SlideShare a Scribd company logo
1 of 4
Download to read offline
© 2016, IJCERT All Rights Reserved Page |222
International Journal of Computer Engineering In Research Trends
Volume 3, Issue 5, May-2016, pp. 222-225 ISSN (O): 2349-7084
Data Security Using Elliptic Curve
Cryptography
Karishma Bhirud, Dipashree Kulkarni, Renuka Pawar, Prachi Patil.
Abstract:- Cryptography technique is used to provide data security. In existing cryptography technique the key
generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then
security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a
algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The
ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place
through curve. In the proposed system the encryption and key generation process takes place rapidly.
Keywords – Curve Cryptography, shared key, encryption, decryption.
——————————  ——————————
1. INTRODUCTION
The Cryptography is a technique which provides
security to data. In cryptography all the data is
presented in the encrypted form and only authorized
user can decrypt information.The main goals of
cryptography are to maintain data confidentiality,
integrity, availability, centralized data collection to
provide data authenticity in the digital world that
provide high security to database. Plaintext is a term
used in cryptography that refers to a message before
encryption or after decryption. That is, it is a dispatch
in a form that is easily readable by humans. Cipher text
is also known as encrypted or encoded data because it
contains a form of the unique plaintext that is
unreadable by a human or computer without the
proper cipher to decrypt it. A cryptographic key is a
string of bits used by a cryptographic algorithm to
transform plain text into cipher text or vice versa.
In cryptography Elliptic Curve Cryptography
(ECC) is one of the effective cryptography algorithm
which was discovered in 1985 by Neil Koblitz and
Victor Miller. Elliptic Curve Cryptographic (ECC) are
Public-key mechanisms that provide the same
functionality as Rivest-Shamir-Adlemon algorithm.
Most of the standards that use public-key
cryptography for encryption based on RSA algorithm.
Their security is based on the hardness of a different
problems. The competing algorithm to RSA [1] is
elliptic curve cryptography over finite fields.
2. RELATED WORK
In last twenty years, elliptic curve cryptography has
been thoroughly researched. The actual application of
elliptic curve cryptography and the practical execution
of cryptosystem primitives in the real world constitute
interdisciplinary research in computer science as well
as in electrical engineering. Elliptic curve
cryptography has moved to a cutting edge technology
adopted by an increasing number of organizations.
There are two reasons for this new development. One
is that ECC has survived a generation of attacks.
Second, in the growing industries, its advantages over
RSA have made it an attractive security alternative.
Elliptic curve cryptography is not only emerged as an
attractive public key cryptosystem for mobile or
wireless environments but also provides bandwidth
savings. ECC has a high level of security which can be
achieved with high considerably shorter keys than
other conventional public key cryptography. ECC has
a advantage that it helps to establish equivalent
security with lower calculating power and battery
resource usage for mobile applications. The strength of
encryption depends on its key and the alphabetical
table. As much as the key size is affecting the execution
time, it should be preserved to be as short as possible
Available online at: www.ijcert.org
Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 5, 2016, pp. 222-225
© 2016, IJCERT All Rights Reserved Page |223
for an acceptable security requirement. There will be
no impact on strength and runtime performance. ECC
provides an excellent solution of data and secure
transfer of keys between two communicating parties
[2]. An elliptic curve cryptography based
communication system, where the various characters
can be symbolized as the co-ordinates of the elliptic
curves, can also be generated [3]. ECC structure is a
group structure based on non-singular curve having
finite number of integer points with each of this point
having a finite order. A novel idea of ECC encryption
and decryption based on Knapsack also shows on how
the elliptic curves technology can be used for
encryption and decryption [4].
Fig.6 System architecture
3. PROPOSED SYSTEM
A general Elliptic Curve equation takes the general
form:
y² = x³+ ax + b…………………… (1)
(x, y) = co-ordinates on the Elliptic curve
a, b = coefficients.
Though ,for fixed fields a improved equation is used
[5]:
y² mod q = (x³ +ax + b) mod q……….. (2)
Where q = prime number for which the Elliptic curve
be defined a, b satisfy the equation [2]
(4a³ + 27b³ ) mod q ≠ 0 mod q……….. (3)
An elliptic curve E over GF (q) consist of the answers
(x, y) distinct by (1) and (2), along with an
supplementary element called 0, which is the point of
EC at perpetuity. The set of points (x, y) are said to be
affine synchronize point demonstration. The basic
actions on elliptic curves are calculation and
replication. A scalar reproduction with a point can be
denoted as a combination of calculation operations.
Say, given a point P ( x, y) is to be multiplied k times,
say k = 37.
Thus we have to compute 37P.
In terms of addition it can be represented as
37P = P + P + P +… + P (37 times)
For addition of two points P(x1, y1) & Q(x2,
y2) where P≠Q.
3.1. SYSTEM ARCHITECTURE
Fig 1 shows the architecture of the system. System
architecture describes the various modules present in
paper which are interrelated to each other. The
previously implemented some algorithm like RSA,
Diffie Hellman has drawbacks which could slow down
the key generation and encryption process. So elliptic
curve cryptography algorithm is effective to increase
the speed of key generation and encryption process.
Encryption is done by the administrator by using
public key of user. Then decryption takes place by user
by using private key. As each user has its separate
private key so no other user can access the information.
If Administrator and user want to encrypt and decrypt
the messages then they agree upon to use an elliptic
curve Ep (a,b) where p is a prime number and a
random point C on the elliptic curve. User selects a
random number and a point A on the elliptic curve.
User computes A1 = a (C +A) and A2 = a A. User keeps
the random number a and the point A as her private
keys and distributes A1 and A 2 as her general public
keys.
Following keys are required for ECC:
Step 1.
User’s private key 1 = a, a random number less
than the order of the generator.
Step 2.
Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 5, 2016, pp. 222-225
© 2016, IJCERT All Rights Reserved Page |224
User’s private key 2 = a point A on the elliptic
curve Ep (a,b).
Step 3.
User’s general public key 1 = a point A1 on the
elliptic curve Ep (a,b).
Step 4.
User’s general public key 2 = a point A2 on the
elliptic curve Ep (a,b).
Step 5.
User’s specific public key for administrator = a
point AB on the elliptic curve Ep(a,b).
If administrator wants to encrypt the message M
then all the characters of the dispatch are coded to
the points on the elliptic curve using the code table
which is agreed upon by the administrator and
student. Then each message point is encrypted to a
pair of cipher points E1,E2 .[6]
Administrator uses a random
number r.
E1 = r C
E2 = M + (b + r) A 1 – r A 2 + AB
After encrypting all the characters of the message
administrator converts the pair of points of each
message point into the text characters using the
code table. Then administrator encrypts the plain
text.
After encrypting the cipher text, User
converts the cipher text into the points on the
elliptic curve and identifies the points E1 and E2 of
each character. Then decrypts the message as
follows.
M = E2 – ( a E1 + a B 1 + B A)
Hence, User can view this decrypted data as he wants.
3.2. ALGORITHM OF ECC:
1. Start
2: user perform the registration
3. User enter private key1 and private
key2(x,y).
4. User calculate the public key,
Calculates s
s=(3(x)^2+a)/2y x2=s^2-2x y2=s(x-x2)-y
5. User broadcast public key
(X2,Y2)
6. Admin performs encryption
6.1. Calculate 1G to 5G for each character
6.2. Retrieve matched G from generated
table
6.3. Calculate G of that character which
admin wants to encrypt and store cipher
text.
7. User performs decryption
7.1. Calculate 1G to 5G of each character.
7.2. Retrieve matched G from generated
table and stores the plain text.
8. Stop.
4. RESULT:
RSA key generation is expressively slower than ECC
key generation for RSA key of sizes 1024 bits which is
greater than key size of ECC. RSA has more
computational overheads than ECC because in RSA
algorithm, users have to choose particular prime
number for calculation of key generation. As the key
size of ECC is smaller than the key size of RSA so,
encryption of Elliptic curve cryptography is much
faster than RSA. ECC is more efficient for small
devices. If ECC algorithm is used for communication
purpose then it offers good bandwidth than RSA.
Table 1. Comparison of ECC and RSA
Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 5, 2016, pp. 222-225
© 2016, IJCERT All Rights Reserved Page |225
Parameters ECC RSA
Computational Roughly 10 More than
overheads times than that ECC.
of RSA can be
Saved.
Key sizes System System
parameters and parameters and
key pairs are key pairs are
shorter for the longer for the
ECC RSA
Key generation Faster Slower
Encryption Much faster Have good
Than RSA. speed but
slower than
ECC.
Small devices Much more Less efficient
efficiency Efficient. Than ECC.
5. CONCLUSION
In this paper, Data security is important issue in day
to day life. The elliptic curve cryptography is one of
the useful techniques to hide the data or information
so that data must be access by authorized user. In this
technique all the calculations are takes place by
considering the points on the elliptic curve. The
encryption and key generation process is faster.
Wireless devices are speedily becoming more reliant
on safety features such as the ability to do secure
email, confident Web browsing, and cybernetic
private networking to commercial networks and ECC
allows more efficient implementation of all of these
features. ECC make available better security and
more efficient performance than the first generation
public key techniques.
REFERENCES
[1]. J.Edge, An introduction to elliptic curve
cryptography, http://lwn.net/Articles/174127/,
2006.
[2]. Ch. Suneetha, D. Sravana Kumar and A.
Chandrasekhar, “Secure key transport in symmetric
cryptographic protocols using elliptic curves over finite
fields”, International Journal of Computer.
[3]. R. Rajaram Ramasamy, M. Amutha Prabakar, M.
Indra Devi and M.Suguna, ―Knapsack based ECC
encryption and decryption‖, International Journal of
Network Security, Vol. 9, No. 3, PP. 218-226,Nov.
2009.
[4]. D.Sravana Kumar, CH. Suneetha and A.
Chandrasekhar, Encryption of data using Elliptic
Curve over Finite Fieldǁ, IJDPS, Vol. 3, No. 1, 2012.
[5]. Nautiyal et al., International Journal of Advanced
Research in Computer Science and Software
Engineering 4(1), January - 2014, pp. 620-625
[6]. Alfred J. Menezes and Scott A. Vanstone, “Elliptic
Curve Cryptosystems and their implementations”,
Journal of Cryptology, 1993, Volume-6, Number-4,
pages 209-224.
[7]. Krithika K Annapoorna Shetty, Shravya Shetty K.
A review on asymmetric cryptography RSA and
elgamal algorithm. International Journal of
Innovative Research in Computer and
Communication Engineering, 2014.
[8]. Richard Helm Erich Gamma. Design patterns:
Elements of reusable object oriented software.
communication Engineering, 2015.
[9]. James Rumbaugh Grady Booch, Ivar Jacobson.
Eleptic curve cryptography,2nd edition. Computer
Engineering, 2004.
[10]. Kistin Lauter. The advantage of eleptic curve
cryptography for wireless security. IEEE wireless
Communication, 2004

More Related Content

What's hot

Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2Fahad Layth
 
An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)Hakeem Hunte
 
Error control coding bch, reed-solomon etc..
Error control coding   bch, reed-solomon etc..Error control coding   bch, reed-solomon etc..
Error control coding bch, reed-solomon etc..Madhumita Tamhane
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAadya Vatsa
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate providerKishankant Yadav
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesComputer Science Journals
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
 
Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2Fahad Layth
 
Elliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsubaElliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsubaIAEME Publication
 

What's hot (19)

Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 
IntrRSCode
IntrRSCodeIntrRSCode
IntrRSCode
 
Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
 
The RSA Algorithm
The RSA AlgorithmThe RSA Algorithm
The RSA Algorithm
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
 
An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)
 
Error control coding bch, reed-solomon etc..
Error control coding   bch, reed-solomon etc..Error control coding   bch, reed-solomon etc..
Error control coding bch, reed-solomon etc..
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
Ntewrok secuirty cs7
Ntewrok secuirty cs7Ntewrok secuirty cs7
Ntewrok secuirty cs7
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
 
Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2
 
Elliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsubaElliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsuba
 
Network Security CS3-4
Network Security CS3-4 Network Security CS3-4
Network Security CS3-4
 
Digi qestions
Digi qestionsDigi qestions
Digi qestions
 

Viewers also liked

Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyMd. Al-Amin Khandaker Nipu
 
JBUG Netherlands Openshift Primer
JBUG Netherlands Openshift PrimerJBUG Netherlands Openshift Primer
JBUG Netherlands Openshift PrimerEric D. Schabell
 
Internet de las cosas y protección de los consumidores orientada a procesos M2M
Internet de las cosas y protección de los consumidores orientada a procesos M2MInternet de las cosas y protección de los consumidores orientada a procesos M2M
Internet de las cosas y protección de los consumidores orientada a procesos M2MJose Manuel Pérez Marzabal
 
Sử dụng windows XP
Sử dụng windows XPSử dụng windows XP
Sử dụng windows XPNguyễn Anh
 
Curso Preparación Física Pádel
Curso Preparación Física PádelCurso Preparación Física Pádel
Curso Preparación Física Pádelaltorendimientocom
 
Emmies 2013 - GroupM Monthly Digital Challenge
Emmies 2013 - GroupM Monthly Digital ChallengeEmmies 2013 - GroupM Monthly Digital Challenge
Emmies 2013 - GroupM Monthly Digital Challengeyangchinglee
 
Jocīgās dzejas dienas jeb kā Filips Sestais kļuva par lasītāju
Jocīgās dzejas dienas jeb kā Filips Sestais kļuva par lasītājuJocīgās dzejas dienas jeb kā Filips Sestais kļuva par lasītāju
Jocīgās dzejas dienas jeb kā Filips Sestais kļuva par lasītājuLimbažu Galvenā bibliotēka
 
Myanmar Business Today - Vol 2, Issue 16
Myanmar Business Today - Vol 2, Issue 16Myanmar Business Today - Vol 2, Issue 16
Myanmar Business Today - Vol 2, Issue 16Myanmar Business Today
 
Matriculacions i transferències 1r trimestre 2012. GREMI DEL MOTOR
Matriculacions i  transferències 1r trimestre 2012. GREMI DEL MOTORMatriculacions i  transferències 1r trimestre 2012. GREMI DEL MOTOR
Matriculacions i transferències 1r trimestre 2012. GREMI DEL MOTORGremi del Motor
 
RDFS with Attribute Equations via SPARQL Rewriting
RDFS with Attribute Equations via SPARQL RewritingRDFS with Attribute Equations via SPARQL Rewriting
RDFS with Attribute Equations via SPARQL RewritingStefan Bischof
 
M.G.Goman, A.V.Khramtsovsky (1993) - KRIT User Guide
M.G.Goman, A.V.Khramtsovsky (1993) - KRIT User GuideM.G.Goman, A.V.Khramtsovsky (1993) - KRIT User Guide
M.G.Goman, A.V.Khramtsovsky (1993) - KRIT User GuideProject KRIT
 
TIC para Estudiantes con Necesidades Especiales.
TIC para Estudiantes con Necesidades Especiales.TIC para Estudiantes con Necesidades Especiales.
TIC para Estudiantes con Necesidades Especiales.Juana Alvarez
 
Renacimientoquattrocenttoarquitectura
RenacimientoquattrocenttoarquitecturaRenacimientoquattrocenttoarquitectura
RenacimientoquattrocenttoarquitecturaFina Martinez
 
Surfdog Action Sports
Surfdog Action SportsSurfdog Action Sports
Surfdog Action SportsAndrew Kirwin
 
MailUp - Sistema Professionale di Email Marketing via web
MailUp - Sistema Professionale di Email Marketing via webMailUp - Sistema Professionale di Email Marketing via web
MailUp - Sistema Professionale di Email Marketing via webLuca Azzali
 
Bodas de sangre_primer_y_segundo_curso_de_la_e.s.o
Bodas de sangre_primer_y_segundo_curso_de_la_e.s.oBodas de sangre_primer_y_segundo_curso_de_la_e.s.o
Bodas de sangre_primer_y_segundo_curso_de_la_e.s.omargala6
 
La importancia de fomentar Resiliencia
La importancia de fomentar ResilienciaLa importancia de fomentar Resiliencia
La importancia de fomentar Resilienciaccarcamo
 

Viewers also liked (20)

Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve Cryptography
 
JBUG Netherlands Openshift Primer
JBUG Netherlands Openshift PrimerJBUG Netherlands Openshift Primer
JBUG Netherlands Openshift Primer
 
Internet de las cosas y protección de los consumidores orientada a procesos M2M
Internet de las cosas y protección de los consumidores orientada a procesos M2MInternet de las cosas y protección de los consumidores orientada a procesos M2M
Internet de las cosas y protección de los consumidores orientada a procesos M2M
 
Sử dụng windows XP
Sử dụng windows XPSử dụng windows XP
Sử dụng windows XP
 
Curso Preparación Física Pádel
Curso Preparación Física PádelCurso Preparación Física Pádel
Curso Preparación Física Pádel
 
Emmies 2013 - GroupM Monthly Digital Challenge
Emmies 2013 - GroupM Monthly Digital ChallengeEmmies 2013 - GroupM Monthly Digital Challenge
Emmies 2013 - GroupM Monthly Digital Challenge
 
Jocīgās dzejas dienas jeb kā Filips Sestais kļuva par lasītāju
Jocīgās dzejas dienas jeb kā Filips Sestais kļuva par lasītājuJocīgās dzejas dienas jeb kā Filips Sestais kļuva par lasītāju
Jocīgās dzejas dienas jeb kā Filips Sestais kļuva par lasītāju
 
Myanmar Business Today - Vol 2, Issue 16
Myanmar Business Today - Vol 2, Issue 16Myanmar Business Today - Vol 2, Issue 16
Myanmar Business Today - Vol 2, Issue 16
 
Matriculacions i transferències 1r trimestre 2012. GREMI DEL MOTOR
Matriculacions i  transferències 1r trimestre 2012. GREMI DEL MOTORMatriculacions i  transferències 1r trimestre 2012. GREMI DEL MOTOR
Matriculacions i transferències 1r trimestre 2012. GREMI DEL MOTOR
 
How to create and copy a email list in general selection
How to create and copy a email list in general selectionHow to create and copy a email list in general selection
How to create and copy a email list in general selection
 
RDFS with Attribute Equations via SPARQL Rewriting
RDFS with Attribute Equations via SPARQL RewritingRDFS with Attribute Equations via SPARQL Rewriting
RDFS with Attribute Equations via SPARQL Rewriting
 
M.G.Goman, A.V.Khramtsovsky (1993) - KRIT User Guide
M.G.Goman, A.V.Khramtsovsky (1993) - KRIT User GuideM.G.Goman, A.V.Khramtsovsky (1993) - KRIT User Guide
M.G.Goman, A.V.Khramtsovsky (1993) - KRIT User Guide
 
BDO ITSMF 2007
BDO ITSMF 2007BDO ITSMF 2007
BDO ITSMF 2007
 
TIC para Estudiantes con Necesidades Especiales.
TIC para Estudiantes con Necesidades Especiales.TIC para Estudiantes con Necesidades Especiales.
TIC para Estudiantes con Necesidades Especiales.
 
Renacimientoquattrocenttoarquitectura
RenacimientoquattrocenttoarquitecturaRenacimientoquattrocenttoarquitectura
Renacimientoquattrocenttoarquitectura
 
Surfdog Action Sports
Surfdog Action SportsSurfdog Action Sports
Surfdog Action Sports
 
MailUp - Sistema Professionale di Email Marketing via web
MailUp - Sistema Professionale di Email Marketing via webMailUp - Sistema Professionale di Email Marketing via web
MailUp - Sistema Professionale di Email Marketing via web
 
La Biblioteca se abre a la sociedad
La Biblioteca se abre a la sociedadLa Biblioteca se abre a la sociedad
La Biblioteca se abre a la sociedad
 
Bodas de sangre_primer_y_segundo_curso_de_la_e.s.o
Bodas de sangre_primer_y_segundo_curso_de_la_e.s.oBodas de sangre_primer_y_segundo_curso_de_la_e.s.o
Bodas de sangre_primer_y_segundo_curso_de_la_e.s.o
 
La importancia de fomentar Resiliencia
La importancia de fomentar ResilienciaLa importancia de fomentar Resiliencia
La importancia de fomentar Resiliencia
 

Similar to Data Security Using Elliptic Curve Cryptography

“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...ijsrd.com
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...CSITiaesprime
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Securityrahulmonikasharma
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sIDES Editor
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmAlexander Decker
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Marisa Paryasto
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmijcsit
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...CAS
 

Similar to Data Security Using Elliptic Curve Cryptography (20)

“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
C0281010016
C0281010016C0281010016
C0281010016
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
G05124550
G05124550G05124550
G05124550
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
D018141922
D018141922D018141922
D018141922
 
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 

More from IJCERT

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodIJCERT
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessIJCERT
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsIJCERT
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsIJCERT
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding IJCERT
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerIJCERT
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkIJCERT
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionIJCERT
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodIJCERT
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetIJCERT
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYIJCERT
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetIJCERT
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentIJCERT
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueIJCERT
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingIJCERT
 
IJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT
 

More from IJCERT (20)

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization Process
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation Methods
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling Power
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault Detection
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEY
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using Vanet
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver Fatigue
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data Preprocessing
 
IJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSE
 

Recently uploaded

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

Data Security Using Elliptic Curve Cryptography

  • 1. © 2016, IJCERT All Rights Reserved Page |222 International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, May-2016, pp. 222-225 ISSN (O): 2349-7084 Data Security Using Elliptic Curve Cryptography Karishma Bhirud, Dipashree Kulkarni, Renuka Pawar, Prachi Patil. Abstract:- Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly. Keywords – Curve Cryptography, shared key, encryption, decryption. ——————————  —————————— 1. INTRODUCTION The Cryptography is a technique which provides security to data. In cryptography all the data is presented in the encrypted form and only authorized user can decrypt information.The main goals of cryptography are to maintain data confidentiality, integrity, availability, centralized data collection to provide data authenticity in the digital world that provide high security to database. Plaintext is a term used in cryptography that refers to a message before encryption or after decryption. That is, it is a dispatch in a form that is easily readable by humans. Cipher text is also known as encrypted or encoded data because it contains a form of the unique plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. A cryptographic key is a string of bits used by a cryptographic algorithm to transform plain text into cipher text or vice versa. In cryptography Elliptic Curve Cryptography (ECC) is one of the effective cryptography algorithm which was discovered in 1985 by Neil Koblitz and Victor Miller. Elliptic Curve Cryptographic (ECC) are Public-key mechanisms that provide the same functionality as Rivest-Shamir-Adlemon algorithm. Most of the standards that use public-key cryptography for encryption based on RSA algorithm. Their security is based on the hardness of a different problems. The competing algorithm to RSA [1] is elliptic curve cryptography over finite fields. 2. RELATED WORK In last twenty years, elliptic curve cryptography has been thoroughly researched. The actual application of elliptic curve cryptography and the practical execution of cryptosystem primitives in the real world constitute interdisciplinary research in computer science as well as in electrical engineering. Elliptic curve cryptography has moved to a cutting edge technology adopted by an increasing number of organizations. There are two reasons for this new development. One is that ECC has survived a generation of attacks. Second, in the growing industries, its advantages over RSA have made it an attractive security alternative. Elliptic curve cryptography is not only emerged as an attractive public key cryptosystem for mobile or wireless environments but also provides bandwidth savings. ECC has a high level of security which can be achieved with high considerably shorter keys than other conventional public key cryptography. ECC has a advantage that it helps to establish equivalent security with lower calculating power and battery resource usage for mobile applications. The strength of encryption depends on its key and the alphabetical table. As much as the key size is affecting the execution time, it should be preserved to be as short as possible Available online at: www.ijcert.org
  • 2. Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, 2016, pp. 222-225 © 2016, IJCERT All Rights Reserved Page |223 for an acceptable security requirement. There will be no impact on strength and runtime performance. ECC provides an excellent solution of data and secure transfer of keys between two communicating parties [2]. An elliptic curve cryptography based communication system, where the various characters can be symbolized as the co-ordinates of the elliptic curves, can also be generated [3]. ECC structure is a group structure based on non-singular curve having finite number of integer points with each of this point having a finite order. A novel idea of ECC encryption and decryption based on Knapsack also shows on how the elliptic curves technology can be used for encryption and decryption [4]. Fig.6 System architecture 3. PROPOSED SYSTEM A general Elliptic Curve equation takes the general form: y² = x³+ ax + b…………………… (1) (x, y) = co-ordinates on the Elliptic curve a, b = coefficients. Though ,for fixed fields a improved equation is used [5]: y² mod q = (x³ +ax + b) mod q……….. (2) Where q = prime number for which the Elliptic curve be defined a, b satisfy the equation [2] (4a³ + 27b³ ) mod q ≠ 0 mod q……….. (3) An elliptic curve E over GF (q) consist of the answers (x, y) distinct by (1) and (2), along with an supplementary element called 0, which is the point of EC at perpetuity. The set of points (x, y) are said to be affine synchronize point demonstration. The basic actions on elliptic curves are calculation and replication. A scalar reproduction with a point can be denoted as a combination of calculation operations. Say, given a point P ( x, y) is to be multiplied k times, say k = 37. Thus we have to compute 37P. In terms of addition it can be represented as 37P = P + P + P +… + P (37 times) For addition of two points P(x1, y1) & Q(x2, y2) where P≠Q. 3.1. SYSTEM ARCHITECTURE Fig 1 shows the architecture of the system. System architecture describes the various modules present in paper which are interrelated to each other. The previously implemented some algorithm like RSA, Diffie Hellman has drawbacks which could slow down the key generation and encryption process. So elliptic curve cryptography algorithm is effective to increase the speed of key generation and encryption process. Encryption is done by the administrator by using public key of user. Then decryption takes place by user by using private key. As each user has its separate private key so no other user can access the information. If Administrator and user want to encrypt and decrypt the messages then they agree upon to use an elliptic curve Ep (a,b) where p is a prime number and a random point C on the elliptic curve. User selects a random number and a point A on the elliptic curve. User computes A1 = a (C +A) and A2 = a A. User keeps the random number a and the point A as her private keys and distributes A1 and A 2 as her general public keys. Following keys are required for ECC: Step 1. User’s private key 1 = a, a random number less than the order of the generator. Step 2.
  • 3. Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, 2016, pp. 222-225 © 2016, IJCERT All Rights Reserved Page |224 User’s private key 2 = a point A on the elliptic curve Ep (a,b). Step 3. User’s general public key 1 = a point A1 on the elliptic curve Ep (a,b). Step 4. User’s general public key 2 = a point A2 on the elliptic curve Ep (a,b). Step 5. User’s specific public key for administrator = a point AB on the elliptic curve Ep(a,b). If administrator wants to encrypt the message M then all the characters of the dispatch are coded to the points on the elliptic curve using the code table which is agreed upon by the administrator and student. Then each message point is encrypted to a pair of cipher points E1,E2 .[6] Administrator uses a random number r. E1 = r C E2 = M + (b + r) A 1 – r A 2 + AB After encrypting all the characters of the message administrator converts the pair of points of each message point into the text characters using the code table. Then administrator encrypts the plain text. After encrypting the cipher text, User converts the cipher text into the points on the elliptic curve and identifies the points E1 and E2 of each character. Then decrypts the message as follows. M = E2 – ( a E1 + a B 1 + B A) Hence, User can view this decrypted data as he wants. 3.2. ALGORITHM OF ECC: 1. Start 2: user perform the registration 3. User enter private key1 and private key2(x,y). 4. User calculate the public key, Calculates s s=(3(x)^2+a)/2y x2=s^2-2x y2=s(x-x2)-y 5. User broadcast public key (X2,Y2) 6. Admin performs encryption 6.1. Calculate 1G to 5G for each character 6.2. Retrieve matched G from generated table 6.3. Calculate G of that character which admin wants to encrypt and store cipher text. 7. User performs decryption 7.1. Calculate 1G to 5G of each character. 7.2. Retrieve matched G from generated table and stores the plain text. 8. Stop. 4. RESULT: RSA key generation is expressively slower than ECC key generation for RSA key of sizes 1024 bits which is greater than key size of ECC. RSA has more computational overheads than ECC because in RSA algorithm, users have to choose particular prime number for calculation of key generation. As the key size of ECC is smaller than the key size of RSA so, encryption of Elliptic curve cryptography is much faster than RSA. ECC is more efficient for small devices. If ECC algorithm is used for communication purpose then it offers good bandwidth than RSA. Table 1. Comparison of ECC and RSA
  • 4. Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, 2016, pp. 222-225 © 2016, IJCERT All Rights Reserved Page |225 Parameters ECC RSA Computational Roughly 10 More than overheads times than that ECC. of RSA can be Saved. Key sizes System System parameters and parameters and key pairs are key pairs are shorter for the longer for the ECC RSA Key generation Faster Slower Encryption Much faster Have good Than RSA. speed but slower than ECC. Small devices Much more Less efficient efficiency Efficient. Than ECC. 5. CONCLUSION In this paper, Data security is important issue in day to day life. The elliptic curve cryptography is one of the useful techniques to hide the data or information so that data must be access by authorized user. In this technique all the calculations are takes place by considering the points on the elliptic curve. The encryption and key generation process is faster. Wireless devices are speedily becoming more reliant on safety features such as the ability to do secure email, confident Web browsing, and cybernetic private networking to commercial networks and ECC allows more efficient implementation of all of these features. ECC make available better security and more efficient performance than the first generation public key techniques. REFERENCES [1]. J.Edge, An introduction to elliptic curve cryptography, http://lwn.net/Articles/174127/, 2006. [2]. Ch. Suneetha, D. Sravana Kumar and A. Chandrasekhar, “Secure key transport in symmetric cryptographic protocols using elliptic curves over finite fields”, International Journal of Computer. [3]. R. Rajaram Ramasamy, M. Amutha Prabakar, M. Indra Devi and M.Suguna, ―Knapsack based ECC encryption and decryption‖, International Journal of Network Security, Vol. 9, No. 3, PP. 218-226,Nov. 2009. [4]. D.Sravana Kumar, CH. Suneetha and A. Chandrasekhar, Encryption of data using Elliptic Curve over Finite Fieldǁ, IJDPS, Vol. 3, No. 1, 2012. [5]. Nautiyal et al., International Journal of Advanced Research in Computer Science and Software Engineering 4(1), January - 2014, pp. 620-625 [6]. Alfred J. Menezes and Scott A. Vanstone, “Elliptic Curve Cryptosystems and their implementations”, Journal of Cryptology, 1993, Volume-6, Number-4, pages 209-224. [7]. Krithika K Annapoorna Shetty, Shravya Shetty K. A review on asymmetric cryptography RSA and elgamal algorithm. International Journal of Innovative Research in Computer and Communication Engineering, 2014. [8]. Richard Helm Erich Gamma. Design patterns: Elements of reusable object oriented software. communication Engineering, 2015. [9]. James Rumbaugh Grady Booch, Ivar Jacobson. Eleptic curve cryptography,2nd edition. Computer Engineering, 2004. [10]. Kistin Lauter. The advantage of eleptic curve cryptography for wireless security. IEEE wireless Communication, 2004