SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 708
A New Security Level for Elliptic Curve Cryptosystem
Using Cellular Automata Rules
Fatima Amounas
R.O.I Group, Computer Sciences Department
Moulay Ismaïl University,
Faculty of Sciences and Technics,
Errachidia, Morocco.
El Hassan El Kinani
A.A Group, Mathematical Department
Moulay Ismaïl University,
Faculty of Sciences and Technics,
Errachidia, Morocco.
Abstract: Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
Keywords: Cryptography, Elliptic curve, Cellular automata, Matrix, Scrambling technique, Encryption, Decryption.
1. INTRODUCTION
Security is the important factor in the public network and
cryptography play an important role in this field.
Cryptography is an old art of sending secret messages
between sender and receiver. With the advancement of
internet technologies, cryptography becomes a crucial
aspect for secure communications to protect important
data from eavesdroppers. In fact, cryptography is the
science of devising methods that allow information to be
sent in a secure form in such a way that the only person able
to retrieve this information is the intended recipient.
Cryptography is broadly divided into two categories
depending upon the key, which is defined as the rules used to
convert an original text into encrypted text: - Symmetric Key
Encryption and Asymmetric Key Encryption. Symmetric
Key Encryption uses the same key for encryption and
decryption processes. This technique is simple yet
powerful but key distribution is the chief problem that
needs to be addressed Whereas, Asymmetric Key
Encryption use two mathematically associated keys: Public
Key & Private Key for encryption. The public key is available
to everyone but the data once encrypted by public key of any
user can only be decrypted by private key of that
particular user.
Elliptic curve cryptography is effective security solution to
provide secure communication. Elliptic curve cryptography
transforms a mathematical problem in to an applicable
computer algorithm. Intractable problems are the center of
public key cryptography and bring computationally
demanding operations into a cryptosystem. Elliptic curve
cryptography (ECC) is based upon the algebraic structure of
elliptic curves over finite field. Elliptic curve cryptography is
the most efficient public key encryption scheme based on
elliptic curve concepts that can be used to create faster,
smaller, and efficient cryptographic keys. As result
researchers are engaged to develop different cryptographic
techniques based ECC to enhance network security [1, 2, 3].
Recently, more applications propose to use the elliptic curve
in encryption process and improve their efficiency using
cellular automata [4, 5]. In our previous works [6, 7, 8, 9], we
have proposed cryptographic algorithm for text encryption
using elliptic curve. Basically this paper is proposing a new
encryption algorithm based ECC using the concept of cellular
automata. Finally, expected results are showing the
performance of the proposed algorithm.
The rest of the paper is structured as follows. Section 2 gives
detailed description of commonly employed security concepts
and terminology. In particular, we present basic idea of
elliptic curve cryptography. Section 3 a detailed description of
Cellular automata is presented. In section 4, the proposed
method is introduced. A detailed example is presented that
outlines the working procedure of the proposed method in
section 5. Section 6 presents an implementation of ECCCA
for encryption/decryption process, using Visual Basic as the
implementation tool. Section 7 concludes the paper.
2. CRYPTOGRAPHIC TERMINOLOGY
In this section, we introduce some basics security
terminologies and concepts connected with cryptography. A
message present in a clear form, which can be understood by
any casual observer, is known as the plaintext. The encryption
process converts the plaintext to a form that hides the meaning
of the message from everyone except the valid
communicating parties, and the result is known as the cipher
text. Decryption is the inverse of encryption. The processes
of encryption and decryption are controlled on a quantity
known as the key, which is ideally known only to the valid
users. Strength of a security scheme depends on the secrecy of
the keys used.
A security protocol formally specifies a set of steps to be
followed by communicating parties, so that the mutually
desired security objectives are satisfied. The four main
security objectives include:
International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 709
- Confidentiality: This means that the secrecy of the data
being exchanged by the communicating parties is maintained,
i.e., no one other than the legitimate parties should know
the content of the data being exchanged.
- Authentication: It should be possible for the receiver to
ensure that the sender of the message is who he claims to be,
and the message was sent by him.
- Integrity: It provides a means for the receiver of a
message to verify that the message was not altered in
transit. It checks originality of message.
- Non-repudiation: The sender of a message should not be
able to falsely deny later that he sent the message, and
this fact should be verifiable independently by an
independent third-party without knowing too much about
the content of the disputed message(s).
Security protocols realize the security objectives through the
use of appropriate cryptographic algorithms. Security
objectives thus provide trust on the Web. They are realized
through the use of cryptographic algorithms which are
divided into two categories depending on their characteristics:
Symmetric algorithms and Asymmetric algorithms.
2.1 Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) was first
introduced by Victor Miller and Neil Koblitz in 1985. The
principal attraction of ECC compared to RSA is that it offers
equal security for a far smaller key size, thereby
reducing processing overhead [10]. The advantage of ECC
over other public key cryptography techniques such as RSA
is that the best known algorithm for solving ECDLP the
underlying hard mathematical problem in ECC takes the
fully exponential time and so far there is a lack of sub
exponential attack on ECC. ECC is based on the
Discrete Logarithmic problem over the points on an
elliptic curve [11].
2.2 Mathematics Background of ECC
Let E be an elliptic curve over Fp, given by an affine
Weierstrass equation of the form:
E: y2
= x3
+ax+b (1)
with coefficients a, b Fp such that 4a3
+27b2
 0. We recall
that the set E(Fp) of points of any elliptic curve E in affine Fp-
valued coordinates form an Abelian group (with a point at
infinity denoted by  as the neutral element).
To encrypt a message, Alice and Bob decide on an
elliptic curve and take a affine point (P) that lies on the
curve. Plaintext M is encoded into a point PM. Alice chooses
a random prime integer nA and Bob chooses a random
prime integer nB. nA and nB are Alice and Bob’s private
key respectively. To generate the public key,
Alice computes,
PA= nAP
and Bob Computes.
PB= nBP
To encrypt a message point PM for Bob, Alice chooses
another random integer named k and computes the
encrypted message PC using Bob’s Public key (PB). PC is a
pair of points:
PC= [(kP), (PM+kPB)]
Alice Sends PC to Bob as a cipher message. Bob, receiving
the encrypted message PC and using his private key, nB,
multiplying with kP and add with second point in the
encrypted message to compute PM, which is corresponding
to the plaintext message M,
PM= (PM+kPB) -[ nB (kP)]
Addition operation for two points P( 1x , 1y ) and Q
( 2x , 2y ) over an elliptic group, if P+Q= ( 3x , 3y ) is
given by (2) and (3) and the parameter s is calculated by
(4):
pxxsx mod21
2
3  (2)
pyxxsy mod)( 1313  (3)
12
12
xx
yy


if PQ
s= (4)
1
2
1
2
3
y
ax  if PQ
Multiplication kP over an elliptic group is computed by
repeating the addition operation k times [12, 13]. The
strength of an ECC-based cryptosystem is depends on
difficulty of finding the number of times that P is added to
itself to get Q=kP. Reverse operation known as Elliptic Curve
Discrete Logarithm Problem (ECDLP).
3. CELLULAR AUTOMATA
Cellular Automata (CA) is a discrete computing model which
provides simple, flexible and efficient platform for simulating
complicated systems and performing complex computation
based on the neighborhood’s information. CA consists of two
components 1) a set of cells and 2) a set of rules. Researchers,
scientists and practitioners from different fields have
exploited the CA paradigm for modelling different
applications [14, 15].
A cellular automaton consists of a graph where each node is a
cell. The state of each cell is updated simultaneously at
discrete time steps, based on the states in its
neighborhood at the preceding time step. The algorithm
used to compute the next cell state is referred to as the
CA local rule.
International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 710
Figure 1. Model Diagram of Encryption Technique.
For 2-state 3-neighborhood cellular automata there are 23
=8
distinct neighbourhood configurations and 28
=256 distinct
mappings from all these neighbourhood configurations to the
next state, each mapping representing a CA rule [16].
A cellular automaton (CA) is a dynamic system defined by the
following 4-tuple: dimension, set of finite states,
neighborhood and set of rules. Dimension defines number of
cells. Cells are updated accordingly to some rule. Such rule is
based on the state of the cell and the neighborhood [17, 18].
Figure 2 shows two typical neighborhood options (a) Von
Neumann Neighborhood (b) Moore Neighborhood.
Figure 2. (a) Von Neumann Neighborhood (b) Moore Neighborhood
By applying the transition rule the current state of CA moves
to new state by considering the neighborhood states.
For example:
- Rule 90:
- Rule 153:
4. PROPOSED METHOD
A new encryption method based ECC using cellular
automata is presented in Figure 1. This method tries to use
some asymmetric algorithm to encrypt or decrypt data using
elliptic curve. The proposed scheme noted ECCCA combines
the advantage of Automata theory and asymmetric encryption
based ECC into a total scheme. The overall module design
shows the different levels of security used (Figure 1).
In the proposed system, the first level of security starts with
ECC technique, where the plaint text is used as the set of
points to encrypt [19, 20, 21]. In this work, the resulting
output is sent to the next process based cellular automata. In
fact, the encrypted message is scrambled using the principle of
spiral rotation. The proposed method explains the usage of
second level of security using cellular automata since one
level of security is not enough.
Let CA be the Cellular Automata, which used to scramble
secure key applying the Local Rule.
4.1 Encryption procedure
The encryption is done through the following steps:
Step 1: start
Step 2: Divide the plain text into blocks of characters and
embed the characters in into points on elliptic curve.
Step 3: Generate randomly one number d. Then, Compute Kd
and Ke, which serve as secure keys (e is the x-coordinate of
Kd).
Step 4: Generate a cellular automata rule and convert the
compressed key to binary form.
Step 5: Select b=bit (j), where j is bit position (LSBMSB),
which decides which operation has to be performed.
If b = 0  compute Qi=Mi + Kd
If b=1  Compute Qi= Mi + Kd + Ke.
International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 711
Step 6: Convert the result blocks into binary sequence and
generate a compressed blocks by using CA technique.
Step 7: Arrange the first bit of all the blocks in the first row
and second bits of all block in the second row and continuing
this process arrange the remaining bit of all the blocks in the
corresponding row of matrix.
Step 8: Apply spiral technique to scramble the data matrix and
to get the cipher text.
Step 9: Stop
4.2 Decryption procedure
The decryption process involves converting the encrypted data
back to its original form for the receiver’s understanding. The
cipher text is decrypted using the reverse process of the
technique explained in encryption algorithm. The steps in
decryption algorithm are as follows:
Step 1. start
Step 2. Divide the cipher text to blocks and the bits are
arranged into a square matrix.
Step 3. Generate a reversible transition rule. Convert the
compressed blocks to a normal form using reversible CA rule.
Step 4. Apply the corresponding reversible principle of spiral
process.
Step 5. Defuse it to get the encrypted points on elliptic curve.
Step 6. Find the equivalent characters by decrypting each
point.
Step 7. Accumulate characters to form the secret message.
Step 8. Stop.
5. EXPLANATION WITH EXAMPLE
We have following example on which we have applied our
new encryption algorithm ECCCA, the explanation has been
provided below.
For the system parameters, we used the following data:
- p and n: two prime numbers (p=29 , n=31).
- E29 (-1, 16) an elliptic curve defined on finite field F29.
- P (5, 7): a point on elliptic curve E with order n.
- Key values:
k= 19 and PB=(16, 6).
d=13 and PA=(7, 27).
Kd = (5,22) and Ke= (6, 20).
- CA Rule chosen: ‘90’
Phase 1:
Plain Text: “ENCRYPTION”
Charact
er
Point on
EC
Bit selected
Encrypted
point Qi
E (6,20) 1 (23, 3)
N (1, 4) 0 (7, 27)
C (18, 1) 1 (2, 14)
R (7, 25) 0 (1, 25)
Y (13,24) 1 (28, 25)
P (0, 25) 0 (0, 4)
T (14, 7) 0 (2, 15)
I (23, 3) 1 (21, 11)
O (0, 4) 1 (16, 6)
N (1, 4) 0 (7, 27)
Phase2:
Therefore, the final encrypted text is compressed as follow:
01011011000001110100111001100111010001.
This algorithm compresses the data to reduce its length
without compromising the compression efficiency and the
information security.
1 0 0 0 1 0 0 1 1 0
0 0 0 0 1 0 0 0 0 0
1 1 0 0 1 0 0 1 0 1
1 1 1 0 0 0 1 0 0 1
1 1 0 1 0 0 0 1 0 1
0 1 0 1 1 0 0 0 0 1
0 1 1 1 1 0 1 1 0 1
0 0 1 0 0 1 1 0 1 0
1 1 1 0 0 0 1 1 1 1
1 1 0 1 1 0 1 1 0 1
1 0 0 0 1 0 0 1 1 0
0 1 1 1 1 1 0 1 1 0
1 1 0 1 1 0 1 1 1 0
0 0 1 1 1 0 0 0 0 1
0 0 0 0 0 0 0 0 0 1
1 1 1 0 0 0 1 1 0 1
1 1 1 1 0 0 1 0 0 1
0 1 0 1 0 1 1 0 0 1
1 0 0 1 0 0 0 1 0 0
1 0 1 1 1 1 0 0 0 1
International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 712
6. RESULTS
In this section we proceed with our implementation using
Visual Basic as tool. Winsock Control has been used for
connecting two systems. Messages are transmit from user A to
user B when a socket is created. In our implementation, we
have used the curve E29 (-1, 16) in entire process.
Figure 3. Shows the Key generated using CAT
Figure 4. Encryption process
Figure 5. Decryption process
7. CONCLUSION
In this paper, we introduced the concept of cellular
automata as a promising approach to enhance the security
of the elliptic curve cryptosystem. By using two different
levels of security, the transmitted message is much secure as
compared to simple encryption method. From the above
results it is clearly found that the security against few
Attacks have been enhanced. Thus the proposed work of
joining the elliptic curve cryptography and Cellular
Automata has desirably increased the security level of the
encrypted data. Our algorithm, being based on concept of
CA, helps scrambling process due to rule-90. The Strength of
the algorithm due to the difficulty level used in secure key
generated. In fact, Cellular Automata is the strengthen
method to generate strong keys. Also integration of elliptic
curve cryptosystems and the concept of cellular automata has
improved the security level provided by ECCCA. Therefore, it
can be consider as a good alternative to some applications. In
future, we are interested to extend the proposed system to
image encryption and multimedia encryption.
8. REFERENCES
[1] M Shanmugasundaram and R Shanmugasundaram,
“Elliptic Curve Cryptography (ECC) for Security in
Mobile Communication”, European Journal of Advances
in Engineering and Technology, 1(2), 93-101, 2014.
[2] Moncef Amara and Amar Siad, “Elliptic Curve
Cryptography and its Applications”, 7th International
Workshop on Systems, Signal Processing and their
Applications (WOSSPA), 2011.
[3] Ikshwansu Nautiyal, Madhu Sharma, “Encryption using
Elliptic Curve Cryptography using Java as
Implementation tool”, International Journal of Advanced
Research in Computer Science and Software Engineering
4 (1), pp. 620-625, 2014.
International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 713
[4] MD Sadiq and Bhupalam Harish Kumar, “Efficient
Cryptography using Cellular Automata Rules”,
International Journal of Emerging Engineering Research
and Technology, Vol 3, Issue 12, 2015.
[5] Warakorn Srichavengsup and Wimol San-Um, “Data
Encryption Scheme Based on Rules of Cellular Automata
and Chaotic Map Function for Information Security”,
International Journal of Network Security, Vol.18, No.6,
pp.1130-1142, 2016.
[6] F.Amounas and E.H. El Kinani, ”Elliptic curve digital
signature algorithm using boolean permutation based
ECC”, International Journal of Information & Network
Security, vol. 1, no. 3, pp. 216-222, 2012.
[7] F.Amounas and E.H. El Kinani, ”An efficient elliptic
curve cryptography protocol based on matrices,
”International Journal of Engineering Inventions, vol. 1,
no. 9, pp. 49-54, 2012.
[8] F.Amounas, E.H. El Kinani and H.sadki, ” An Efficient
Signcryption Scheme based on The Elliptic Curve
Discrete Logarithm Problem”, International Journal of
Information & Network Security, vol. 2, no. 3, pp. 253-
259, 2013.
[9] F.Amounas, “Efficient methodology for Encrypting
Amazigh Alphabet using Modified Knapsack Algorithm
based ECC ", International Journal on Recent and
Innovation Trends in Computing and Communication
vol. 4, Issue 3, pp. 502-506, 2016.
[10] Andrej Dujella “Applications of elliptic curves in
public key cryptography”, Basque Center for Applied
Mathematics and Universidad del Pais Vasco / Euskal
HerrikoUnibertsitatea, Bilbao, 2011.
[11] Lokesh Giripunje and Sonali Nimbhorkar,
“Comprehensive Security System for Mobile Network
Using Elliptic Curve Cryptography over GF (p)”, Vol 3,
Issue 5, 2013.
[12] D. Sravana Kumar, CH. Suneetha and A. Chandrasekhar,
“Encryption of data using Elliptic Curve over Finite
Field”, International Journal of Distributed and Parallel
Systems, Vol. 3, No. 1, 2012.
[13] Sonali U. Nimbhorkar, and Dr. L. G. Malik “A Survey
On Elliptic Curve Cryptography (ECC)” International
Journal of Advanced Studies in Computers, Science and
Engineering, vol.1 ,issue 1 pp. 1-5, 2012.
[14] M Phani Krishna Kishore, S Kanthi Kiran, B Bangaru
Bhavya and S Harsha Chaitanya S, “A Novel Encryption
System using Layered Cellular Automata”, Proceedings
of the world congress on Engineering, Vol 1, 2011.
[15] G.Shanmugasundaram, P.Thiyagarajan and S.Pavithra,
“A Novel DNA Encryption System using Cellular
Automata”, International Journal of Security, Privacy and
Trust Management, Vol 4, No 3/4, 2015.
[16] G. S. Khedkar, A.O. Amalkar and S.S.Tawani, “An
Efficient Implementation of Cryptographic Algorithm
Using High Speed Cellular Automata Techniques”,
International Journal of Engineering Research and
Applications, Vol. 2, Issue 3, 2012.
[17] M. Tomassini and M. Sipper, “On the Generation of
High-Quality Random Numbers by Two-Dimensional
Cellular Automata”, IEEE Trans. on Computers, vol. 49,
No.10, pp. 1140-l151, 2000.
[18] Petre Anghelescu, SilviuIonitaand EmilSofron “Block
Encryption Using Hybrid Additive Cellular Automata,”
Seventh International Conference on Hybrid Intelligent
Systems, pp. 132- 137, 2007.
[19] F.Amounas, E.H. El Kinani, and A. Chillali, ”An
application of discrete algorithms in asymmetric
cryptography”, International Mathematical Forum, vol. 6,
no. 49, pp. 2409-2418, 2011.
[20] F.Amounas and E.H. El Kinani, ” Fast Mapping
Method based on Matrix Approach For Elliptic
Curve Cryptography”, International Journal of
Information & Network Security, vol. 1, no. 2, pp. 54-59,
2012.
[21] Laiphrakpam Dolendro Singh and Khumanthem
Manglem Singh, “Implementation of Text Encryption
using Elliptic Curve Cryptography”, International Multi-
Conference on Information Processing-2015, Procedia
Computer Science 54 , pp: 73- 82, 2015.

More Related Content

What's hot

NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networksIJECEIAES
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable EncryptionNagendra Posani
 
A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)Alexander Decker
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural networkMahira Banu
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
 

What's hot (20)

NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable Encryption
 
A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
D017433134
D017433134D017433134
D017433134
 
Security and Cryptography
Security and CryptographySecurity and Cryptography
Security and Cryptography
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural network
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
 
Ijnsa050213
Ijnsa050213Ijnsa050213
Ijnsa050213
 

Similar to A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata Rules

A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmAlexander Decker
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
A hybrid security and compressive sensing based sensor data gathering scheme
A hybrid security and compressive sensing based sensor data gathering schemeA hybrid security and compressive sensing based sensor data gathering scheme
A hybrid security and compressive sensing based sensor data gathering schemeredpel dot com
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Pvrtechnologies Nellore
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYQualcomm
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
 
Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodesSelva Raj
 

Similar to A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata Rules (20)

C0281010016
C0281010016C0281010016
C0281010016
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
A hybrid security and compressive sensing based sensor data gathering scheme
A hybrid security and compressive sensing based sensor data gathering schemeA hybrid security and compressive sensing based sensor data gathering scheme
A hybrid security and compressive sensing based sensor data gathering scheme
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
 

More from Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in EducationEditor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata Rules

  • 1. International Journal of Computer Applications Technology and Research Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656 www.ijcat.com 708 A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata Rules Fatima Amounas R.O.I Group, Computer Sciences Department Moulay Ismaïl University, Faculty of Sciences and Technics, Errachidia, Morocco. El Hassan El Kinani A.A Group, Mathematical Department Moulay Ismaïl University, Faculty of Sciences and Technics, Errachidia, Morocco. Abstract: Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over insecure channel. The results are provided to show the encryption performance of the proposed method. Keywords: Cryptography, Elliptic curve, Cellular automata, Matrix, Scrambling technique, Encryption, Decryption. 1. INTRODUCTION Security is the important factor in the public network and cryptography play an important role in this field. Cryptography is an old art of sending secret messages between sender and receiver. With the advancement of internet technologies, cryptography becomes a crucial aspect for secure communications to protect important data from eavesdroppers. In fact, cryptography is the science of devising methods that allow information to be sent in a secure form in such a way that the only person able to retrieve this information is the intended recipient. Cryptography is broadly divided into two categories depending upon the key, which is defined as the rules used to convert an original text into encrypted text: - Symmetric Key Encryption and Asymmetric Key Encryption. Symmetric Key Encryption uses the same key for encryption and decryption processes. This technique is simple yet powerful but key distribution is the chief problem that needs to be addressed Whereas, Asymmetric Key Encryption use two mathematically associated keys: Public Key & Private Key for encryption. The public key is available to everyone but the data once encrypted by public key of any user can only be decrypted by private key of that particular user. Elliptic curve cryptography is effective security solution to provide secure communication. Elliptic curve cryptography transforms a mathematical problem in to an applicable computer algorithm. Intractable problems are the center of public key cryptography and bring computationally demanding operations into a cryptosystem. Elliptic curve cryptography (ECC) is based upon the algebraic structure of elliptic curves over finite field. Elliptic curve cryptography is the most efficient public key encryption scheme based on elliptic curve concepts that can be used to create faster, smaller, and efficient cryptographic keys. As result researchers are engaged to develop different cryptographic techniques based ECC to enhance network security [1, 2, 3]. Recently, more applications propose to use the elliptic curve in encryption process and improve their efficiency using cellular automata [4, 5]. In our previous works [6, 7, 8, 9], we have proposed cryptographic algorithm for text encryption using elliptic curve. Basically this paper is proposing a new encryption algorithm based ECC using the concept of cellular automata. Finally, expected results are showing the performance of the proposed algorithm. The rest of the paper is structured as follows. Section 2 gives detailed description of commonly employed security concepts and terminology. In particular, we present basic idea of elliptic curve cryptography. Section 3 a detailed description of Cellular automata is presented. In section 4, the proposed method is introduced. A detailed example is presented that outlines the working procedure of the proposed method in section 5. Section 6 presents an implementation of ECCCA for encryption/decryption process, using Visual Basic as the implementation tool. Section 7 concludes the paper. 2. CRYPTOGRAPHIC TERMINOLOGY In this section, we introduce some basics security terminologies and concepts connected with cryptography. A message present in a clear form, which can be understood by any casual observer, is known as the plaintext. The encryption process converts the plaintext to a form that hides the meaning of the message from everyone except the valid communicating parties, and the result is known as the cipher text. Decryption is the inverse of encryption. The processes of encryption and decryption are controlled on a quantity known as the key, which is ideally known only to the valid users. Strength of a security scheme depends on the secrecy of the keys used. A security protocol formally specifies a set of steps to be followed by communicating parties, so that the mutually desired security objectives are satisfied. The four main security objectives include:
  • 2. International Journal of Computer Applications Technology and Research Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656 www.ijcat.com 709 - Confidentiality: This means that the secrecy of the data being exchanged by the communicating parties is maintained, i.e., no one other than the legitimate parties should know the content of the data being exchanged. - Authentication: It should be possible for the receiver to ensure that the sender of the message is who he claims to be, and the message was sent by him. - Integrity: It provides a means for the receiver of a message to verify that the message was not altered in transit. It checks originality of message. - Non-repudiation: The sender of a message should not be able to falsely deny later that he sent the message, and this fact should be verifiable independently by an independent third-party without knowing too much about the content of the disputed message(s). Security protocols realize the security objectives through the use of appropriate cryptographic algorithms. Security objectives thus provide trust on the Web. They are realized through the use of cryptographic algorithms which are divided into two categories depending on their characteristics: Symmetric algorithms and Asymmetric algorithms. 2.1 Elliptic Curve Cryptography Elliptic Curve Cryptography (ECC) was first introduced by Victor Miller and Neil Koblitz in 1985. The principal attraction of ECC compared to RSA is that it offers equal security for a far smaller key size, thereby reducing processing overhead [10]. The advantage of ECC over other public key cryptography techniques such as RSA is that the best known algorithm for solving ECDLP the underlying hard mathematical problem in ECC takes the fully exponential time and so far there is a lack of sub exponential attack on ECC. ECC is based on the Discrete Logarithmic problem over the points on an elliptic curve [11]. 2.2 Mathematics Background of ECC Let E be an elliptic curve over Fp, given by an affine Weierstrass equation of the form: E: y2 = x3 +ax+b (1) with coefficients a, b Fp such that 4a3 +27b2  0. We recall that the set E(Fp) of points of any elliptic curve E in affine Fp- valued coordinates form an Abelian group (with a point at infinity denoted by  as the neutral element). To encrypt a message, Alice and Bob decide on an elliptic curve and take a affine point (P) that lies on the curve. Plaintext M is encoded into a point PM. Alice chooses a random prime integer nA and Bob chooses a random prime integer nB. nA and nB are Alice and Bob’s private key respectively. To generate the public key, Alice computes, PA= nAP and Bob Computes. PB= nBP To encrypt a message point PM for Bob, Alice chooses another random integer named k and computes the encrypted message PC using Bob’s Public key (PB). PC is a pair of points: PC= [(kP), (PM+kPB)] Alice Sends PC to Bob as a cipher message. Bob, receiving the encrypted message PC and using his private key, nB, multiplying with kP and add with second point in the encrypted message to compute PM, which is corresponding to the plaintext message M, PM= (PM+kPB) -[ nB (kP)] Addition operation for two points P( 1x , 1y ) and Q ( 2x , 2y ) over an elliptic group, if P+Q= ( 3x , 3y ) is given by (2) and (3) and the parameter s is calculated by (4): pxxsx mod21 2 3  (2) pyxxsy mod)( 1313  (3) 12 12 xx yy   if PQ s= (4) 1 2 1 2 3 y ax  if PQ Multiplication kP over an elliptic group is computed by repeating the addition operation k times [12, 13]. The strength of an ECC-based cryptosystem is depends on difficulty of finding the number of times that P is added to itself to get Q=kP. Reverse operation known as Elliptic Curve Discrete Logarithm Problem (ECDLP). 3. CELLULAR AUTOMATA Cellular Automata (CA) is a discrete computing model which provides simple, flexible and efficient platform for simulating complicated systems and performing complex computation based on the neighborhood’s information. CA consists of two components 1) a set of cells and 2) a set of rules. Researchers, scientists and practitioners from different fields have exploited the CA paradigm for modelling different applications [14, 15]. A cellular automaton consists of a graph where each node is a cell. The state of each cell is updated simultaneously at discrete time steps, based on the states in its neighborhood at the preceding time step. The algorithm used to compute the next cell state is referred to as the CA local rule.
  • 3. International Journal of Computer Applications Technology and Research Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656 www.ijcat.com 710 Figure 1. Model Diagram of Encryption Technique. For 2-state 3-neighborhood cellular automata there are 23 =8 distinct neighbourhood configurations and 28 =256 distinct mappings from all these neighbourhood configurations to the next state, each mapping representing a CA rule [16]. A cellular automaton (CA) is a dynamic system defined by the following 4-tuple: dimension, set of finite states, neighborhood and set of rules. Dimension defines number of cells. Cells are updated accordingly to some rule. Such rule is based on the state of the cell and the neighborhood [17, 18]. Figure 2 shows two typical neighborhood options (a) Von Neumann Neighborhood (b) Moore Neighborhood. Figure 2. (a) Von Neumann Neighborhood (b) Moore Neighborhood By applying the transition rule the current state of CA moves to new state by considering the neighborhood states. For example: - Rule 90: - Rule 153: 4. PROPOSED METHOD A new encryption method based ECC using cellular automata is presented in Figure 1. This method tries to use some asymmetric algorithm to encrypt or decrypt data using elliptic curve. The proposed scheme noted ECCCA combines the advantage of Automata theory and asymmetric encryption based ECC into a total scheme. The overall module design shows the different levels of security used (Figure 1). In the proposed system, the first level of security starts with ECC technique, where the plaint text is used as the set of points to encrypt [19, 20, 21]. In this work, the resulting output is sent to the next process based cellular automata. In fact, the encrypted message is scrambled using the principle of spiral rotation. The proposed method explains the usage of second level of security using cellular automata since one level of security is not enough. Let CA be the Cellular Automata, which used to scramble secure key applying the Local Rule. 4.1 Encryption procedure The encryption is done through the following steps: Step 1: start Step 2: Divide the plain text into blocks of characters and embed the characters in into points on elliptic curve. Step 3: Generate randomly one number d. Then, Compute Kd and Ke, which serve as secure keys (e is the x-coordinate of Kd). Step 4: Generate a cellular automata rule and convert the compressed key to binary form. Step 5: Select b=bit (j), where j is bit position (LSBMSB), which decides which operation has to be performed. If b = 0  compute Qi=Mi + Kd If b=1  Compute Qi= Mi + Kd + Ke.
  • 4. International Journal of Computer Applications Technology and Research Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656 www.ijcat.com 711 Step 6: Convert the result blocks into binary sequence and generate a compressed blocks by using CA technique. Step 7: Arrange the first bit of all the blocks in the first row and second bits of all block in the second row and continuing this process arrange the remaining bit of all the blocks in the corresponding row of matrix. Step 8: Apply spiral technique to scramble the data matrix and to get the cipher text. Step 9: Stop 4.2 Decryption procedure The decryption process involves converting the encrypted data back to its original form for the receiver’s understanding. The cipher text is decrypted using the reverse process of the technique explained in encryption algorithm. The steps in decryption algorithm are as follows: Step 1. start Step 2. Divide the cipher text to blocks and the bits are arranged into a square matrix. Step 3. Generate a reversible transition rule. Convert the compressed blocks to a normal form using reversible CA rule. Step 4. Apply the corresponding reversible principle of spiral process. Step 5. Defuse it to get the encrypted points on elliptic curve. Step 6. Find the equivalent characters by decrypting each point. Step 7. Accumulate characters to form the secret message. Step 8. Stop. 5. EXPLANATION WITH EXAMPLE We have following example on which we have applied our new encryption algorithm ECCCA, the explanation has been provided below. For the system parameters, we used the following data: - p and n: two prime numbers (p=29 , n=31). - E29 (-1, 16) an elliptic curve defined on finite field F29. - P (5, 7): a point on elliptic curve E with order n. - Key values: k= 19 and PB=(16, 6). d=13 and PA=(7, 27). Kd = (5,22) and Ke= (6, 20). - CA Rule chosen: ‘90’ Phase 1: Plain Text: “ENCRYPTION” Charact er Point on EC Bit selected Encrypted point Qi E (6,20) 1 (23, 3) N (1, 4) 0 (7, 27) C (18, 1) 1 (2, 14) R (7, 25) 0 (1, 25) Y (13,24) 1 (28, 25) P (0, 25) 0 (0, 4) T (14, 7) 0 (2, 15) I (23, 3) 1 (21, 11) O (0, 4) 1 (16, 6) N (1, 4) 0 (7, 27) Phase2: Therefore, the final encrypted text is compressed as follow: 01011011000001110100111001100111010001. This algorithm compresses the data to reduce its length without compromising the compression efficiency and the information security. 1 0 0 0 1 0 0 1 1 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 1 0 0 1 0 1 1 1 1 0 0 0 1 0 0 1 1 1 0 1 0 0 0 1 0 1 0 1 0 1 1 0 0 0 0 1 0 1 1 1 1 0 1 1 0 1 0 0 1 0 0 1 1 0 1 0 1 1 1 0 0 0 1 1 1 1 1 1 0 1 1 0 1 1 0 1 1 0 0 0 1 0 0 1 1 0 0 1 1 1 1 1 0 1 1 0 1 1 0 1 1 0 1 1 1 0 0 0 1 1 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 1 1 1 0 0 0 1 1 0 1 1 1 1 1 0 0 1 0 0 1 0 1 0 1 0 1 1 0 0 1 1 0 0 1 0 0 0 1 0 0 1 0 1 1 1 1 0 0 0 1
  • 5. International Journal of Computer Applications Technology and Research Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656 www.ijcat.com 712 6. RESULTS In this section we proceed with our implementation using Visual Basic as tool. Winsock Control has been used for connecting two systems. Messages are transmit from user A to user B when a socket is created. In our implementation, we have used the curve E29 (-1, 16) in entire process. Figure 3. Shows the Key generated using CAT Figure 4. Encryption process Figure 5. Decryption process 7. CONCLUSION In this paper, we introduced the concept of cellular automata as a promising approach to enhance the security of the elliptic curve cryptosystem. By using two different levels of security, the transmitted message is much secure as compared to simple encryption method. From the above results it is clearly found that the security against few Attacks have been enhanced. Thus the proposed work of joining the elliptic curve cryptography and Cellular Automata has desirably increased the security level of the encrypted data. Our algorithm, being based on concept of CA, helps scrambling process due to rule-90. The Strength of the algorithm due to the difficulty level used in secure key generated. In fact, Cellular Automata is the strengthen method to generate strong keys. Also integration of elliptic curve cryptosystems and the concept of cellular automata has improved the security level provided by ECCCA. Therefore, it can be consider as a good alternative to some applications. In future, we are interested to extend the proposed system to image encryption and multimedia encryption. 8. REFERENCES [1] M Shanmugasundaram and R Shanmugasundaram, “Elliptic Curve Cryptography (ECC) for Security in Mobile Communication”, European Journal of Advances in Engineering and Technology, 1(2), 93-101, 2014. [2] Moncef Amara and Amar Siad, “Elliptic Curve Cryptography and its Applications”, 7th International Workshop on Systems, Signal Processing and their Applications (WOSSPA), 2011. [3] Ikshwansu Nautiyal, Madhu Sharma, “Encryption using Elliptic Curve Cryptography using Java as Implementation tool”, International Journal of Advanced Research in Computer Science and Software Engineering 4 (1), pp. 620-625, 2014.
  • 6. International Journal of Computer Applications Technology and Research Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656 www.ijcat.com 713 [4] MD Sadiq and Bhupalam Harish Kumar, “Efficient Cryptography using Cellular Automata Rules”, International Journal of Emerging Engineering Research and Technology, Vol 3, Issue 12, 2015. [5] Warakorn Srichavengsup and Wimol San-Um, “Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security”, International Journal of Network Security, Vol.18, No.6, pp.1130-1142, 2016. [6] F.Amounas and E.H. El Kinani, ”Elliptic curve digital signature algorithm using boolean permutation based ECC”, International Journal of Information & Network Security, vol. 1, no. 3, pp. 216-222, 2012. [7] F.Amounas and E.H. El Kinani, ”An efficient elliptic curve cryptography protocol based on matrices, ”International Journal of Engineering Inventions, vol. 1, no. 9, pp. 49-54, 2012. [8] F.Amounas, E.H. El Kinani and H.sadki, ” An Efficient Signcryption Scheme based on The Elliptic Curve Discrete Logarithm Problem”, International Journal of Information & Network Security, vol. 2, no. 3, pp. 253- 259, 2013. [9] F.Amounas, “Efficient methodology for Encrypting Amazigh Alphabet using Modified Knapsack Algorithm based ECC ", International Journal on Recent and Innovation Trends in Computing and Communication vol. 4, Issue 3, pp. 502-506, 2016. [10] Andrej Dujella “Applications of elliptic curves in public key cryptography”, Basque Center for Applied Mathematics and Universidad del Pais Vasco / Euskal HerrikoUnibertsitatea, Bilbao, 2011. [11] Lokesh Giripunje and Sonali Nimbhorkar, “Comprehensive Security System for Mobile Network Using Elliptic Curve Cryptography over GF (p)”, Vol 3, Issue 5, 2013. [12] D. Sravana Kumar, CH. Suneetha and A. Chandrasekhar, “Encryption of data using Elliptic Curve over Finite Field”, International Journal of Distributed and Parallel Systems, Vol. 3, No. 1, 2012. [13] Sonali U. Nimbhorkar, and Dr. L. G. Malik “A Survey On Elliptic Curve Cryptography (ECC)” International Journal of Advanced Studies in Computers, Science and Engineering, vol.1 ,issue 1 pp. 1-5, 2012. [14] M Phani Krishna Kishore, S Kanthi Kiran, B Bangaru Bhavya and S Harsha Chaitanya S, “A Novel Encryption System using Layered Cellular Automata”, Proceedings of the world congress on Engineering, Vol 1, 2011. [15] G.Shanmugasundaram, P.Thiyagarajan and S.Pavithra, “A Novel DNA Encryption System using Cellular Automata”, International Journal of Security, Privacy and Trust Management, Vol 4, No 3/4, 2015. [16] G. S. Khedkar, A.O. Amalkar and S.S.Tawani, “An Efficient Implementation of Cryptographic Algorithm Using High Speed Cellular Automata Techniques”, International Journal of Engineering Research and Applications, Vol. 2, Issue 3, 2012. [17] M. Tomassini and M. Sipper, “On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata”, IEEE Trans. on Computers, vol. 49, No.10, pp. 1140-l151, 2000. [18] Petre Anghelescu, SilviuIonitaand EmilSofron “Block Encryption Using Hybrid Additive Cellular Automata,” Seventh International Conference on Hybrid Intelligent Systems, pp. 132- 137, 2007. [19] F.Amounas, E.H. El Kinani, and A. Chillali, ”An application of discrete algorithms in asymmetric cryptography”, International Mathematical Forum, vol. 6, no. 49, pp. 2409-2418, 2011. [20] F.Amounas and E.H. El Kinani, ” Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography”, International Journal of Information & Network Security, vol. 1, no. 2, pp. 54-59, 2012. [21] Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography”, International Multi- Conference on Information Processing-2015, Procedia Computer Science 54 , pp: 73- 82, 2015.