finally we define two dimensional alphabetic table and description in the form of algorithm to use it for plain text encryption.

REVIEW OF CRYPTOGRAPHY WITH ECC ENCRYPTION SCHEME

This paper represent the basic idea of elliptic curve cryptography. Cryptography is the art of hiding information so the network security can be arranged. We explain the communication between cryptography and elliptic curve.ECC uses the public key to give high security and high speed.ECC is very helpful cryptography techniques with implementation of AES and MD5 algorithms. In our study we will we will growth the Rivest ciper with elliptic curve cryptography along with message summary and leading encryption usual techniques.

Data Security Using Elliptic Curve Cryptography

Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.

An Enhanced Elliptic Curve Cryptosystem for Securing Data

International Journal of Computer Applications, 2018

The purpose of this research is to enhance the cryptographic system called the Elliptic Curve. Elliptic Curve cryptosystem (ECC) is a technique of public-key encryption, which is rooted on the arithmetical construction of elliptic curves over finite fields. Elliptic Curve Cryptographic System necessitates smaller keys compared to non-ECC cryptography to offer equal security. The security of RSA is based on the computational task of considering extensive numbers leading to an increase in encryption computation time, slower connection of the SSL handshake and increase in CPU usage during handshakes. Therefore, there should be a new way of solving this problem, which is ECC encryption. Elliptic curves are effective for digital signatures, key agreement, generators, pseudo-random and other related tasks. The first phase of the project involves understanding the key exchange of Diffie-Hellman and applying the properties of the Elliptic Curves. It is terminated with key facts that the Elliptic Curve Cryptography has a shorter key length, saves bandwidth, which facilitates key generation during the encryption/decryption of data, also the assurance of faster encryption and decryption, and notwithstanding its efficiency and efficacy in small devices.

Proposing an Elliptic Curve Cryptosystem with The Symmetric Key for Vietnamese Text Encryption and Decryption

International Journal of Advanced Trends in Computer Science and Engineering, 2020

The article describes the basic idea of Elliptic curve cryptography (ECC). Elliptic curve arithmetic can be used to develop Elliptic curve coding schemes, including key exchange, encryption, and digital signature. The main attraction of Elliptic curve cryptography compared to RSA is that it provides equivalent security for a smaller key size, which reduces processing costs. To encode the Vietnamese text, we are based on the sound of Vietnamese characters to make a table of these characters' order. We are also based on the algorithm to create the data sequence as the basis of building an encryption algorithm by using Elliptic curves on finite fields with symmetric keys to encrypt this Vietnamese text.

A Detailed Study of Elliptic Curve Cryptography Algorithm and Its Performance.

International Journal of Engineering Sciences & Research Technology, 2013

In this paper, we propose a detailed study of Elliptic Curve Cryptography Algorithm and its performance..ECC can be used with fewer keys to give more security, high speed in a less bandwidth. While these advantages make ECC propose for mobile devices, they can provide computational burden on secure web servers. In resource constrained system, Elliptic Curve Cryptography is a promising alternative for public algorithms, because it provides similar level of security with proposed shorter keys than conventional integer based public key algorithm. ECC over binary field is taken up with special interest because the operation in binary filed operation, are thought to be more in space and efficient in time. However, the software implementation of ECC over binary field are still slow, especially on low end processors, which are used in small computing devices such as sensors node, mobile phone, etc. This proposed paper, studied the Cryptography algorithms and software implementation of ECC. Firstly, while implementing ECC with software, the choice of some architectural parameters like word size may affect the choice of algorithms or not, has been examined. Also, identification of software for low-end processors has been done. In addition, this paper has examined several implements to the instruction that architecture of an 8 bit processor and studied their impact on the performance of ECC with other algorithms. ECC is well is well suited for high speeds, lower power consumption, bandwidth savings, storage efficiencies, smaller certificates and it reduces computational time and also the amount of data transmitted and stored, and strong security for low-power devices in wireless networks.

The comparison of several cryptosystems using the elliptic curve: a report

International Journal of Electrical and Computer Engineering (IJECE), 2024

The elliptic curve cryptosystem (ECC) has several applications in Information Security, especially in cryptography with two main activities including encrypting and decrypting. There were several solutions of different research teams which propose various forms of the elliptic curve cryptosystem on cryptographic sector. In the paper, we proposed a solution for applying the elliptic curve on cryptography which is based on these proposals as well as basic idea about the elliptic curve cryptosystem. We also make comparison between our proposal and other listed solution in the same application of the elliptic curve for designing encryption and decryption algorithms. The comparison results are based on parameters such as time consumption (t), RAM consumption (MB), source code size (Bytes), and computational complexity.

A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY USING CHARACTER CONVERSION METHOD

In the recent years, elliptic curve cryptography (ECC) has gained widespread exposure and acceptance and has already been include in many security standards. It is widely recognized that data security will play a central role in the design of future IT system. Elliptic key cryptography recently gained lot of attention in industries when we talk about security. This paper discusses the basic operation how ECC is more secure than other public key cryptosystems and also how security can be enhanced in ECC by using Character-Conversion-Method.