SlideShare a Scribd company logo
1 of 4
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303
IJTET©2015 87
Pairing Based Elliptic Curve Cryptosystem for
Message Authentication
T.Punitha1
1
Sethu Institute of technology,
Computer Science & Engineering,
tpunitha.cse@gmail.com
M.Sindhu2
2
Sethu Institute of Technology,
Computer Science & Engineering,
Sindhucse18@gmail.com
Abstract— Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that
can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of
the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers.
Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is
becoming widely used for mobile applications. Recently the bilinear pairing such as Weil Pairing or Tate Pairing on
elliptic curves and hyper elliptic curves has been found various applications in cryptography. Several identity-based
cryptosystems using bilinear pairings of elliptic curves or hyper elliptic curves were presented. Blind signature and ring
signature are very useful to provide the user’s anonymity and the signer’s privacy. The proposed method focuses an ID-
based ring signature scheme which is based on the pairings with elliptic curve cryptography. The proposed method is used
to reduce the number of computation of the pairing for the verification of the id based signature and also decoding of the
id based public key cryptosystems with authentication by factor of 2.
Index Terms— Asymmetric Cryptography, Bilinear pairing, Elliptic Curve, Elliptic Curve CryptoSystem(ECC), Secure ID
based signature.
.
——————————  ——————————
1 INTRODUCTION
ECC is a public key encryption technique based on the theory
of elliptic curves [1]. It can be used to create faster, smaller and more
efficient cryptographic keys. And also it generates keys through the
properties of the elliptic curve equation rather than the traditional
method of generation, as the product of very large prime numbers
[2]. This technology can be used in conjunction with most of the
public key encryption methods such as RSA and Diffie-Hellman.
ECC can yield a level of security with a 224-bit keys compared with
other systems that require a 2,048-bit keys. ECC provides features
such as security and computational efficiency [3]. The security of
ECC depends on the difficulty of solving the elliptic curve logarithm
problem.
Cryptography was used to assure only secrecy. Wax seals,
signatures, and other physical mechanisms were typically used to
assure integrity of the media and authenticity of the sender. With the
advent of electronic funds transfer, the applications of cryptography
for integrity began to surpass its use for secrecy [4]. The problem
with proving properties of protocols under other schemes is that the
mathematics is extremely complex for the RSA, and there is no
sound mathematical basis for the DES [5].
Public key cryptosystems are constructed by relying on the
hardness of mathematical problem. RSA based on Integer
Factorization Problem and DH based on the Discrete Logarithm
Problem [6]. The main problem of conventional Public key
Cryptosystems is that the Key size has to be sufficiently large in
order to meet the high level security requirement, resulting in lower
speed and consumption of more bandwidth [7].
The basic concept of cryptography is very simple. In a typical
cryptographic exchange, information that is meant to be hidden for
whatever reason is encrypted, or ciphered into a difficult-to-interpret
form. This is called conversion, encryption because it involves the
change of clear text, or understandable data, into cipher text, or
difficult-to-interpret data. The encryption process is one-half of the
entire cryptographic exchange [8].
At the other end of the process is decryption, or the
conversion of cipher text into clear text. Decryption is not always a
part of encryption, however – some algorithms are called ―hashes‖ as
they only apply encryption (that is, from clear to cipher text) and
have no means of deciphering the information. However, most
cryptographic algorithms can theoretically be cracked, but require
extraordinary amounts of computational power to do so.
A safety message authentication scheme networks using an
ID-based signature and verification mechanism. An ID-based
technique offers a certificate-less public key verification, while a
proxy signature provides flexibilities in message authentication and
trust management [1]. Message authentication, to ensure the
receiving message is true and coming from the claimed source, the
traditional PKI security schemes are not suitable for VANET [9].
Aiding of roadside unit (RSU) make message authentication in
VANET easily, but it is still embedded some problems: how to
authenticate the message transmitted from different RSU range, and
to process the vehicle's message hand-off among the different RSU
communication range. A comprehensive message authentication
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303
IJTET©2015 88
scheme which enables the message authentication in intra and inter
RSU range, and the hand-off within the different RSUs. The
proposed scheme makes the balance in the overhead of computations
and communication, and the security against the attacking. The
results of efficiency analysis and comparison with the related works
show the proposed scheme is a superior message authentication
method in VANET [10].
The most important research challenge is the authentication of
VANET messages with less communication as well as storage
overhead. So, Elliptic Curve Cryptography has chosen.
2 PROPOSED METHODOLOGY
The overall concept is explained through the flow diagram
as shown in the figure.1.
Fig. 1. Flow diagram of the proposed Methodology
Elliptical curve cryptography (ECC) is a public key
encryption technique based on elliptic curve theory that can be used
to create faster, smaller, and more efficient cryptographic keys. ECC
generates keys through the properties of the elliptic curve equation
instead of the traditional method of generation as the product of very
large prime numbers [13]. Because ECC helps to establish equivalent
security with lower computing power and battery resource usage, it
is becoming widely used for mobile applications.
A. Elliptic Curve
An Elliptic Curve can be described as the set of
solutions of an equation of the form Y2
= x3
+ ax + b over some
field[4]. The importance of elliptic curves is its rich structure
B. Elliptic Curve Cryptosystem
The system based on the elliptic curve is called Elliptic curve
cryptosystem. To form a cryptosystem, generally a set of three
algorithms is required:
1. Key-generation: An algorithm for generating an
encryption/decryption key.
2. Encryption: An algorithm for encrypting plain texts.
3. Decryption: An algorithm for decrypting cipher texts.
In traditional symmetric or private-key cryptography, the
generated key is used for both encryption and decryption, with the
consequence that anybody that possesses the key is able to en- and
decrypt messages. To ensure confidentiality, the key has to be kept
secret between communication partners [17].
C. Elliptic Curve Parameters
The most important thing defines all the elements in the
elliptic curve before used by all the parties. That is called as the
domain parameters of the scheme. Let p be the field in the prime
case and the pair (m, f) in the binary case. The elliptic curve is
defined by the constants a and b use in elliptic curve equation. And
the order of G, be the smallest non-negative number n such that
nG=∞, it is prime. Since is the size of a subgroup of E (FP) follows
from Lagrange's theorem that the number H=│E (FP) │is an integer.
In cryptographic applications h, called the cofactor, must be small
(H ≤) and, preferably h=1. The prime case the domain parameters are
(p, a, b, N, g, h) and in the binary case they are (M, P, a, b, n, G,h)
[11].
Several classes of curves are weak and should be avoided:
Curves over F2M
non-prime m are vulnerable to Weil descent attacks.
Curves such that n divides PB
=1(where p is the characteristic of the
field – q for a prime field, or 2 for a binary field) for sufficiently
small B are vulnerable to Menezes-Okamoto-Vanstone (MOV)
attack which applies usual Discrete Logarithm Problem (DLP) on a
small degree extension field of FB to solve ECDLP [12]. Curves such
that E (Fq) =Q are vulnerable to the attack that maps the points on the
curve o the additive group of FQ.
D. Key Sizes
ECC achieves the security level with smaller keys. Key
length is most important feature in Elliptic Curve Cryptography. For
example, for 80-bit security one needs a curve over FQ
, where
Q=2160
. This can be contrasted with finite-field cryptography (e.g.,
DSA) which requires 3072-bit public keys and 160-bit private keys,
and integer factorization cryptography (e.g., RSA) which requires a
1024-bit value of n, where the private key should be just as large.
E. Asymmetric Data Encryption
Group manager distributes and efficiently allocates the
public keys and authenticate by using the ECC authentication
mechanism. The Group owner's file has been applied security. The
confidentiality of this transformation is data in theory secure; we will
simply give the safety via the cryptography formula named as ECC
[15]. Since client files are stored in the server, they have lesser
security options. For crypto process we use the ECC algorithm for
the encryption and decryption process.
F. Asymmetric Data Decryption
Using the ECC algorithm file is converted as crypto files.
In order to get view the original content of the files, the encrypted
files should be decrypted. Each and every encrypted file should be
decrypted. Using Respective Private keys, files are decrypted using
the ECC Key Generator Decryption process is done by ECC
Algorithm, Since ECC has 166 key lengths it executes faster and
Plain Text
Message
Encryption
Logic
Encrypted
Message
ECC Key Pair
Generation
Decryption
Logic
RSU
Sender
Private Key
Receiver
Public
Key
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303
IJTET©2015 89
more secured algorithm than RSA [16].Our methodology gives the
results using ECC based algorithm, such as public key encryption for
sending the keys to co-distributors and secret key encryption for
further distribution of key.
G. Pairing
Pairing-based cryptography is used to pair two
cryptographic groups to a third group to construct cryptographic
systems [17]. If the same group is used for the first two groups, the
pairing is called symmetric and is a mapping from two elements of
one group to an element from a second group [3]. In this way,
pairings can be used to reduce a hard problem in one group to a
different, usually an easier problem in another group.
3 RESULTS AND DISCUSSION
The NetBeans IDE is a reusable framework that is
used to simplify the Java desktop applications developments.
NetBeans visual libraries are used. The additional SDK is required.
Installation of modules can be performed dynamically. It
also includes the features such as memory management, user setting
management, storage management.
The result shown in figure 2 and 3 describes message creation and
its corresponding Key pair generated by using Elliptic Curve
Cryptosystem.
Fig 2: Message Creation
Fig 3 : ECC Key Pair Generation
Fig 4: ECC Encryption
Fig 5: ECC Decryption
Fig.4. Shown the encrypted message of the given
message. Fig.5. Shown the decrypted message of the given
encrypted format of the message and finally we got an original
message. From the result, Message authentication be achieved by
Elliptic Curve Cryptosystem.
4 CONCLUSION
The developed method has to provide an efficient method
for a class of ID based cryptosystem using Elliptic Curve
Cryptography (ECC). The proposed method focuses an ID-based
ring signature scheme which is based on the pairings with elliptic
curve cryptography. Also, we analyze their security and efficiency.
The pairing on elliptic curves is applied for secure id based
cryptography. The proposed method is used to reduce the number of
computations of the pairing for the verification of the id based
signature and also decoding of the id based public key cryptosystems
with authentication by factor of 2.
Elliptic Curve Cryptography (ECC) will be applied in the
Vehicular Ad hoc Network (VANET).Hash function is going to use
to verify the messages exchanged with the VANET environment.
This will be helpful to achieve message authentication.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303
IJTET©2015 90
ACKNOWLEDGMENT
I would like to express my special thanks of gratitude to my
college management. In addition, I would also like to thank my parents
who helped me a lot in finalizing this project within the limited time
frame.
REFERENCES
[1] Manali Dubal, Aaradhana Deshmukh ―Achieving
Authentication and Integrity using Elliptic Curve Cryptography
Architecture‖ International Journal of Computer
Applications (0975 – 8887) Volume 69– No.24, May 2013.
[2] Darrel Hankerson, Alfred J. Menezes, and Scott Vanstone.
Guide to Elliptic Curve Cryptography. Springer-Verlag New
York, Inc., Secaucus, NJ, USA, 2013.
[3] D. Boneh and M. Franklin, ―Identity-based encryption from the
Weil pairing,‖ in Proc. Adv. Cryptol._CRYPTO, vol. 2139,
Lecture Notes in Computer Science, 2011, no. 2001, pp. 213–
229.
[4] Xiaoyan zhu, Shunrong jiang, Liangmin wang, and Hui li
―Efficient Privacy-Preserving Authentication for Vehicular
Ad Hoc Networks‖ IEEE Transactions On Vehicular
Technology, Vol. 63, No. 2, February 2014.
[5] K.A.Shim, ―An efficient conditional privacy-preserving
authentication scheme for vehicular sensor networks,‖ IEEE
Trans. Veh. Technol.,vol. 61, no. 4, pp. 1874–1883, May 2012.
[6] Rahat Afreen and S.C. Mehrotra ―A Review On Elliptic
Curve Cryptography For Embedded Systems‖ International
Journal of Computer Science & Information Technology
(IJCSIT), Vol 3, No 3, June 2011
[7] Nidhi and D.K. Lobiyal ―Performance Evaluation Of Realistic
Vanet Using Traffic Light Scenario‖ International Journal of
Wireless & Mobile Networks (IJWMN) Vol. 4, No. 1, Febrary
2012.
[8] V.Vijayalakshmi, S.Saranya, M.Sathya, C.Selvaroopini ―A
Novel Mechanism for Secure and Efficient VANET
Communication‖ International Journal of Computer Trends and
Technology (IJCTT) – volume 9 number 3– Mar 2014.
[9] Lei Zhang, Qianhong Wu, Agusti Solanas, Member, IEEE, and
Josep Domingo-Ferrer, Senior Member,IEEE”A Scalable
Robust Authentication Protocol for
SecureVehicular Communications ―IEEE Transactions On
Vehicular Technology, Vol. 59, No. 4, May 2010.
[10] Jinyuan Sun, Chi Zhang, Yanchao Zhang, and Yuguang Fang,
Fellow, IEEE ―An Identity-Based Security System for User
Privacy in Vehicular Ad Hoc Networks‖ IEEE Transactions
On Parallel And Distributed Systems, Vol. 21, No. 9,
September 2010.
[11] Lokesh A, Prapulla C, Srinivas Goud, Nivedita G Y,‖ Secured
Path For Message Transmission In Group Network Using
Elliptic Curve Cryptography‖International journal of
Innovative research and Development June,2013 Vol 2 Issue 6.
[12] Ghassan Samara, ― Certificate Revocation Management in
VANET‖ International Journal of Cyber-Security and Digital
Forensics (IJCSDF) 1(2): 115-121.
[13] ASHA ABRAHAM, K. INDIRA , ―Minimal Delay Message
Authentication Framework For Vanet ―International Journal
of Advanced Computational Engineering and Networking,
ISSN: 2320-2106
[14] E. S. Ismail, ―ID-Based Signature Scheme Using Elliptic
Curve Cryptosystem‖ Applied Mathematical Sciences, Vol.
7, 2013, no. 73, 3615 – 3624 HIKARI Ltd,
[15] N. Potlapally, S. Ravi, A. Raghunathan, and G.
Lakshminarayana, ―Optimizing public-key encryption for
wireless clients,‖ inProc. IEEE Int. Conf. Communications,
pp. 1050–1056, May 2012.
[16] Wilayat Khan,Habib Ullah,Riaz Hussian, ―Energy efficient
mutual authentication protocol for handheld device based on
public key cryptography‖ International Journal Of Computer
And Engineering October 2013.
[17] J. Petit and Z. Mammeri, ―Dynamic consensus for secured
vehicular ad hoc networks,‖ in Proc. IEEE 7th Int. Conf.
WiMob, Oct. 2011, pp.1–8.

More Related Content

What's hot

Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security Mathan Gopal
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptographyShivam Singh
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 

What's hot (20)

Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Security and Cryptography
Security and CryptographySecurity and Cryptography
Security and Cryptography
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 

Viewers also liked

A review of soft computing techniques in materials engineering
A review of soft computing techniques in materials engineeringA review of soft computing techniques in materials engineering
A review of soft computing techniques in materials engineeringIAEME Publication
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing basedijasa
 
Performance enhancement of shunt active power filter with fuzzy and hysteresi...
Performance enhancement of shunt active power filter with fuzzy and hysteresi...Performance enhancement of shunt active power filter with fuzzy and hysteresi...
Performance enhancement of shunt active power filter with fuzzy and hysteresi...Asoka Technologies
 
PI and fuzzy logic controllers for shunt active power filter
PI and fuzzy logic controllers for shunt active power filterPI and fuzzy logic controllers for shunt active power filter
PI and fuzzy logic controllers for shunt active power filterISA Interchange
 
Applying soft computing techniques to corporate mobile security systems
Applying soft computing techniques to corporate mobile security systemsApplying soft computing techniques to corporate mobile security systems
Applying soft computing techniques to corporate mobile security systemsPaloma De Las Cuevas
 
Design of shunt active power filter to mitigate harmonic
Design of shunt active power filter to mitigate harmonicDesign of shunt active power filter to mitigate harmonic
Design of shunt active power filter to mitigate harmonicsager alswed
 

Viewers also liked (6)

A review of soft computing techniques in materials engineering
A review of soft computing techniques in materials engineeringA review of soft computing techniques in materials engineering
A review of soft computing techniques in materials engineering
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing based
 
Performance enhancement of shunt active power filter with fuzzy and hysteresi...
Performance enhancement of shunt active power filter with fuzzy and hysteresi...Performance enhancement of shunt active power filter with fuzzy and hysteresi...
Performance enhancement of shunt active power filter with fuzzy and hysteresi...
 
PI and fuzzy logic controllers for shunt active power filter
PI and fuzzy logic controllers for shunt active power filterPI and fuzzy logic controllers for shunt active power filter
PI and fuzzy logic controllers for shunt active power filter
 
Applying soft computing techniques to corporate mobile security systems
Applying soft computing techniques to corporate mobile security systemsApplying soft computing techniques to corporate mobile security systems
Applying soft computing techniques to corporate mobile security systems
 
Design of shunt active power filter to mitigate harmonic
Design of shunt active power filter to mitigate harmonicDesign of shunt active power filter to mitigate harmonic
Design of shunt active power filter to mitigate harmonic
 

Similar to Pairing Based Elliptic Curve Cryptosystem for Message Authentication

Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
 

Similar to Pairing Based Elliptic Curve Cryptosystem for Message Authentication (20)

Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
C0281010016
C0281010016C0281010016
C0281010016
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
N45028390
N45028390N45028390
N45028390
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
O017128591
O017128591O017128591
O017128591
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
5215ijcis01
5215ijcis015215ijcis01
5215ijcis01
 
581 517-525
581 517-525581 517-525
581 517-525
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

Pairing Based Elliptic Curve Cryptosystem for Message Authentication

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303 IJTET©2015 87 Pairing Based Elliptic Curve Cryptosystem for Message Authentication T.Punitha1 1 Sethu Institute of technology, Computer Science & Engineering, tpunitha.cse@gmail.com M.Sindhu2 2 Sethu Institute of Technology, Computer Science & Engineering, Sindhucse18@gmail.com Abstract— Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is becoming widely used for mobile applications. Recently the bilinear pairing such as Weil Pairing or Tate Pairing on elliptic curves and hyper elliptic curves has been found various applications in cryptography. Several identity-based cryptosystems using bilinear pairings of elliptic curves or hyper elliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the signer’s privacy. The proposed method focuses an ID- based ring signature scheme which is based on the pairings with elliptic curve cryptography. The proposed method is used to reduce the number of computation of the pairing for the verification of the id based signature and also decoding of the id based public key cryptosystems with authentication by factor of 2. Index Terms— Asymmetric Cryptography, Bilinear pairing, Elliptic Curve, Elliptic Curve CryptoSystem(ECC), Secure ID based signature. . ——————————  —————————— 1 INTRODUCTION ECC is a public key encryption technique based on the theory of elliptic curves [1]. It can be used to create faster, smaller and more efficient cryptographic keys. And also it generates keys through the properties of the elliptic curve equation rather than the traditional method of generation, as the product of very large prime numbers [2]. This technology can be used in conjunction with most of the public key encryption methods such as RSA and Diffie-Hellman. ECC can yield a level of security with a 224-bit keys compared with other systems that require a 2,048-bit keys. ECC provides features such as security and computational efficiency [3]. The security of ECC depends on the difficulty of solving the elliptic curve logarithm problem. Cryptography was used to assure only secrecy. Wax seals, signatures, and other physical mechanisms were typically used to assure integrity of the media and authenticity of the sender. With the advent of electronic funds transfer, the applications of cryptography for integrity began to surpass its use for secrecy [4]. The problem with proving properties of protocols under other schemes is that the mathematics is extremely complex for the RSA, and there is no sound mathematical basis for the DES [5]. Public key cryptosystems are constructed by relying on the hardness of mathematical problem. RSA based on Integer Factorization Problem and DH based on the Discrete Logarithm Problem [6]. The main problem of conventional Public key Cryptosystems is that the Key size has to be sufficiently large in order to meet the high level security requirement, resulting in lower speed and consumption of more bandwidth [7]. The basic concept of cryptography is very simple. In a typical cryptographic exchange, information that is meant to be hidden for whatever reason is encrypted, or ciphered into a difficult-to-interpret form. This is called conversion, encryption because it involves the change of clear text, or understandable data, into cipher text, or difficult-to-interpret data. The encryption process is one-half of the entire cryptographic exchange [8]. At the other end of the process is decryption, or the conversion of cipher text into clear text. Decryption is not always a part of encryption, however – some algorithms are called ―hashes‖ as they only apply encryption (that is, from clear to cipher text) and have no means of deciphering the information. However, most cryptographic algorithms can theoretically be cracked, but require extraordinary amounts of computational power to do so. A safety message authentication scheme networks using an ID-based signature and verification mechanism. An ID-based technique offers a certificate-less public key verification, while a proxy signature provides flexibilities in message authentication and trust management [1]. Message authentication, to ensure the receiving message is true and coming from the claimed source, the traditional PKI security schemes are not suitable for VANET [9]. Aiding of roadside unit (RSU) make message authentication in VANET easily, but it is still embedded some problems: how to authenticate the message transmitted from different RSU range, and to process the vehicle's message hand-off among the different RSU communication range. A comprehensive message authentication
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303 IJTET©2015 88 scheme which enables the message authentication in intra and inter RSU range, and the hand-off within the different RSUs. The proposed scheme makes the balance in the overhead of computations and communication, and the security against the attacking. The results of efficiency analysis and comparison with the related works show the proposed scheme is a superior message authentication method in VANET [10]. The most important research challenge is the authentication of VANET messages with less communication as well as storage overhead. So, Elliptic Curve Cryptography has chosen. 2 PROPOSED METHODOLOGY The overall concept is explained through the flow diagram as shown in the figure.1. Fig. 1. Flow diagram of the proposed Methodology Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers [13]. Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is becoming widely used for mobile applications. A. Elliptic Curve An Elliptic Curve can be described as the set of solutions of an equation of the form Y2 = x3 + ax + b over some field[4]. The importance of elliptic curves is its rich structure B. Elliptic Curve Cryptosystem The system based on the elliptic curve is called Elliptic curve cryptosystem. To form a cryptosystem, generally a set of three algorithms is required: 1. Key-generation: An algorithm for generating an encryption/decryption key. 2. Encryption: An algorithm for encrypting plain texts. 3. Decryption: An algorithm for decrypting cipher texts. In traditional symmetric or private-key cryptography, the generated key is used for both encryption and decryption, with the consequence that anybody that possesses the key is able to en- and decrypt messages. To ensure confidentiality, the key has to be kept secret between communication partners [17]. C. Elliptic Curve Parameters The most important thing defines all the elements in the elliptic curve before used by all the parties. That is called as the domain parameters of the scheme. Let p be the field in the prime case and the pair (m, f) in the binary case. The elliptic curve is defined by the constants a and b use in elliptic curve equation. And the order of G, be the smallest non-negative number n such that nG=∞, it is prime. Since is the size of a subgroup of E (FP) follows from Lagrange's theorem that the number H=│E (FP) │is an integer. In cryptographic applications h, called the cofactor, must be small (H ≤) and, preferably h=1. The prime case the domain parameters are (p, a, b, N, g, h) and in the binary case they are (M, P, a, b, n, G,h) [11]. Several classes of curves are weak and should be avoided: Curves over F2M non-prime m are vulnerable to Weil descent attacks. Curves such that n divides PB =1(where p is the characteristic of the field – q for a prime field, or 2 for a binary field) for sufficiently small B are vulnerable to Menezes-Okamoto-Vanstone (MOV) attack which applies usual Discrete Logarithm Problem (DLP) on a small degree extension field of FB to solve ECDLP [12]. Curves such that E (Fq) =Q are vulnerable to the attack that maps the points on the curve o the additive group of FQ. D. Key Sizes ECC achieves the security level with smaller keys. Key length is most important feature in Elliptic Curve Cryptography. For example, for 80-bit security one needs a curve over FQ , where Q=2160 . This can be contrasted with finite-field cryptography (e.g., DSA) which requires 3072-bit public keys and 160-bit private keys, and integer factorization cryptography (e.g., RSA) which requires a 1024-bit value of n, where the private key should be just as large. E. Asymmetric Data Encryption Group manager distributes and efficiently allocates the public keys and authenticate by using the ECC authentication mechanism. The Group owner's file has been applied security. The confidentiality of this transformation is data in theory secure; we will simply give the safety via the cryptography formula named as ECC [15]. Since client files are stored in the server, they have lesser security options. For crypto process we use the ECC algorithm for the encryption and decryption process. F. Asymmetric Data Decryption Using the ECC algorithm file is converted as crypto files. In order to get view the original content of the files, the encrypted files should be decrypted. Each and every encrypted file should be decrypted. Using Respective Private keys, files are decrypted using the ECC Key Generator Decryption process is done by ECC Algorithm, Since ECC has 166 key lengths it executes faster and Plain Text Message Encryption Logic Encrypted Message ECC Key Pair Generation Decryption Logic RSU Sender Private Key Receiver Public Key
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303 IJTET©2015 89 more secured algorithm than RSA [16].Our methodology gives the results using ECC based algorithm, such as public key encryption for sending the keys to co-distributors and secret key encryption for further distribution of key. G. Pairing Pairing-based cryptography is used to pair two cryptographic groups to a third group to construct cryptographic systems [17]. If the same group is used for the first two groups, the pairing is called symmetric and is a mapping from two elements of one group to an element from a second group [3]. In this way, pairings can be used to reduce a hard problem in one group to a different, usually an easier problem in another group. 3 RESULTS AND DISCUSSION The NetBeans IDE is a reusable framework that is used to simplify the Java desktop applications developments. NetBeans visual libraries are used. The additional SDK is required. Installation of modules can be performed dynamically. It also includes the features such as memory management, user setting management, storage management. The result shown in figure 2 and 3 describes message creation and its corresponding Key pair generated by using Elliptic Curve Cryptosystem. Fig 2: Message Creation Fig 3 : ECC Key Pair Generation Fig 4: ECC Encryption Fig 5: ECC Decryption Fig.4. Shown the encrypted message of the given message. Fig.5. Shown the decrypted message of the given encrypted format of the message and finally we got an original message. From the result, Message authentication be achieved by Elliptic Curve Cryptosystem. 4 CONCLUSION The developed method has to provide an efficient method for a class of ID based cryptosystem using Elliptic Curve Cryptography (ECC). The proposed method focuses an ID-based ring signature scheme which is based on the pairings with elliptic curve cryptography. Also, we analyze their security and efficiency. The pairing on elliptic curves is applied for secure id based cryptography. The proposed method is used to reduce the number of computations of the pairing for the verification of the id based signature and also decoding of the id based public key cryptosystems with authentication by factor of 2. Elliptic Curve Cryptography (ECC) will be applied in the Vehicular Ad hoc Network (VANET).Hash function is going to use to verify the messages exchanged with the VANET environment. This will be helpful to achieve message authentication.
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 3 – MARCH 2015 – ISSN: 2349 – 9303 IJTET©2015 90 ACKNOWLEDGMENT I would like to express my special thanks of gratitude to my college management. In addition, I would also like to thank my parents who helped me a lot in finalizing this project within the limited time frame. REFERENCES [1] Manali Dubal, Aaradhana Deshmukh ―Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture‖ International Journal of Computer Applications (0975 – 8887) Volume 69– No.24, May 2013. [2] Darrel Hankerson, Alfred J. Menezes, and Scott Vanstone. Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2013. [3] D. Boneh and M. Franklin, ―Identity-based encryption from the Weil pairing,‖ in Proc. Adv. Cryptol._CRYPTO, vol. 2139, Lecture Notes in Computer Science, 2011, no. 2001, pp. 213– 229. [4] Xiaoyan zhu, Shunrong jiang, Liangmin wang, and Hui li ―Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks‖ IEEE Transactions On Vehicular Technology, Vol. 63, No. 2, February 2014. [5] K.A.Shim, ―An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks,‖ IEEE Trans. Veh. Technol.,vol. 61, no. 4, pp. 1874–1883, May 2012. [6] Rahat Afreen and S.C. Mehrotra ―A Review On Elliptic Curve Cryptography For Embedded Systems‖ International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011 [7] Nidhi and D.K. Lobiyal ―Performance Evaluation Of Realistic Vanet Using Traffic Light Scenario‖ International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 1, Febrary 2012. [8] V.Vijayalakshmi, S.Saranya, M.Sathya, C.Selvaroopini ―A Novel Mechanism for Secure and Efficient VANET Communication‖ International Journal of Computer Trends and Technology (IJCTT) – volume 9 number 3– Mar 2014. [9] Lei Zhang, Qianhong Wu, Agusti Solanas, Member, IEEE, and Josep Domingo-Ferrer, Senior Member,IEEE”A Scalable Robust Authentication Protocol for SecureVehicular Communications ―IEEE Transactions On Vehicular Technology, Vol. 59, No. 4, May 2010. [10] Jinyuan Sun, Chi Zhang, Yanchao Zhang, and Yuguang Fang, Fellow, IEEE ―An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks‖ IEEE Transactions On Parallel And Distributed Systems, Vol. 21, No. 9, September 2010. [11] Lokesh A, Prapulla C, Srinivas Goud, Nivedita G Y,‖ Secured Path For Message Transmission In Group Network Using Elliptic Curve Cryptography‖International journal of Innovative research and Development June,2013 Vol 2 Issue 6. [12] Ghassan Samara, ― Certificate Revocation Management in VANET‖ International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(2): 115-121. [13] ASHA ABRAHAM, K. INDIRA , ―Minimal Delay Message Authentication Framework For Vanet ―International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-2106 [14] E. S. Ismail, ―ID-Based Signature Scheme Using Elliptic Curve Cryptosystem‖ Applied Mathematical Sciences, Vol. 7, 2013, no. 73, 3615 – 3624 HIKARI Ltd, [15] N. Potlapally, S. Ravi, A. Raghunathan, and G. Lakshminarayana, ―Optimizing public-key encryption for wireless clients,‖ inProc. IEEE Int. Conf. Communications, pp. 1050–1056, May 2012. [16] Wilayat Khan,Habib Ullah,Riaz Hussian, ―Energy efficient mutual authentication protocol for handheld device based on public key cryptography‖ International Journal Of Computer And Engineering October 2013. [17] J. Petit and Z. Mammeri, ―Dynamic consensus for secured vehicular ad hoc networks,‖ in Proc. IEEE 7th Int. Conf. WiMob, Oct. 2011, pp.1–8.