SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 482 – 485
_______________________________________________________________________________________________
482
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
An Attempt to Improve Data Security in Text Based Cryptosystem Using Elliptic
Curve Cryptography
Saudamini B. Ingale1
, Miheeka G. Chaudhary2
, Anjali R. Patil3
,Aishvarya Akshaya V.4
, Dhanashree Toradmalle5
1,2,3,4
Student, B.E. Information Technology, Shah and Anchor Kutchhi Engineering College, Mumbai-400 088, India.
5
Assistant Professor, Information Technology, Shah and Anchor Kutchhi Engineering College, Mumbai-400 088, India.
1
damini.ingale@gmail.com, 2
miheeka.chaudhury@gmail.com, 3
anjalipatil289@gmail.com,
4
aakshayav10@gmail.com, 5
sakec.dhanashreet@gmail.com
Abstract—Data can be debilitated by hackers and spies. Cryptography helps us find better approaches to secure information in digital form.
Elliptic Curve Cryptography (ECC) is favorable over numerous cryptographic systems because of smaller keys and quick key generation. This
paper proposes a system which intends to provide multifold security in text based communication. The system has two main modules:
encryption, and decryption. Encoding scheme which works on variable length text block mapping technique has been exhibited, thereby
enhancing data security provided by ECC in text based cryptosystems. To leverage the advantages of ECC, it is being used in many applications.
This papers attempts to utilize ECC in text based cryptosystems efficiently.
Keywords- ECC, ASCII, Text based cryptosystem, variable length mapping, encoding.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
The security of ECC (Elliptic Curve Crytpography) mainly
lays on ECDLP[1] (Elliptic Curve Discrete Logarithmic
Problem) on the EC (Elliptic Curve) points. The fundamental
fascination of ECC over RSA (Rivest-Shamir-Adleman
algorithm) and DSA (Digital Signature Algorithm) is that it
takes full exponential time while the latter take sub-
exponential time. Although smaller keys are used in ECC as
contrasted to other cryptosystems such as RSA, the provided
security level is equal. ECC, an emerging attractive public-key
cryptosystem, also offers lower power consumption along with
memory and bandwidth savings.
The elliptic curve over a finite field E(Fp) forms an abelian
group under addition. This cryptosystem features three main
operations[2]: Point addition, Point Doubling and Point
Multiplication.
Let the two points on the elliptic curve be P(x1,y1) and
N(x2,y2). Then the addition of above two points will give a
third point Q on the same elliptic curve where Q=P+N=
Q(x3,y3). The point addition over finite field is computed using
the equations:
λ = (y2 - y1)/(x2 - x1)
x3 = λ2
- (x1 + x2)
y3= λ (x1- x3) - y1
Doubling of point P will give point Q(x3,y3) such that Q=2P.
Point doubling over finite field is computed using the
equations:
λ = (3x1
2
+ a)/ 2y1
x3 = λ2
- 2x1
y3 = λ(x1 - x3) - y1
Point Multiplication: Scalar multiplication of a point P by a
scalar k as being performed by repeated point addition and
point doubling. Many algorithms are available for performing
scalar multiplication efficiently[3].
Various protocols have been implemented over Elliptic Curve.
One of the public key agreement protocols, which is based on
ECC, is Elliptic Curve Diffie-Hellman (ECDH)[4]. It enables
the execution of Diffie-Hellman key trading algorithm using a
group of points on an elliptic curve.
II. LITERATURE REVIEW
Since ECC can encrypt and decrypt only a point,
comparative analysis of some important encoding schemes to
map text onto a point on EC can be understood from the
paper[5], A Survey of Different Encoding Schemes for
Improving the Efficiency of Text Based Cryptosystem using
ECC.
JayabhaskarMuthukuru and BachalaSathyanarayana[6]
have placed forth mapping techniques for text based messages
of fixed and variable lengths. Their paper presents
implementation of mapping of a text message into multiple
points on elliptic curve with Initial Vector (IV). Here, the text
message is initially divided into blocks, and every block is
EX-ORed with the IV. Then the resultant block is turned again
into ASCII (American Standard Code for Information
Interchange) format of base 256 format. At the receiver side,
an equivalent whole encryption method is applied in reverse
manner to get the corresponding plaintext message block. In
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 482 – 485
_______________________________________________________________________________________________
483
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
fixed length block mapping technique, the block size is fixed
before beginning the encoding method, whereas in variable
length block mapping technique, every word is taken into
account as a block and null characters are cushioned to the IV
or message block to equate their lengths.
S. Pramela Devi and Sindhuja K.[7] have proposed a
algorithm which includes application of genetic functions after
getting intermediate cipher. In this paper, a genetic rule based
elliptic curve cryptosystem has been proposed. Here the
message (plaintext) is encoded as x-y point on elliptic curve.
Then the key pair‘s non-public and public keys are calculated.
Then the generated keys are used over the plaintext to encrypt
it and supply associate degree intermediate cipher. Then the
intermediate cipher is passed to the genetic functions
crossover and mutation to supply the ultimate or final cipher.
In his paper[8],Marc Joye has portrayed a basic system to
accelerate the arithmetic operations in ECC by utilizing
appropriate to-left strategies. In specific settings, this prompts
a non-insignificant execution increment contrasted with the
left-to-right partners. In Elliptic curve point multiplication —
namely, the computation of Q = [k]P given a point P on an
elliptic curve and a scalar k —it's productivity relies on upon
various elements: the field definition, the elliptic bend show,
the interior point portrayal and, obviously, the scalar
augmentation technique itself (which likewise incorporates
point expansion and point multiplying
strategies).Fundamentally, there exist two primary groups of
scalar augmentation strategies, contingent upon the bearing
scalar k is examined: left-to-right techniques and ideal to-left
techniques. Suitable choice of point augmentation calculation
is required by the application where ECC is being used..
III. PROPOSED SYSTEM
Fig.1 shows the overall workflow of the proposed system. The
EC parameters such as a, b, p and G are agreed between the
sender and receiver before the communication begins, where
‗y2
= (x3
+ ax + b) mod p‘ is the EC equation. The system
presented in this paper consists of the following modules:
A. Encryption – Plaintext to Ciphertext
1. Plaintext Encoding
In this phase, the proposed framework[6] involves a mapping
method for text messages of variable length utilizing ECC.
Refer Fig.2.
Figure 1. Overall System
Figure 2. Mapping a message block onto an affine point on elliptic curve
This strategy gives mapping of atext message into multiple
points on elliptic curve with an Initial Vector (IV). The text
message is initially partitioned into blocks and each character
in the block is EX-ORed with the IV. The resultant block
obtained is converted into ASCII convention of base 256
format. This value is used as a multiplier to the chosen starting
point of the elliptic curve to transform/map the message block
into an affine point.
Message: Input text/string
IV: Initialization Vector
G: Base point of the selected EC
X: EXOR resultant
AT: ASCII value of the EX-ORed string
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 482 – 485
_______________________________________________________________________________________________
484
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Pm: Base point or the Chosen starting point of EC
Pmt: Transformed Point corresponding to a block of message
2. Basic ECC Encryption
The two points using formulae for Cm, as shown in Fig.3, also
known as intermediate cipher points are calculated.
3. Obtaining final Ciphertext
The next phase involves performing genetic functions[9] – 2-
point crossover and bit flip mutation - on the intermediate
cipher points. Refer Fig.3. The crossover points are chosen
and agreed upon between the communicating parties.
k: random number
PB: Public key of receiver
Cm: Intermediate cipher
Figure 3. Affine Point to Final Cipher
B. Decryption – Ciphertext to Plaintext
In decryption process using ECC, the key is ‗scalar
multiplication‘. At the receiver side, the same entire
encryption process is applied in reverse manner to obtain the
corresponding plaintext message block. Each character in the
block is obtained sequentially which together form the
message block, thereby keeping this sub-process transparent to
the user. Scalar multiplication is the way for the utilization of
elliptic curve for asymmetric cryptography; the basic operation
is itself genuinely straightforward, however its reverse (the
elliptic curve discrete logarithm) is exceptionally difficult.
Decryption is done with the assistance of private key of the
receiver where the operation utilized with it is point
multiplication. Refer Fig. 4.
nB: Private key of the receiver.
Figure 4. Decryption.
IV. RESULTS
The algorithm takes a string as input and separates it into
words, after which each word is processed character-by-
character through the algorithm proposed.
Output snippet 1:
Enter the input string:
The quick brown fox jumps over the lazy dog.
Outputsnippet 2: shows the results of algorithm when
encryption is implemented on character T from the above
input:
Biginteger value of IV:[50]
k:29
AT:102
Pmt: 337 , 33
C1= kG: 596 , 661
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 482 – 485
_______________________________________________________________________________________________
485
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
kPb : 194 , 123
C2 = Pmt+kPb : 82 , 254
CROSSOVER
Parent 1 -- binary kG:10010101001010010101
Parent 2 -- binary C2:00010100100011111110
crossover point:4
crossover point:12
child1:
10010100100010010101
child2:
00010101001011111110
MUTATION:
mutation child1:01101011011101101010
mutation child2:11101010110100000001
Final Cipher Points :
Point I:429,874
Point II:939,257
Output snippet 3 shows the results of algorithm when
decryption is done on the ciphertext obtained from the above
snippet:
reverse mutation chld1:10010100100010010101
reverse mutation child2:00010101001011111110
child1:
10010101001010010101
child2:
00010100100011111110
Receiver side C1 : 596 , 661
Receiver side C2 : 82 , 254
nkG : 194 , 123
RPmt : 337 , 33
Value of AT on receiver side:102
returned ASCII:102
binary value of X:1100110
plaintext in ASCII form after xor:84
plaintext:T
Similarly after executing the algorithm over the whole input
string, we get the plaintext message back as shown below:
The quick brown fox jumps over the lazy dog.
BUILD SUCCESSFUL (total time: 4 seconds)
The proposed system can also encrypt and decrypt input from
plain text files (such as files with .txt and .xml extensions).
V. FUTURE SCOPE
Awareness about Elliptic Curve Cryptography is raising
day-by-day among communities working in the field of
security. Few standard implementations over ECC such as
ECDSA and ECDH can be used to raise level of protection in
the current cryptosystems. They can also be incorporated in
various proposed systems utilizing ECC such as the above
one. Complexity based analysis can be employed to compare
these existing systems with the proposed system and discover
its areas of application further. Also the difficulty of the
proposed system can be raised by affiliating genetic
algorithm(GA) with it; GA can be employed to optimize some
or all of the elliptic curve domain parameters.
REFERENCES
[1] Darrel Hankerson, Alfred Menezes, and Scott Vanstone, ―Guide
to Elliptic Curve Cryptography‖, Springer: 2014, pp. 153-154.
[2] Laiphrakpam Dolendro Singh and Khumanthem Manglem
Singh, ―Implementation of Text Encryption using Elliptic Curve
Cryptography‖, IMCIP: 2015.
[3] Kaalidoss Rajamani and Dr. A. Arul L.S., ―Survey: Elliptic
Curve Cryptography using Scalar Multiplication Algorithms‖,
International Journal of Innovative Research in Advanced
Engineering (IJIRAE), Volume 1, Issue 1: March 2014.
[4] Kaalidoss Rajamani and Dr. A. Arul L.S., ―Survey: Elliptic
Curve Cryptography using Scalar Multiplication Algorithms‖,
International Journal of Innovative Research in Advanced
Engineering (IJIRAE), Volume 1, Issue 1: March 2014, pp. 3.
[5] Prof. Dhanashree Toradmalle, Saudamini B. Ingale, Miheeka G.
Chaudhary, Aishvarya Akshaya V., and Anjali R. Patil, ―A
Survey of Different Encoding Schemes for Improving the
Efficiency of Text Based Cryptosystem using ECC‖, IJCA:
November 2016.
[6] Jayabhaskar Muthukuru and Bachala Sathyanarayana, ―Fixed
and Variable Size Text Based Message Mapping Techniques
Using ECC‖, Global Journal of Computer Science and
Technology, Volume 12, Issue 3, Version 1.0: February 2012.
[7] S. Pramela Devi, Sindhuja K., ―A Public Key Cryptosystem
using ECC and Genetic Algorithm‖, IJERT, 2014.
[8] Marc Joye, ―Fast Point Multiplication on Elliptic Curves
Without Precomputation‖, Vol. 5130 of Lecture Notes in
Computer Science, Springer, 2008, pp. 36-44.
[9] http://www.obitko.com/tutorials/genetic-algorithms/crossover-
mutation

More Related Content

What's hot

Novel approach for predicting the rise and fall of stock index for a specific...
Novel approach for predicting the rise and fall of stock index for a specific...Novel approach for predicting the rise and fall of stock index for a specific...
Novel approach for predicting the rise and fall of stock index for a specific...
IAEME Publication
 
Simulating Multivariate Random Normal Data using Statistical Computing Platfo...
Simulating Multivariate Random Normal Data using Statistical Computing Platfo...Simulating Multivariate Random Normal Data using Statistical Computing Platfo...
Simulating Multivariate Random Normal Data using Statistical Computing Platfo...
ijtsrd
 
PERFORMANCE ANALYSIS and PREDICTION of NEPAL STOCK MARKET (NEPSE) for INVESTM...
PERFORMANCE ANALYSIS and PREDICTION of NEPAL STOCK MARKET (NEPSE) for INVESTM...PERFORMANCE ANALYSIS and PREDICTION of NEPAL STOCK MARKET (NEPSE) for INVESTM...
PERFORMANCE ANALYSIS and PREDICTION of NEPAL STOCK MARKET (NEPSE) for INVESTM...
Hari KC
 
Integration of Principal Component Analysis and Support Vector Regression fo...
 Integration of Principal Component Analysis and Support Vector Regression fo... Integration of Principal Component Analysis and Support Vector Regression fo...
Integration of Principal Component Analysis and Support Vector Regression fo...
IJCSIS Research Publications
 
Dynamic approach to k means clustering algorithm-2
Dynamic approach to k means clustering algorithm-2Dynamic approach to k means clustering algorithm-2
Dynamic approach to k means clustering algorithm-2
IAEME Publication
 

What's hot (15)

50120130406008
5012013040600850120130406008
50120130406008
 
Novel approach for predicting the rise and fall of stock index for a specific...
Novel approach for predicting the rise and fall of stock index for a specific...Novel approach for predicting the rise and fall of stock index for a specific...
Novel approach for predicting the rise and fall of stock index for a specific...
 
To find raise to five of any number
To find raise to five of any numberTo find raise to five of any number
To find raise to five of any number
 
Fault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curvesFault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curves
 
Intro & Applications of Discrete Math
Intro & Applications of Discrete MathIntro & Applications of Discrete Math
Intro & Applications of Discrete Math
 
Analysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationAnalysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer Application
 
Mathematical Analysis of Half Volume DRA with Performance Evaluation for High...
Mathematical Analysis of Half Volume DRA with Performance Evaluation for High...Mathematical Analysis of Half Volume DRA with Performance Evaluation for High...
Mathematical Analysis of Half Volume DRA with Performance Evaluation for High...
 
On Edge Antimagic Total Labeling and Arithmetic Progression
On Edge Antimagic Total Labeling and Arithmetic ProgressionOn Edge Antimagic Total Labeling and Arithmetic Progression
On Edge Antimagic Total Labeling and Arithmetic Progression
 
20320140502002
2032014050200220320140502002
20320140502002
 
A Survey on the Use of Pattern Recognition Techniques
A Survey on the Use of Pattern Recognition TechniquesA Survey on the Use of Pattern Recognition Techniques
A Survey on the Use of Pattern Recognition Techniques
 
Curve Fitting - Linear Algebra
Curve Fitting - Linear AlgebraCurve Fitting - Linear Algebra
Curve Fitting - Linear Algebra
 
Simulating Multivariate Random Normal Data using Statistical Computing Platfo...
Simulating Multivariate Random Normal Data using Statistical Computing Platfo...Simulating Multivariate Random Normal Data using Statistical Computing Platfo...
Simulating Multivariate Random Normal Data using Statistical Computing Platfo...
 
PERFORMANCE ANALYSIS and PREDICTION of NEPAL STOCK MARKET (NEPSE) for INVESTM...
PERFORMANCE ANALYSIS and PREDICTION of NEPAL STOCK MARKET (NEPSE) for INVESTM...PERFORMANCE ANALYSIS and PREDICTION of NEPAL STOCK MARKET (NEPSE) for INVESTM...
PERFORMANCE ANALYSIS and PREDICTION of NEPAL STOCK MARKET (NEPSE) for INVESTM...
 
Integration of Principal Component Analysis and Support Vector Regression fo...
 Integration of Principal Component Analysis and Support Vector Regression fo... Integration of Principal Component Analysis and Support Vector Regression fo...
Integration of Principal Component Analysis and Support Vector Regression fo...
 
Dynamic approach to k means clustering algorithm-2
Dynamic approach to k means clustering algorithm-2Dynamic approach to k means clustering algorithm-2
Dynamic approach to k means clustering algorithm-2
 

Similar to An Attempt to Improve Data Security in Text Based Cryptosystem Using Elliptic Curve Cryptography

Moment Preserving Approximation of Independent Components for the Reconstruct...
Moment Preserving Approximation of Independent Components for the Reconstruct...Moment Preserving Approximation of Independent Components for the Reconstruct...
Moment Preserving Approximation of Independent Components for the Reconstruct...
rahulmonikasharma
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
rahulmonikasharma
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
rahulmonikasharma
 
Smart License Plate Recognition Using Optical Character Recognition Based on ...
Smart License Plate Recognition Using Optical Character Recognition Based on ...Smart License Plate Recognition Using Optical Character Recognition Based on ...
Smart License Plate Recognition Using Optical Character Recognition Based on ...
rahulmonikasharma
 
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
rahulmonikasharma
 

Similar to An Attempt to Improve Data Security in Text Based Cryptosystem Using Elliptic Curve Cryptography (20)

A New Method for Figuring the Number of Hidden Layer Nodes in BP Algorithm
A New Method for Figuring the Number of Hidden Layer Nodes in BP AlgorithmA New Method for Figuring the Number of Hidden Layer Nodes in BP Algorithm
A New Method for Figuring the Number of Hidden Layer Nodes in BP Algorithm
 
Moment Preserving Approximation of Independent Components for the Reconstruct...
Moment Preserving Approximation of Independent Components for the Reconstruct...Moment Preserving Approximation of Independent Components for the Reconstruct...
Moment Preserving Approximation of Independent Components for the Reconstruct...
 
Design of suitable Magnitude Comparator Architecture for Big Data Analytics
Design of suitable Magnitude Comparator Architecture for Big Data AnalyticsDesign of suitable Magnitude Comparator Architecture for Big Data Analytics
Design of suitable Magnitude Comparator Architecture for Big Data Analytics
 
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGAOptimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
 
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGAOptimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
 
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
 
Analysis and implementation of modified k medoids
Analysis and implementation of modified k medoidsAnalysis and implementation of modified k medoids
Analysis and implementation of modified k medoids
 
Smart License Plate Recognition Using Optical Character Recognition Based on ...
Smart License Plate Recognition Using Optical Character Recognition Based on ...Smart License Plate Recognition Using Optical Character Recognition Based on ...
Smart License Plate Recognition Using Optical Character Recognition Based on ...
 
Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...
Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...
Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...
 
A Review on Various Types of Noise in CMOS Devices
A Review on Various Types of Noise in CMOS DevicesA Review on Various Types of Noise in CMOS Devices
A Review on Various Types of Noise in CMOS Devices
 
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
 
Design and Implementation of Visual Cryptography System for Transmission of S...
Design and Implementation of Visual Cryptography System for Transmission of S...Design and Implementation of Visual Cryptography System for Transmission of S...
Design and Implementation of Visual Cryptography System for Transmission of S...
 
High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
 
High Speed and Low Power Consumption Carry Skip Adder using Binary to Excess-...
High Speed and Low Power Consumption Carry Skip Adder using Binary to Excess-...High Speed and Low Power Consumption Carry Skip Adder using Binary to Excess-...
High Speed and Low Power Consumption Carry Skip Adder using Binary to Excess-...
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
 
GI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUES
GI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUESGI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUES
GI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUES
 
Grouping of Hashtags using Co-relating the Occurrence in Microblogs
Grouping of Hashtags using Co-relating the Occurrence in MicroblogsGrouping of Hashtags using Co-relating the Occurrence in Microblogs
Grouping of Hashtags using Co-relating the Occurrence in Microblogs
 

More from rahulmonikasharma

Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 
Advancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A StudyAdvancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A Study
 

Recently uploaded

Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
benjamincojr
 

Recently uploaded (20)

5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 

An Attempt to Improve Data Security in Text Based Cryptosystem Using Elliptic Curve Cryptography

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 482 – 485 _______________________________________________________________________________________________ 482 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ An Attempt to Improve Data Security in Text Based Cryptosystem Using Elliptic Curve Cryptography Saudamini B. Ingale1 , Miheeka G. Chaudhary2 , Anjali R. Patil3 ,Aishvarya Akshaya V.4 , Dhanashree Toradmalle5 1,2,3,4 Student, B.E. Information Technology, Shah and Anchor Kutchhi Engineering College, Mumbai-400 088, India. 5 Assistant Professor, Information Technology, Shah and Anchor Kutchhi Engineering College, Mumbai-400 088, India. 1 damini.ingale@gmail.com, 2 miheeka.chaudhury@gmail.com, 3 anjalipatil289@gmail.com, 4 aakshayav10@gmail.com, 5 sakec.dhanashreet@gmail.com Abstract—Data can be debilitated by hackers and spies. Cryptography helps us find better approaches to secure information in digital form. Elliptic Curve Cryptography (ECC) is favorable over numerous cryptographic systems because of smaller keys and quick key generation. This paper proposes a system which intends to provide multifold security in text based communication. The system has two main modules: encryption, and decryption. Encoding scheme which works on variable length text block mapping technique has been exhibited, thereby enhancing data security provided by ECC in text based cryptosystems. To leverage the advantages of ECC, it is being used in many applications. This papers attempts to utilize ECC in text based cryptosystems efficiently. Keywords- ECC, ASCII, Text based cryptosystem, variable length mapping, encoding. __________________________________________________*****_________________________________________________ I. INTRODUCTION The security of ECC (Elliptic Curve Crytpography) mainly lays on ECDLP[1] (Elliptic Curve Discrete Logarithmic Problem) on the EC (Elliptic Curve) points. The fundamental fascination of ECC over RSA (Rivest-Shamir-Adleman algorithm) and DSA (Digital Signature Algorithm) is that it takes full exponential time while the latter take sub- exponential time. Although smaller keys are used in ECC as contrasted to other cryptosystems such as RSA, the provided security level is equal. ECC, an emerging attractive public-key cryptosystem, also offers lower power consumption along with memory and bandwidth savings. The elliptic curve over a finite field E(Fp) forms an abelian group under addition. This cryptosystem features three main operations[2]: Point addition, Point Doubling and Point Multiplication. Let the two points on the elliptic curve be P(x1,y1) and N(x2,y2). Then the addition of above two points will give a third point Q on the same elliptic curve where Q=P+N= Q(x3,y3). The point addition over finite field is computed using the equations: λ = (y2 - y1)/(x2 - x1) x3 = λ2 - (x1 + x2) y3= λ (x1- x3) - y1 Doubling of point P will give point Q(x3,y3) such that Q=2P. Point doubling over finite field is computed using the equations: λ = (3x1 2 + a)/ 2y1 x3 = λ2 - 2x1 y3 = λ(x1 - x3) - y1 Point Multiplication: Scalar multiplication of a point P by a scalar k as being performed by repeated point addition and point doubling. Many algorithms are available for performing scalar multiplication efficiently[3]. Various protocols have been implemented over Elliptic Curve. One of the public key agreement protocols, which is based on ECC, is Elliptic Curve Diffie-Hellman (ECDH)[4]. It enables the execution of Diffie-Hellman key trading algorithm using a group of points on an elliptic curve. II. LITERATURE REVIEW Since ECC can encrypt and decrypt only a point, comparative analysis of some important encoding schemes to map text onto a point on EC can be understood from the paper[5], A Survey of Different Encoding Schemes for Improving the Efficiency of Text Based Cryptosystem using ECC. JayabhaskarMuthukuru and BachalaSathyanarayana[6] have placed forth mapping techniques for text based messages of fixed and variable lengths. Their paper presents implementation of mapping of a text message into multiple points on elliptic curve with Initial Vector (IV). Here, the text message is initially divided into blocks, and every block is EX-ORed with the IV. Then the resultant block is turned again into ASCII (American Standard Code for Information Interchange) format of base 256 format. At the receiver side, an equivalent whole encryption method is applied in reverse manner to get the corresponding plaintext message block. In
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 482 – 485 _______________________________________________________________________________________________ 483 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ fixed length block mapping technique, the block size is fixed before beginning the encoding method, whereas in variable length block mapping technique, every word is taken into account as a block and null characters are cushioned to the IV or message block to equate their lengths. S. Pramela Devi and Sindhuja K.[7] have proposed a algorithm which includes application of genetic functions after getting intermediate cipher. In this paper, a genetic rule based elliptic curve cryptosystem has been proposed. Here the message (plaintext) is encoded as x-y point on elliptic curve. Then the key pair‘s non-public and public keys are calculated. Then the generated keys are used over the plaintext to encrypt it and supply associate degree intermediate cipher. Then the intermediate cipher is passed to the genetic functions crossover and mutation to supply the ultimate or final cipher. In his paper[8],Marc Joye has portrayed a basic system to accelerate the arithmetic operations in ECC by utilizing appropriate to-left strategies. In specific settings, this prompts a non-insignificant execution increment contrasted with the left-to-right partners. In Elliptic curve point multiplication — namely, the computation of Q = [k]P given a point P on an elliptic curve and a scalar k —it's productivity relies on upon various elements: the field definition, the elliptic bend show, the interior point portrayal and, obviously, the scalar augmentation technique itself (which likewise incorporates point expansion and point multiplying strategies).Fundamentally, there exist two primary groups of scalar augmentation strategies, contingent upon the bearing scalar k is examined: left-to-right techniques and ideal to-left techniques. Suitable choice of point augmentation calculation is required by the application where ECC is being used.. III. PROPOSED SYSTEM Fig.1 shows the overall workflow of the proposed system. The EC parameters such as a, b, p and G are agreed between the sender and receiver before the communication begins, where ‗y2 = (x3 + ax + b) mod p‘ is the EC equation. The system presented in this paper consists of the following modules: A. Encryption – Plaintext to Ciphertext 1. Plaintext Encoding In this phase, the proposed framework[6] involves a mapping method for text messages of variable length utilizing ECC. Refer Fig.2. Figure 1. Overall System Figure 2. Mapping a message block onto an affine point on elliptic curve This strategy gives mapping of atext message into multiple points on elliptic curve with an Initial Vector (IV). The text message is initially partitioned into blocks and each character in the block is EX-ORed with the IV. The resultant block obtained is converted into ASCII convention of base 256 format. This value is used as a multiplier to the chosen starting point of the elliptic curve to transform/map the message block into an affine point. Message: Input text/string IV: Initialization Vector G: Base point of the selected EC X: EXOR resultant AT: ASCII value of the EX-ORed string
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 482 – 485 _______________________________________________________________________________________________ 484 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Pm: Base point or the Chosen starting point of EC Pmt: Transformed Point corresponding to a block of message 2. Basic ECC Encryption The two points using formulae for Cm, as shown in Fig.3, also known as intermediate cipher points are calculated. 3. Obtaining final Ciphertext The next phase involves performing genetic functions[9] – 2- point crossover and bit flip mutation - on the intermediate cipher points. Refer Fig.3. The crossover points are chosen and agreed upon between the communicating parties. k: random number PB: Public key of receiver Cm: Intermediate cipher Figure 3. Affine Point to Final Cipher B. Decryption – Ciphertext to Plaintext In decryption process using ECC, the key is ‗scalar multiplication‘. At the receiver side, the same entire encryption process is applied in reverse manner to obtain the corresponding plaintext message block. Each character in the block is obtained sequentially which together form the message block, thereby keeping this sub-process transparent to the user. Scalar multiplication is the way for the utilization of elliptic curve for asymmetric cryptography; the basic operation is itself genuinely straightforward, however its reverse (the elliptic curve discrete logarithm) is exceptionally difficult. Decryption is done with the assistance of private key of the receiver where the operation utilized with it is point multiplication. Refer Fig. 4. nB: Private key of the receiver. Figure 4. Decryption. IV. RESULTS The algorithm takes a string as input and separates it into words, after which each word is processed character-by- character through the algorithm proposed. Output snippet 1: Enter the input string: The quick brown fox jumps over the lazy dog. Outputsnippet 2: shows the results of algorithm when encryption is implemented on character T from the above input: Biginteger value of IV:[50] k:29 AT:102 Pmt: 337 , 33 C1= kG: 596 , 661
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 482 – 485 _______________________________________________________________________________________________ 485 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ kPb : 194 , 123 C2 = Pmt+kPb : 82 , 254 CROSSOVER Parent 1 -- binary kG:10010101001010010101 Parent 2 -- binary C2:00010100100011111110 crossover point:4 crossover point:12 child1: 10010100100010010101 child2: 00010101001011111110 MUTATION: mutation child1:01101011011101101010 mutation child2:11101010110100000001 Final Cipher Points : Point I:429,874 Point II:939,257 Output snippet 3 shows the results of algorithm when decryption is done on the ciphertext obtained from the above snippet: reverse mutation chld1:10010100100010010101 reverse mutation child2:00010101001011111110 child1: 10010101001010010101 child2: 00010100100011111110 Receiver side C1 : 596 , 661 Receiver side C2 : 82 , 254 nkG : 194 , 123 RPmt : 337 , 33 Value of AT on receiver side:102 returned ASCII:102 binary value of X:1100110 plaintext in ASCII form after xor:84 plaintext:T Similarly after executing the algorithm over the whole input string, we get the plaintext message back as shown below: The quick brown fox jumps over the lazy dog. BUILD SUCCESSFUL (total time: 4 seconds) The proposed system can also encrypt and decrypt input from plain text files (such as files with .txt and .xml extensions). V. FUTURE SCOPE Awareness about Elliptic Curve Cryptography is raising day-by-day among communities working in the field of security. Few standard implementations over ECC such as ECDSA and ECDH can be used to raise level of protection in the current cryptosystems. They can also be incorporated in various proposed systems utilizing ECC such as the above one. Complexity based analysis can be employed to compare these existing systems with the proposed system and discover its areas of application further. Also the difficulty of the proposed system can be raised by affiliating genetic algorithm(GA) with it; GA can be employed to optimize some or all of the elliptic curve domain parameters. REFERENCES [1] Darrel Hankerson, Alfred Menezes, and Scott Vanstone, ―Guide to Elliptic Curve Cryptography‖, Springer: 2014, pp. 153-154. [2] Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, ―Implementation of Text Encryption using Elliptic Curve Cryptography‖, IMCIP: 2015. [3] Kaalidoss Rajamani and Dr. A. Arul L.S., ―Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms‖, International Journal of Innovative Research in Advanced Engineering (IJIRAE), Volume 1, Issue 1: March 2014. [4] Kaalidoss Rajamani and Dr. A. Arul L.S., ―Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms‖, International Journal of Innovative Research in Advanced Engineering (IJIRAE), Volume 1, Issue 1: March 2014, pp. 3. [5] Prof. Dhanashree Toradmalle, Saudamini B. Ingale, Miheeka G. Chaudhary, Aishvarya Akshaya V., and Anjali R. Patil, ―A Survey of Different Encoding Schemes for Improving the Efficiency of Text Based Cryptosystem using ECC‖, IJCA: November 2016. [6] Jayabhaskar Muthukuru and Bachala Sathyanarayana, ―Fixed and Variable Size Text Based Message Mapping Techniques Using ECC‖, Global Journal of Computer Science and Technology, Volume 12, Issue 3, Version 1.0: February 2012. [7] S. Pramela Devi, Sindhuja K., ―A Public Key Cryptosystem using ECC and Genetic Algorithm‖, IJERT, 2014. [8] Marc Joye, ―Fast Point Multiplication on Elliptic Curves Without Precomputation‖, Vol. 5130 of Lecture Notes in Computer Science, Springer, 2008, pp. 36-44. [9] http://www.obitko.com/tutorials/genetic-algorithms/crossover- mutation