SlideShare a Scribd company logo
1 of 6
Download to read offline
Journal for Research| Volume 01| Issue 01 | March 2015
ISSN: 2395-7549
All rights reserved by www.journalforresearch.org 21
Cryptography using Elliptic Curve with Matrix
Scrambling
Naresh S. Badve
Department of Computer Science and Engineering
Nuva college of Engineering and Technology, Nagpur, India
Abstract
Elliptic curve cryptography is additional powerful than different methodology that gains countless attention within the industry
and plays vital role within the world of CRYPTOGRAPHY. This paper explains the strategy of elliptic curve cryptography
victimization matrix scrambling method. during this methodology of cryptography we have a tendency to initial rework the plain
text to elliptic curve so victimization matrix scrambling methodology we have a tendency to encrypt/decrypt the message. This
method keeps information safe from unwanted attack to our information.
Keywords: Matrix scrambling, Elliptic Curve Cryptography, Encryption, Decryption, constant range, Random range
generator, Circular shift technique, Prime Number
_______________________________________________________________________________________________________
I. INTRODUCTION
In the world of communication network and gift era it is additional vital to secure line through that we will send and receive the
info or we will communicate firmly over channel and keep information securely. Currently cryptography may be a methodology
that protects information while we have a tendency to be transferring information from one network to another network. to stay
safe information or avoid the disclosed data ancient and fashionable cryptography are used. There are some standard public-key
secret writing algorithms that contain some advanced calculation, for instance, RSA, ElGamal. Due to properties, options and
characteristic of elliptic curve cryptography increased attention of the many skilled and scientists as a result of it have opened
wealth potentialities in terms of security.
Proposed a matrix scrambling algorithmic rule supported two way circular queues. In this case, we have a tendency to
introduce a new secret writing methodology on elliptic curve supported matrix Scrambling technique. This paper shows a new
technique of encrypting information that permits smart diffusion and has a singular technique of decrypting it back to the
plaintext and is straightforward to implement victimization matrix scrambling methodology that is predicated on random
function and shifting. The selection of operation performed on rows or columns is predicated on Binary worth of prime no.
Therefore, the paper presents in details its implementation based on an elliptic curve given by the subsequent equation:
y2
= x3
+ x + 13
II. OVERVIEW OF ELLIPTIC CURVE
The study of elliptic curves by algebraists, algebraic geometers and range theorists dates back to the center of the nineteenth
century. Elliptic Curve Cryptography (ECC) was discovered in 1985 by Neil Koblitz and Victor Miller. Elliptic Curve
Cryptography may be a public key Cryptography. ECC is right for environments like cellular phones and sensible cards.
Moreover, due to the apparent hardness of the underlying elliptic curve separate logarithm downside (ECDLP), ECC systems
also are well suited for applications that require long-run security requirements. Elliptic Curve Cryptography (ECC) may be a
public key technology that gives performance blessings at higher security levels. Understanding ECC desires full mathematical
background on elliptic curves. Elliptic curves aren't ellipses. The overall cubical equation of elliptic curves is
y2
+axy+by=x3
+cx2
+dx+e. except for our purpose it's sufficient to limit the equation to the shape y2
=x3
+ax+b. Say EP(a,b)
consisting of all the points (x,y) that satisfy the on top of equation in conjunction with part at infinity O.
For ECC, we have a tendency to are involved with a restricted kind of elliptic curve that's outlined over a finite field. Of
particular interest for cryptography is what's remarked as the elliptic cluster mod p, wherever p may be a prime. This is outlined
as follows. Opt for 2 plus integers, a and b, but p that satisfy: 4a3
+27b2
(mod p) ≠0, Then Ep(a, b) denotes the elliptic group mod
p whose elements (x, y) are pairs of nonnegative integers less than p satisfying: y2
mod p = (x3
+ ax + b )mod p
III.MAIN RESULTS
In this section we offer the new methodology of secret writing of a message (plain text) and decrypting back once more to the
original message (plain text)
Cryptography using Elliptic Curve with Matrix Scrambling
(J4R/ Volume 01 / Issue 01 / 005)
All rights reserved by www.journalforresearch.org 22
The Planned Methodology Description:A.
Encryption:1)
The plaintext is remodeled on points of elliptic curve and therefore the corresponding code is organized into a circular queue
system. Within the matrix M of n*m. The parameter p (Prime) represents the count of operations, say, the time of transformation
we have a tendency to create to matrix. The ECC methodology needs that we have a tendency to choose a random integer a, that
has to be unbroken secret. Then base on the binary worth of prime circular shift is performed.
Let b=bit (rj), wherever j is bit position, the worth of b is considered and supported it circular left shift or circular right shift
are performed on rows. Equally as rows, circular upward shift or circular downward shift are performed on columns. The process
of secret writing is completed as following:
Fig. 1: Encryption Process flowchart
Cryptography using Elliptic Curve with Matrix Scrambling
(J4R/ Volume 01 / Issue 01 / 005)
All rights reserved by www.journalforresearch.org 23
 Step1. The plaintext is mapped into points of elliptic curve. Then the code of points is ranged into bi-directional circular
queue information sequence, within the matrix of n*m
 Step2. a=Random (), with „aP‟ may be a random purpose that Decides that transformation is applied on matrix (Row,
Columns). Once this we have a tendency to choose the code of „aP‟ and keep in r. the selection of operation performed
on rows and columns is predicated on the little bit of the sequence r.
 Step3. Let b=bit (rj), wherever j is bit position (LSB→MSB), that decides that transformation has got to be performed
on rows and columns.
 Step4. The worth of bits verified:
 If the present bit position is one then shift row upward circularly and if current bit position is zero then shift column
circular shift right. Merge the matrix information during a single string to form it additional strong.
Decryption:2)
The process is done by reversing the Operations done in the encryption process. The cipher text is arranged into a matrix of n*m
noted M. The algorithm of decryption is given as follows:
 Step 1: Convert merged data into matrix n*m
Fig. 2: Decryption Process flowchart
 Step 2. Browse p (prime no.).Reverse the binary sequence of primary such that: r=Reverse (p)
 Step 3. For every worth b=bit (rj), wherever j is bit position such that operation is decoded that is given as :
InverseTrans (M)
In the case: j: LSB _m/2, the InverseTrans (M) is depending on the worth of b transpositions are performed.
Cryptography using Elliptic Curve with Matrix Scrambling
(J4R/ Volume 01 / Issue 01 / 005)
All rights reserved by www.journalforresearch.org 24
If b=0 then upward shift columns else left shift operation is performed on rows. Within the case: j: m/2+1→MSB, the
InverseTrans (M) depending on the worth of b transpositions are performed.
If b=0 then right shift rows else downward shift operation is performed on columns. After decipherment the received message
M and reverse the imbedding, we have a tendency to get the plaintext.
Implementation Details of the Planned Algorithmic Rule:B.
In this section, we have a tendency to take into account the elliptic curve given by the Weierstrass equation y2 = x3
+ x + 13
Detailed method of our secret writing algorithmic rule by an example. In our case, we have a tendency to shall take a=58, then
r=1010011101.
In vector r, solely 10bits is taken into account. This provides the information concerning operation on Rows and columns
(Rowtrans and Coltrans).
Here in our case Alice needs to send a message”save” to Bob. First, she imbeds the message “save” into the elliptic curve E.
Next, she represents the plain text ”save” as a series of bits recorded in matrix 4*10 as following:
Binary sequence of r is explained within the figure No. 3:
The technique of scrambling the matrix bits based on binary sequence of r is explained in the figure No. 3:
Fig. 3: Encryption Process Fig. 4: Decryption Process
The cipher text obtained is given as:
01100110000001011011001001010101110010011010011101
The secret writing process:
In this section, we have a tendency to show the elaborated method of our decryption algorithmic rule with AN example.
Consider the cipher text obtained once secret writing as:
01100110000001011011001001010101110010011010011101
The cipher text once inserting in matrix M of order n and m is given .The secret writing is completed by reading the last
sequence of bits noted d in reverse order and reverse operation each Rowtrans and Coltrans. d=1010011101and r=Reverse
d=1011100101
Then, the method of secret writing is given below When a similar plaintext is taken and once the secret writing is performed
once more, then the resultant disorganized matrix is different. For an trespasser it'd be terribly troublesome to guess on that
Cryptography using Elliptic Curve with Matrix Scrambling
(J4R/ Volume 01 / Issue 01 / 005)
All rights reserved by www.journalforresearch.org 25
purpose the secret writing method is performed and therefore improves the problem of decrypting. Our algorithm is predicated
on magic parallelogram ,and therefore it's easy to grasp straightforward and straightforward and simple} to implement the
planned algorithm, that additionally uses solely two styles of linear array operations, circular horizontal shifting(left, right) and
circular vertical shifting(up, down). Therefore it works with efficiency with very little system resources. The parameter ‟m‟
additionally plays a crucial role in strengthening the intensity of secret writing beside the parameter ‟a‟. Looking on elliptic
curve, the worth of parameter ‟m‟ plays a crucial role au fait the intensity of the secret writing. ‟m‟ mustn't be too tiny or too
large. The experimental results show that the new scheme features a in no time secret writing speed and therefore the x-y
coordinate is distended and it will resist all types of cryptanalytic. Thus, we have a tendency to conclude that the planned Fig 3.
Secret writing method scheme will strengthens the elliptic curve cryptosystem against most of the present assaultive.
IV.SAMPLE OUTPUT
Fig. 5: Sample Output
V. CONCLUSION
In this paper, we've developed AN algorithmic rule secret writing and secret writing on elliptic curve victimization matrix
scrambling technique. So, the usage of random purpose on elliptic curve firstly and second for choosing the operations for
scrambling, avoids the regularity within the resultant cipher text that is remodeled from plaintext matrix, and hence improves the
problem for decrypting. Finally, we like to suggests that the great selection of elliptic curve and a whole number worth ‟a‟
Cryptography using Elliptic Curve with Matrix Scrambling
(J4R/ Volume 01 / Issue 01 / 005)
All rights reserved by www.journalforresearch.org 26
provides higher binary sequence, that is employed to scramble the matrix in each directions with efficiency. At the end, there's
many scope to flirt with the choice of the ‟aP‟ purpose. Looking on the amount of memory demand, one will analyze the use of
this algorithmic rule in tiny memory devices like sensible cards and mobile devices. This algorithmic rule is additionally applied
to text secret writing, image secret writing, and transmission secret writing and then on. ECC may be a field wherever there's
giant scope for higher research.
ACKNOWLEDGMENT
The authors would love to convey the collogues and senior faculty for his or her helpful suggestions.
REFERENCES
[1] J. J. Amador and R.W. Green, Symmetric-Key BlockCipher
[2] Image and Text Cryptography, International Journal of Imaging and Technology, Vol. 15, No. 3, pp. 178-188, 2005.
[3] N. Demytko, a replacement Elliptic Curve based mostly Analogue of RSA, in T.Helleseth, editor, Advances in Cryptology-Eurocrypt93, Springer-Verlag,
New York, pp. 4049, 1994.
[4] N. Koblitz, Elliptic Curve Cryptosystems, ed. Mathematics of Computation, Vol. 48, No. 177, pp. 203-209, 1987.
[5] Elliptic curve cryptography victimisation matrix scrambling methodology, IEEE normal 2012
[6] V. S. Miller., Use of Elliptic Curves in Cryptography, Advances in cryptanalysis CRYPTO85, pp. 417-426, 1986.
[7] Suli Wu, Yang Zhang, and Xu Jing, A Novel Encryption Algorithm Based on Shifting and Exchanging Rule of Bi-column Bi-row Circular Queue, CSSE
(3)‟2008. pp.841-844, 2008.
[8] Suli Shanghai dialect and Xiaofei Loloish, Text secret writing Algorithm based mostly Cyclic Shift, The Smart Internet‟2010. PP.3483-3486, 2010.
[9] normal Specifications for Public Key Cryptography, IEEE normal p1363, 2000.
[10] W. W. Yan Weimin, system, Tsinghua University Press, Beijing, 1992.

More Related Content

What's hot

Technical aptitude questions_e_book1
Technical aptitude questions_e_book1Technical aptitude questions_e_book1
Technical aptitude questions_e_book1Sateesh Allu
 
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSIONA NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSIONijscmcj
 
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
FPGA Implementation of Mix and Inverse Mix Column for AES AlgorithmFPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithmijsrd.com
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05ijmsr
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
 
Ordinal Regression and Machine Learning: Applications, Methods, Metrics
Ordinal Regression and Machine Learning: Applications, Methods, MetricsOrdinal Regression and Machine Learning: Applications, Methods, Metrics
Ordinal Regression and Machine Learning: Applications, Methods, MetricsFrancesco Casalegno
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Editor IJARCET
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoderijsrd.com
 
Error control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesError control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesIAEME Publication
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...zaidinvisible
 
Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)IISRT
 
Introduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyIntroduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyAlexandre Augusto Giron
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
Lattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemLattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemVarun Janga
 

What's hot (19)

Technical aptitude questions_e_book1
Technical aptitude questions_e_book1Technical aptitude questions_e_book1
Technical aptitude questions_e_book1
 
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSIONA NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
 
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
FPGA Implementation of Mix and Inverse Mix Column for AES AlgorithmFPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
Network Security CS3-4
Network Security CS3-4 Network Security CS3-4
Network Security CS3-4
 
Correlation
CorrelationCorrelation
Correlation
 
Ordinal Regression and Machine Learning: Applications, Methods, Metrics
Ordinal Regression and Machine Learning: Applications, Methods, MetricsOrdinal Regression and Machine Learning: Applications, Methods, Metrics
Ordinal Regression and Machine Learning: Applications, Methods, Metrics
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoder
 
Error control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesError control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codes
 
Convolution
ConvolutionConvolution
Convolution
 
Doc 20180130-wa0002
Doc 20180130-wa0002Doc 20180130-wa0002
Doc 20180130-wa0002
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
 
Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)
 
Introduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyIntroduction - Lattice-based Cryptography
Introduction - Lattice-based Cryptography
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Lattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemLattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH Cryptosystem
 

Similar to CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING

EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEIJNSA Journal
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Editor IJARCET
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...IJNSA Journal
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYijujournal
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYijujournal
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.CSCJournals
 
elliptic-curves-modern
elliptic-curves-modernelliptic-curves-modern
elliptic-curves-modernEric Seifert
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...IJNSA Journal
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmAlexander Decker
 
Cryptography Baby Step Giant Step
Cryptography Baby Step Giant StepCryptography Baby Step Giant Step
Cryptography Baby Step Giant StepSAUVIK BISWAS
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptographyinventy
 

Similar to CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING (20)

EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
E04612529
E04612529E04612529
E04612529
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
 
elliptic-curves-modern
elliptic-curves-modernelliptic-curves-modern
elliptic-curves-modern
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
 
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
Cryptography Baby Step Giant Step
Cryptography Baby Step Giant StepCryptography Baby Step Giant Step
Cryptography Baby Step Giant Step
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptography
 

More from Journal For Research

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Journal For Research
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Journal For Research
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Journal For Research
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016Journal For Research
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...Journal For Research
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014Journal For Research
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...Journal For Research
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...Journal For Research
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012Journal For Research
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...Journal For Research
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008Journal For Research
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002Journal For Research
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001Journal For Research
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021Journal For Research
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...Journal For Research
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023Journal For Research
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024Journal For Research
 

More from Journal For Research (20)

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING

  • 1. Journal for Research| Volume 01| Issue 01 | March 2015 ISSN: 2395-7549 All rights reserved by www.journalforresearch.org 21 Cryptography using Elliptic Curve with Matrix Scrambling Naresh S. Badve Department of Computer Science and Engineering Nuva college of Engineering and Technology, Nagpur, India Abstract Elliptic curve cryptography is additional powerful than different methodology that gains countless attention within the industry and plays vital role within the world of CRYPTOGRAPHY. This paper explains the strategy of elliptic curve cryptography victimization matrix scrambling method. during this methodology of cryptography we have a tendency to initial rework the plain text to elliptic curve so victimization matrix scrambling methodology we have a tendency to encrypt/decrypt the message. This method keeps information safe from unwanted attack to our information. Keywords: Matrix scrambling, Elliptic Curve Cryptography, Encryption, Decryption, constant range, Random range generator, Circular shift technique, Prime Number _______________________________________________________________________________________________________ I. INTRODUCTION In the world of communication network and gift era it is additional vital to secure line through that we will send and receive the info or we will communicate firmly over channel and keep information securely. Currently cryptography may be a methodology that protects information while we have a tendency to be transferring information from one network to another network. to stay safe information or avoid the disclosed data ancient and fashionable cryptography are used. There are some standard public-key secret writing algorithms that contain some advanced calculation, for instance, RSA, ElGamal. Due to properties, options and characteristic of elliptic curve cryptography increased attention of the many skilled and scientists as a result of it have opened wealth potentialities in terms of security. Proposed a matrix scrambling algorithmic rule supported two way circular queues. In this case, we have a tendency to introduce a new secret writing methodology on elliptic curve supported matrix Scrambling technique. This paper shows a new technique of encrypting information that permits smart diffusion and has a singular technique of decrypting it back to the plaintext and is straightforward to implement victimization matrix scrambling methodology that is predicated on random function and shifting. The selection of operation performed on rows or columns is predicated on Binary worth of prime no. Therefore, the paper presents in details its implementation based on an elliptic curve given by the subsequent equation: y2 = x3 + x + 13 II. OVERVIEW OF ELLIPTIC CURVE The study of elliptic curves by algebraists, algebraic geometers and range theorists dates back to the center of the nineteenth century. Elliptic Curve Cryptography (ECC) was discovered in 1985 by Neil Koblitz and Victor Miller. Elliptic Curve Cryptography may be a public key Cryptography. ECC is right for environments like cellular phones and sensible cards. Moreover, due to the apparent hardness of the underlying elliptic curve separate logarithm downside (ECDLP), ECC systems also are well suited for applications that require long-run security requirements. Elliptic Curve Cryptography (ECC) may be a public key technology that gives performance blessings at higher security levels. Understanding ECC desires full mathematical background on elliptic curves. Elliptic curves aren't ellipses. The overall cubical equation of elliptic curves is y2 +axy+by=x3 +cx2 +dx+e. except for our purpose it's sufficient to limit the equation to the shape y2 =x3 +ax+b. Say EP(a,b) consisting of all the points (x,y) that satisfy the on top of equation in conjunction with part at infinity O. For ECC, we have a tendency to are involved with a restricted kind of elliptic curve that's outlined over a finite field. Of particular interest for cryptography is what's remarked as the elliptic cluster mod p, wherever p may be a prime. This is outlined as follows. Opt for 2 plus integers, a and b, but p that satisfy: 4a3 +27b2 (mod p) ≠0, Then Ep(a, b) denotes the elliptic group mod p whose elements (x, y) are pairs of nonnegative integers less than p satisfying: y2 mod p = (x3 + ax + b )mod p III.MAIN RESULTS In this section we offer the new methodology of secret writing of a message (plain text) and decrypting back once more to the original message (plain text)
  • 2. Cryptography using Elliptic Curve with Matrix Scrambling (J4R/ Volume 01 / Issue 01 / 005) All rights reserved by www.journalforresearch.org 22 The Planned Methodology Description:A. Encryption:1) The plaintext is remodeled on points of elliptic curve and therefore the corresponding code is organized into a circular queue system. Within the matrix M of n*m. The parameter p (Prime) represents the count of operations, say, the time of transformation we have a tendency to create to matrix. The ECC methodology needs that we have a tendency to choose a random integer a, that has to be unbroken secret. Then base on the binary worth of prime circular shift is performed. Let b=bit (rj), wherever j is bit position, the worth of b is considered and supported it circular left shift or circular right shift are performed on rows. Equally as rows, circular upward shift or circular downward shift are performed on columns. The process of secret writing is completed as following: Fig. 1: Encryption Process flowchart
  • 3. Cryptography using Elliptic Curve with Matrix Scrambling (J4R/ Volume 01 / Issue 01 / 005) All rights reserved by www.journalforresearch.org 23  Step1. The plaintext is mapped into points of elliptic curve. Then the code of points is ranged into bi-directional circular queue information sequence, within the matrix of n*m  Step2. a=Random (), with „aP‟ may be a random purpose that Decides that transformation is applied on matrix (Row, Columns). Once this we have a tendency to choose the code of „aP‟ and keep in r. the selection of operation performed on rows and columns is predicated on the little bit of the sequence r.  Step3. Let b=bit (rj), wherever j is bit position (LSB→MSB), that decides that transformation has got to be performed on rows and columns.  Step4. The worth of bits verified:  If the present bit position is one then shift row upward circularly and if current bit position is zero then shift column circular shift right. Merge the matrix information during a single string to form it additional strong. Decryption:2) The process is done by reversing the Operations done in the encryption process. The cipher text is arranged into a matrix of n*m noted M. The algorithm of decryption is given as follows:  Step 1: Convert merged data into matrix n*m Fig. 2: Decryption Process flowchart  Step 2. Browse p (prime no.).Reverse the binary sequence of primary such that: r=Reverse (p)  Step 3. For every worth b=bit (rj), wherever j is bit position such that operation is decoded that is given as : InverseTrans (M) In the case: j: LSB _m/2, the InverseTrans (M) is depending on the worth of b transpositions are performed.
  • 4. Cryptography using Elliptic Curve with Matrix Scrambling (J4R/ Volume 01 / Issue 01 / 005) All rights reserved by www.journalforresearch.org 24 If b=0 then upward shift columns else left shift operation is performed on rows. Within the case: j: m/2+1→MSB, the InverseTrans (M) depending on the worth of b transpositions are performed. If b=0 then right shift rows else downward shift operation is performed on columns. After decipherment the received message M and reverse the imbedding, we have a tendency to get the plaintext. Implementation Details of the Planned Algorithmic Rule:B. In this section, we have a tendency to take into account the elliptic curve given by the Weierstrass equation y2 = x3 + x + 13 Detailed method of our secret writing algorithmic rule by an example. In our case, we have a tendency to shall take a=58, then r=1010011101. In vector r, solely 10bits is taken into account. This provides the information concerning operation on Rows and columns (Rowtrans and Coltrans). Here in our case Alice needs to send a message”save” to Bob. First, she imbeds the message “save” into the elliptic curve E. Next, she represents the plain text ”save” as a series of bits recorded in matrix 4*10 as following: Binary sequence of r is explained within the figure No. 3: The technique of scrambling the matrix bits based on binary sequence of r is explained in the figure No. 3: Fig. 3: Encryption Process Fig. 4: Decryption Process The cipher text obtained is given as: 01100110000001011011001001010101110010011010011101 The secret writing process: In this section, we have a tendency to show the elaborated method of our decryption algorithmic rule with AN example. Consider the cipher text obtained once secret writing as: 01100110000001011011001001010101110010011010011101 The cipher text once inserting in matrix M of order n and m is given .The secret writing is completed by reading the last sequence of bits noted d in reverse order and reverse operation each Rowtrans and Coltrans. d=1010011101and r=Reverse d=1011100101 Then, the method of secret writing is given below When a similar plaintext is taken and once the secret writing is performed once more, then the resultant disorganized matrix is different. For an trespasser it'd be terribly troublesome to guess on that
  • 5. Cryptography using Elliptic Curve with Matrix Scrambling (J4R/ Volume 01 / Issue 01 / 005) All rights reserved by www.journalforresearch.org 25 purpose the secret writing method is performed and therefore improves the problem of decrypting. Our algorithm is predicated on magic parallelogram ,and therefore it's easy to grasp straightforward and straightforward and simple} to implement the planned algorithm, that additionally uses solely two styles of linear array operations, circular horizontal shifting(left, right) and circular vertical shifting(up, down). Therefore it works with efficiency with very little system resources. The parameter ‟m‟ additionally plays a crucial role in strengthening the intensity of secret writing beside the parameter ‟a‟. Looking on elliptic curve, the worth of parameter ‟m‟ plays a crucial role au fait the intensity of the secret writing. ‟m‟ mustn't be too tiny or too large. The experimental results show that the new scheme features a in no time secret writing speed and therefore the x-y coordinate is distended and it will resist all types of cryptanalytic. Thus, we have a tendency to conclude that the planned Fig 3. Secret writing method scheme will strengthens the elliptic curve cryptosystem against most of the present assaultive. IV.SAMPLE OUTPUT Fig. 5: Sample Output V. CONCLUSION In this paper, we've developed AN algorithmic rule secret writing and secret writing on elliptic curve victimization matrix scrambling technique. So, the usage of random purpose on elliptic curve firstly and second for choosing the operations for scrambling, avoids the regularity within the resultant cipher text that is remodeled from plaintext matrix, and hence improves the problem for decrypting. Finally, we like to suggests that the great selection of elliptic curve and a whole number worth ‟a‟
  • 6. Cryptography using Elliptic Curve with Matrix Scrambling (J4R/ Volume 01 / Issue 01 / 005) All rights reserved by www.journalforresearch.org 26 provides higher binary sequence, that is employed to scramble the matrix in each directions with efficiency. At the end, there's many scope to flirt with the choice of the ‟aP‟ purpose. Looking on the amount of memory demand, one will analyze the use of this algorithmic rule in tiny memory devices like sensible cards and mobile devices. This algorithmic rule is additionally applied to text secret writing, image secret writing, and transmission secret writing and then on. ECC may be a field wherever there's giant scope for higher research. ACKNOWLEDGMENT The authors would love to convey the collogues and senior faculty for his or her helpful suggestions. REFERENCES [1] J. J. Amador and R.W. Green, Symmetric-Key BlockCipher [2] Image and Text Cryptography, International Journal of Imaging and Technology, Vol. 15, No. 3, pp. 178-188, 2005. [3] N. Demytko, a replacement Elliptic Curve based mostly Analogue of RSA, in T.Helleseth, editor, Advances in Cryptology-Eurocrypt93, Springer-Verlag, New York, pp. 4049, 1994. [4] N. Koblitz, Elliptic Curve Cryptosystems, ed. Mathematics of Computation, Vol. 48, No. 177, pp. 203-209, 1987. [5] Elliptic curve cryptography victimisation matrix scrambling methodology, IEEE normal 2012 [6] V. S. Miller., Use of Elliptic Curves in Cryptography, Advances in cryptanalysis CRYPTO85, pp. 417-426, 1986. [7] Suli Wu, Yang Zhang, and Xu Jing, A Novel Encryption Algorithm Based on Shifting and Exchanging Rule of Bi-column Bi-row Circular Queue, CSSE (3)‟2008. pp.841-844, 2008. [8] Suli Shanghai dialect and Xiaofei Loloish, Text secret writing Algorithm based mostly Cyclic Shift, The Smart Internet‟2010. PP.3483-3486, 2010. [9] normal Specifications for Public Key Cryptography, IEEE normal p1363, 2000. [10] W. W. Yan Weimin, system, Tsinghua University Press, Beijing, 1992.