The document presents an authenticated public key encryption scheme using elliptic curve cryptography. It proposes a double encryption method to securely transmit confidential data between a sender and receiver. In the scheme, the sender and receiver first agree on an elliptic curve and generator point over a finite field. They generate private/public key pairs and specific public keys for each other. The sender encrypts the message points in two stages - first generating cipher points using a random integer, and then performing XOR operations on the point coordinates with other values. The receiver decrypts the cipher text in two stages to recover the original message points and plaintext. An example is provided to illustrate the encryption and decryption process.
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
Elliptic Curve Cryptography (ECC) gained a lot of attention in industry. The key attraction of ECC over RSA is that it
offers equal security even for smaller bit size, thus reducing the processing complexity. ECC Encryption and Decryption methods can
only perform encrypt and decrypt operations on the curve but not on the message. This paper presents a fast mapping method based on
matrix approach for ECC, which offers high security for the encrypted message. First, the alphabetic message is mapped on to the
points on an elliptic curve. Later encode those points using Elgamal encryption method with the use of a non-singular matrix. And the
encoded message can be decrypted by Elgamal decryption technique and to get back the original message, the matrix obtained from
decoding is multiplied with the inverse of non-singular matrix. The coding is done using Verilog. The design is simulated and
synthesized using FPGA.
Ecc cipher processor based on knapsack algorithmAlexander Decker
This document describes a method for encrypting messages using Elliptic Curve Cryptography (ECC) combined with the knapsack algorithm. It begins by explaining the basics of ECC, including defining elliptic curves over a finite field and describing point addition and doubling operations. It then presents algorithms for the full encryption/decryption process. The process involves first transforming the message into points on an elliptic curve, then applying the knapsack algorithm to further encrypt the ECC-encrypted message before transmission. Decryption reverses these steps to recover the original message. The combination of ECC and knapsack encryption is presented as an innovation that provides increased security over traditional ECC alone.
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
The Elliptic Curve Digital Signature Algorithm (ECDSA) is an elliptic curve variant of the
Digital Signature Algorithm (DSA). It gives cryptographically strong digital signatures making
use of Elliptic curve discrete logarithmic problem. It uses arithmetic with much smaller
numbers 160/256 bits instead of 1024/2048 bits in RSA and DSA and provides the same level of
security. The ECDSA was accepted in 1999 as an ANSI standard, and was accepted in 2000 as
IEEE and NIST standards. It was also accepted in 1998 as an ISO standard. Many cryptologist
have studied security aspects of ECDSA and proposed different variants. In this paper, we
discuss a detailed analysis of the original ECDSA and all its available variants in terms of the
security level and execution time of all the phases. To the best of our knowledge, this is a unique
attempt to juxtapose and compare the ECDSA with all of its variants.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document discusses the implementation of Elliptic Curve Digital Signature Algorithm (ECDSA) using variable text message encryption methods. It begins with an abstract that outlines ECDSA, its advantages over other digital signature algorithms like smaller key size, and implementation of ECDSA over elliptic curves P-192 and P-256 with variable size text message, fixed size text message, and text based message encryption. It then provides details on elliptic curve cryptography, the elliptic curve discrete logarithm problem, finite fields, and domain parameters for ECDSA.
This document presents a block cipher that incorporates concepts from the Hill cipher and previous block ciphers developed by the authors. The cipher uses a key matrix K and encryption key bunch matrix E to encrypt plaintext P into ciphertext C. Decryption uses the inverse of K and a decryption key bunch matrix D to recover P from C. The cipher is strengthened by including Mix() and Imix() functions that diffuse bits during encryption and decryption rounds. Cryptanalysis shows the cipher is unbreakable against known attacks due to the diffusion achieved by superimposing Hill cipher and previous block cipher concepts. In 3 sentences or less, this document proposes and analyzes a block cipher combining aspects of Hill cipher and previous work, using key matrices for
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
The document summarizes a seminar report on a hybrid cryptography architecture that uses multiple cryptographic algorithms. It discusses Elliptic Curve Cryptography (ECC), Elliptic Curve Diffie-Hellman (ECDH), Elliptic Curve Digital Signature Algorithm (ECDSA), and Dual-RSA. ECC is used to encrypt data onto an elliptic curve. ECDH generates shared secret keys between two parties for use in symmetric encryption. ECDSA allows digital signatures using elliptic curve parameters. Dual-RSA improves decryption efficiency using the Chinese Remainder Theorem to split computations between prime factors p and q. The hybrid architecture combines the strengths of these algorithms to provide secure encryption, authentication, and key exchange.
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
Elliptic Curve Cryptography (ECC) gained a lot of attention in industry. The key attraction of ECC over RSA is that it
offers equal security even for smaller bit size, thus reducing the processing complexity. ECC Encryption and Decryption methods can
only perform encrypt and decrypt operations on the curve but not on the message. This paper presents a fast mapping method based on
matrix approach for ECC, which offers high security for the encrypted message. First, the alphabetic message is mapped on to the
points on an elliptic curve. Later encode those points using Elgamal encryption method with the use of a non-singular matrix. And the
encoded message can be decrypted by Elgamal decryption technique and to get back the original message, the matrix obtained from
decoding is multiplied with the inverse of non-singular matrix. The coding is done using Verilog. The design is simulated and
synthesized using FPGA.
Ecc cipher processor based on knapsack algorithmAlexander Decker
This document describes a method for encrypting messages using Elliptic Curve Cryptography (ECC) combined with the knapsack algorithm. It begins by explaining the basics of ECC, including defining elliptic curves over a finite field and describing point addition and doubling operations. It then presents algorithms for the full encryption/decryption process. The process involves first transforming the message into points on an elliptic curve, then applying the knapsack algorithm to further encrypt the ECC-encrypted message before transmission. Decryption reverses these steps to recover the original message. The combination of ECC and knapsack encryption is presented as an innovation that provides increased security over traditional ECC alone.
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
The Elliptic Curve Digital Signature Algorithm (ECDSA) is an elliptic curve variant of the
Digital Signature Algorithm (DSA). It gives cryptographically strong digital signatures making
use of Elliptic curve discrete logarithmic problem. It uses arithmetic with much smaller
numbers 160/256 bits instead of 1024/2048 bits in RSA and DSA and provides the same level of
security. The ECDSA was accepted in 1999 as an ANSI standard, and was accepted in 2000 as
IEEE and NIST standards. It was also accepted in 1998 as an ISO standard. Many cryptologist
have studied security aspects of ECDSA and proposed different variants. In this paper, we
discuss a detailed analysis of the original ECDSA and all its available variants in terms of the
security level and execution time of all the phases. To the best of our knowledge, this is a unique
attempt to juxtapose and compare the ECDSA with all of its variants.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document discusses the implementation of Elliptic Curve Digital Signature Algorithm (ECDSA) using variable text message encryption methods. It begins with an abstract that outlines ECDSA, its advantages over other digital signature algorithms like smaller key size, and implementation of ECDSA over elliptic curves P-192 and P-256 with variable size text message, fixed size text message, and text based message encryption. It then provides details on elliptic curve cryptography, the elliptic curve discrete logarithm problem, finite fields, and domain parameters for ECDSA.
This document presents a block cipher that incorporates concepts from the Hill cipher and previous block ciphers developed by the authors. The cipher uses a key matrix K and encryption key bunch matrix E to encrypt plaintext P into ciphertext C. Decryption uses the inverse of K and a decryption key bunch matrix D to recover P from C. The cipher is strengthened by including Mix() and Imix() functions that diffuse bits during encryption and decryption rounds. Cryptanalysis shows the cipher is unbreakable against known attacks due to the diffusion achieved by superimposing Hill cipher and previous block cipher concepts. In 3 sentences or less, this document proposes and analyzes a block cipher combining aspects of Hill cipher and previous work, using key matrices for
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
The document summarizes a seminar report on a hybrid cryptography architecture that uses multiple cryptographic algorithms. It discusses Elliptic Curve Cryptography (ECC), Elliptic Curve Diffie-Hellman (ECDH), Elliptic Curve Digital Signature Algorithm (ECDSA), and Dual-RSA. ECC is used to encrypt data onto an elliptic curve. ECDH generates shared secret keys between two parties for use in symmetric encryption. ECDSA allows digital signatures using elliptic curve parameters. Dual-RSA improves decryption efficiency using the Chinese Remainder Theorem to split computations between prime factors p and q. The hybrid architecture combines the strengths of these algorithms to provide secure encryption, authentication, and key exchange.
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Elliptic Curve Cryptography (ECC) provides a secure
means of key exchange between communicating nodes using the
Diffie-Hellman (DH) Key Exchange algorithm. This work
presents an ECC encryption implementation using of the DH
key exchange algorithm. Both encryption and decryption of text
messages using this algorithm, have been attempted. In ECC,
encoding is carried out by mapping a message character to an
affine point on an elliptic curve. It can be observed from the
comparison of the proposed algorithm and Koblitz’s encoding
method, that the proposed algorithm is as secure as Koblitz’s
encoding method and the proposed algorithm has less
computational complexity as the encoding phase is eliminated
altogether. Hence, energy efficiency of the crypto system is
improved and the same can be used in resource constrained
applications, such as Wireless sensor networks (WSNs). It is
almost infeasible to attempt a brute force attack. The security
strength of the algorithm is proportional to the key length.
However, any increase in the key length results in more
communication overhead due to encryption.
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information
Elliptic Curves as Tool for Public Key Cryptographyinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
Abstract: Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high security and short key. It is suitable for the hardware of implementation, so ECC has been more and more focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA. Index Terms – VHDL, FSM, FPGA, Elliptic Curve Cryptography.
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
Cryptography is the study of techniques for ensuring the secrecy and authentication of the
information. The development of public-key cryptography is the greatest and perhaps the only true revolution in
the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing
up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve
cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the
processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high
security and short key. It is suitable for the hardware of implementation, so ECC has been more and more
focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small
area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation
ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional
successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA
Modified Koblitz Encoding Method for ECCidescitation
Extensive use of Wireless Sensor Networks is giving
rise to different types of threats in certain commercial and
military applications. To protect the WSN data communication
against various threats appropriate security schemes are
needed. However, WSN nodes are resource constrained, with
respect to limited battery energy, and limited computational
and memory available with each WSN node. Hence, the
security model to be used in WSN’s should use minimal
resources to the extent possible and it should also provide
good security. Elliptic curve cryptography (ECC) is the best
suited algorithm for WSNs, as it offers better security for
smaller key sizes compared to the popular RSA algorithm. In
ECC, encoding of message data to a point lying on the give
Elliptic Curve is a major problem as the encoding consumes
more resources. This paper provides a novel encoding
procedure to overcome these problems to a large extent. This
paper also describes implementation aspects of the proposed
encoding and decoding methods.
The document describes Reed-Solomon error correcting codes. It begins by defining error correcting codes and their use of redundancy to recover corrupted data. It then discusses encoding messages into codewords by evaluating polynomials over finite fields and transmitting the codewords. The relationship between code rate, relative distance and error correction capability is also covered, along with the Singleton bound. Reed-Solomon codes specifically encode messages as polynomial coefficients and evaluate the polynomials at predefined points to generate codewords.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
This document proposes two fault tolerant schemes for stream ciphers based on Algorithm Based Fault Tolerance (ABFT). The first is a 2-D mesh ABFT scheme that can detect and correct any single error in an n-by-n plaintext matrix with linear computation and bandwidth overhead. It constructs matrices for the plaintext, keystream, and transmitted data with row and column checksums. The second is a 3-D mesh-knight ABFT scheme that can detect and correct up to three errors by adding an extra "knight" checksum dimension. Both schemes use only XOR operations and allow errors to be efficiently located and recovered.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
To enhance the security and reliability of the widely-used stream ciphers, a 2-D and a 3-D mesh-knight Algorithm Based Fault Tolerant (ABFT) schemes for stream ciphers are developed which can be universally applied to RC4 and other stream ciphers. Based on the ready-made arithmetic unit in stream ciphers, the proposed 2-D ABFT scheme is able to detect and correct any simple error, and the 3-D meshknight ABFT scheme is capable of detecting and correcting up to three errors in an n2 -data matrix with liner computation and bandwidth overhead. The proposed schemes provide one-to-one mapping between data index and check sum group so that error can be located and recovered by easier logic and simple operations.
The document discusses different methods of encoding, including binary encoding, which represents data as strings of 1s and 0s. It also mentions encoding techniques like octal encoding, hexadecimal encoding, and permutation encoding. Genetic algorithms are commonly used to solve optimization problems, with chromosomes represented as binary-coded strings. The length of these strings determines the solution accuracy. Encoding translates information into a format that can be processed or transmitted, while decoding translates it back to the original format.
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...IJNSA Journal
Secure communication of the sensitive information in disguised form to the genuine recipient so that an intended recipient alone can remove the disguise and recover the original message is the essence of Cryptography. Encrypting the message two or more times with different encryption techniques and with different keys increases the security levels than the single encryption. A cascade cipher is stronger than the first component. This paper presents multiple encryption schemes using different encryption techniques Braiding/Entanglement of Pauli Spin 3/2 matrices and Rotation of the bits with independent secret keys.
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
This document proposes a new algorithm for speech encryption that uses quantum chaotic maps, k-means clustering, and two stages of scrambling. The first stage uses a tent map to scramble bits in the binary representation of the signal. The second stage uses k-means clustering to scramble blocks of the signal. A quantum logistic map is used to generate an encryption key. The proposed method is evaluated using statistical quality metrics and is shown to provide secure and efficient speech encryption while maintaining high quality of recovered speech.
Neuro genetic key based recursive modulo 2 substitution using mutated charact...ijcsity
In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed
through recursive modulo
-
2 substitution using mutated character code generation for online wireless
communication of data/information.
Both sender and receive
r get synchronized based on their final output
.
The length of the key depends on the number of input and output neurons. Coordinated matching weight
vectors assist to generate chromosomes pool. Genetic secret key is obtained using fitness function, which i
s
the hamming distance between two chromosomes. Crossover and mutation are used to add elitism of
chromosomes.
At first
mutated character code table
based encryption strategy get perform on plain text.
.
Then the intermediate cipher text is yet again encry
pted through recursive positional modulo
-
2 substitution
technique to from next level encrypted text. This 2nd level intermediate cipher text is again encrypted to
form the final cipher text through chaining and cascaded xoring of neuro genetic key with the
identical
length intermediate cipher text block.
Receiver will perform same symmetric operation to get back the plain
text using identical key
International Journal of Computational Engineering Research(IJCER) ijceronline
This document presents an implementation of an Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol using VB.NET. ECDH is based on the elliptic curve discrete logarithm problem and allows two parties to generate a shared secret key over an insecure channel. The implementation uses an elliptic curve group over the field F29 with parameters a=1 and b=1. It demonstrates the steps to generate and exchange public keys between two users to compute the same shared secret key. This allows encryption of messages using a symmetric key algorithm. ECDH is suitable for applications requiring security where resources are limited, as smaller key sizes provide the same level of security as larger keys in other cryptosystems.
Novel encryption algorithm and software development ecc and rsaSoham Mondal
Awarded 2nd prize in the event Papier (scientific paper presentation) conducted by Jadavpur University Electrical Engineering Department, named Convolution, under the aegis of IET and IEEE Signal Processing Society in 2018
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...IJNSA Journal
Secure communication of the sensitive information in disguised form to the genuine recipient so that an
intended recipient alone can remove the disguise and recover the original message is the essence of
Cryptography. Encrypting the message two or more times with different encryption techniques and with
different keys increases the security levels than the single encryption. A cascade cipher is stronger than the
first component. This paper presents multiple encryption schemes using different encryption techniques
Braiding/Entanglement of Pauli Spin 3/2 matrices and Rotation of the bits with independent secret keys.
Elliptic curve cryptography is additional powerful than different methodology that gains countless attention within the industry and plays vital role within the world of CRYPTOGRAPHY. This paper explains the strategy of elliptic curve cryptography victimization matrix scrambling method. during this methodology of cryptography we have a tendency to initial rework the plain text to elliptic curve so victimization matrix scrambling methodology we have a tendency to encrypt/decrypt the message. This method keeps information safe from unwanted attack to our information.
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftAlexanderCominsky
1. The document discusses the mathematics behind various computer networking security protocols including Spanning Tree Protocol (STP), Secure Sockets Layer (SSL)/Transport Layer Security (TLS), and RSA encryption.
2. It explains how STP uses concepts from graph theory like trees, cycles, and Dijkstra's shortest path algorithm to create loop-free network topologies and ensure efficient routing.
3. It describes how SSL/TLS uses asymmetric and symmetric key cryptography, including RSA, to securely transmit data across networks by encrypting communications between devices.
The document discusses the objectives and concepts of cryptography. The four main objectives are confidentiality, data integrity, authentication, and non-repudiation. It describes symmetric-key cryptography which uses a single secret key for encryption and decryption, and asymmetric key cryptography which uses different keys for encryption and decryption. It also provides an overview of elliptic curve cryptography, including how it works and some benefits over RSA in providing equivalent security with smaller key sizes.
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...IJECEIAES
In this paper describes the basic idea of elliptic curve cryptography (ECC) as well as Vigenère symmetry key. Elliptic curve arithmetic can be used to develop elliptic curve coding schemes, including key exchange, encryption, and digital signature. The main attraction of elliptic curve cryptography compared to Rivest, Shamir, Adleman (RSA) is that it provides equivalent security for a smaller key size, which reduces processing costs. From the theorical basic, we proposed a cryptosystem using elliptic curves and Vigenère cryptography. We proposed and implemented our encryption algorithm in an integrated development environment named visual studio 2019 to design a safe, secure, and effective cryptosystem.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of user's approach to providing feedback for smart home devices. We will conduct an online survey for a sample of three to five students selected by simple random sampling to study the user's motto for giving feedback on smart home devices and their expectations. We have observed that most users are ready to actively share their input on smart home devices to improve the product's service and quality to fulfill the user’s needs and make their lives easier.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more
straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame
works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of
user's approach to providing feedback for smart home devices. We will conduct an online survey for a
sample of three to five students selected by simple random sampling to study the user's motto for giving
feedback on smart home devices and their expectations. We have observed that most users are ready to
actively share their input on smart home devices to improve the product's service and quality to fulfill the
user’s needs and make their lives easier.
More Related Content
Similar to AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
Elliptic Curve Cryptography (ECC) provides a secure
means of key exchange between communicating nodes using the
Diffie-Hellman (DH) Key Exchange algorithm. This work
presents an ECC encryption implementation using of the DH
key exchange algorithm. Both encryption and decryption of text
messages using this algorithm, have been attempted. In ECC,
encoding is carried out by mapping a message character to an
affine point on an elliptic curve. It can be observed from the
comparison of the proposed algorithm and Koblitz’s encoding
method, that the proposed algorithm is as secure as Koblitz’s
encoding method and the proposed algorithm has less
computational complexity as the encoding phase is eliminated
altogether. Hence, energy efficiency of the crypto system is
improved and the same can be used in resource constrained
applications, such as Wireless sensor networks (WSNs). It is
almost infeasible to attempt a brute force attack. The security
strength of the algorithm is proportional to the key length.
However, any increase in the key length results in more
communication overhead due to encryption.
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information
Elliptic Curves as Tool for Public Key Cryptographyinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
Abstract: Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high security and short key. It is suitable for the hardware of implementation, so ECC has been more and more focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA. Index Terms – VHDL, FSM, FPGA, Elliptic Curve Cryptography.
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
Cryptography is the study of techniques for ensuring the secrecy and authentication of the
information. The development of public-key cryptography is the greatest and perhaps the only true revolution in
the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing
up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve
cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the
processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high
security and short key. It is suitable for the hardware of implementation, so ECC has been more and more
focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small
area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation
ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional
successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA
Modified Koblitz Encoding Method for ECCidescitation
Extensive use of Wireless Sensor Networks is giving
rise to different types of threats in certain commercial and
military applications. To protect the WSN data communication
against various threats appropriate security schemes are
needed. However, WSN nodes are resource constrained, with
respect to limited battery energy, and limited computational
and memory available with each WSN node. Hence, the
security model to be used in WSN’s should use minimal
resources to the extent possible and it should also provide
good security. Elliptic curve cryptography (ECC) is the best
suited algorithm for WSNs, as it offers better security for
smaller key sizes compared to the popular RSA algorithm. In
ECC, encoding of message data to a point lying on the give
Elliptic Curve is a major problem as the encoding consumes
more resources. This paper provides a novel encoding
procedure to overcome these problems to a large extent. This
paper also describes implementation aspects of the proposed
encoding and decoding methods.
The document describes Reed-Solomon error correcting codes. It begins by defining error correcting codes and their use of redundancy to recover corrupted data. It then discusses encoding messages into codewords by evaluating polynomials over finite fields and transmitting the codewords. The relationship between code rate, relative distance and error correction capability is also covered, along with the Singleton bound. Reed-Solomon codes specifically encode messages as polynomial coefficients and evaluate the polynomials at predefined points to generate codewords.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
This document proposes two fault tolerant schemes for stream ciphers based on Algorithm Based Fault Tolerance (ABFT). The first is a 2-D mesh ABFT scheme that can detect and correct any single error in an n-by-n plaintext matrix with linear computation and bandwidth overhead. It constructs matrices for the plaintext, keystream, and transmitted data with row and column checksums. The second is a 3-D mesh-knight ABFT scheme that can detect and correct up to three errors by adding an extra "knight" checksum dimension. Both schemes use only XOR operations and allow errors to be efficiently located and recovered.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
To enhance the security and reliability of the widely-used stream ciphers, a 2-D and a 3-D mesh-knight Algorithm Based Fault Tolerant (ABFT) schemes for stream ciphers are developed which can be universally applied to RC4 and other stream ciphers. Based on the ready-made arithmetic unit in stream ciphers, the proposed 2-D ABFT scheme is able to detect and correct any simple error, and the 3-D meshknight ABFT scheme is capable of detecting and correcting up to three errors in an n2 -data matrix with liner computation and bandwidth overhead. The proposed schemes provide one-to-one mapping between data index and check sum group so that error can be located and recovered by easier logic and simple operations.
The document discusses different methods of encoding, including binary encoding, which represents data as strings of 1s and 0s. It also mentions encoding techniques like octal encoding, hexadecimal encoding, and permutation encoding. Genetic algorithms are commonly used to solve optimization problems, with chromosomes represented as binary-coded strings. The length of these strings determines the solution accuracy. Encoding translates information into a format that can be processed or transmitted, while decoding translates it back to the original format.
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...IJNSA Journal
Secure communication of the sensitive information in disguised form to the genuine recipient so that an intended recipient alone can remove the disguise and recover the original message is the essence of Cryptography. Encrypting the message two or more times with different encryption techniques and with different keys increases the security levels than the single encryption. A cascade cipher is stronger than the first component. This paper presents multiple encryption schemes using different encryption techniques Braiding/Entanglement of Pauli Spin 3/2 matrices and Rotation of the bits with independent secret keys.
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
This document proposes a new algorithm for speech encryption that uses quantum chaotic maps, k-means clustering, and two stages of scrambling. The first stage uses a tent map to scramble bits in the binary representation of the signal. The second stage uses k-means clustering to scramble blocks of the signal. A quantum logistic map is used to generate an encryption key. The proposed method is evaluated using statistical quality metrics and is shown to provide secure and efficient speech encryption while maintaining high quality of recovered speech.
Neuro genetic key based recursive modulo 2 substitution using mutated charact...ijcsity
In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed
through recursive modulo
-
2 substitution using mutated character code generation for online wireless
communication of data/information.
Both sender and receive
r get synchronized based on their final output
.
The length of the key depends on the number of input and output neurons. Coordinated matching weight
vectors assist to generate chromosomes pool. Genetic secret key is obtained using fitness function, which i
s
the hamming distance between two chromosomes. Crossover and mutation are used to add elitism of
chromosomes.
At first
mutated character code table
based encryption strategy get perform on plain text.
.
Then the intermediate cipher text is yet again encry
pted through recursive positional modulo
-
2 substitution
technique to from next level encrypted text. This 2nd level intermediate cipher text is again encrypted to
form the final cipher text through chaining and cascaded xoring of neuro genetic key with the
identical
length intermediate cipher text block.
Receiver will perform same symmetric operation to get back the plain
text using identical key
International Journal of Computational Engineering Research(IJCER) ijceronline
This document presents an implementation of an Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol using VB.NET. ECDH is based on the elliptic curve discrete logarithm problem and allows two parties to generate a shared secret key over an insecure channel. The implementation uses an elliptic curve group over the field F29 with parameters a=1 and b=1. It demonstrates the steps to generate and exchange public keys between two users to compute the same shared secret key. This allows encryption of messages using a symmetric key algorithm. ECDH is suitable for applications requiring security where resources are limited, as smaller key sizes provide the same level of security as larger keys in other cryptosystems.
Novel encryption algorithm and software development ecc and rsaSoham Mondal
Awarded 2nd prize in the event Papier (scientific paper presentation) conducted by Jadavpur University Electrical Engineering Department, named Convolution, under the aegis of IET and IEEE Signal Processing Society in 2018
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...IJNSA Journal
Secure communication of the sensitive information in disguised form to the genuine recipient so that an
intended recipient alone can remove the disguise and recover the original message is the essence of
Cryptography. Encrypting the message two or more times with different encryption techniques and with
different keys increases the security levels than the single encryption. A cascade cipher is stronger than the
first component. This paper presents multiple encryption schemes using different encryption techniques
Braiding/Entanglement of Pauli Spin 3/2 matrices and Rotation of the bits with independent secret keys.
Elliptic curve cryptography is additional powerful than different methodology that gains countless attention within the industry and plays vital role within the world of CRYPTOGRAPHY. This paper explains the strategy of elliptic curve cryptography victimization matrix scrambling method. during this methodology of cryptography we have a tendency to initial rework the plain text to elliptic curve so victimization matrix scrambling methodology we have a tendency to encrypt/decrypt the message. This method keeps information safe from unwanted attack to our information.
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftAlexanderCominsky
1. The document discusses the mathematics behind various computer networking security protocols including Spanning Tree Protocol (STP), Secure Sockets Layer (SSL)/Transport Layer Security (TLS), and RSA encryption.
2. It explains how STP uses concepts from graph theory like trees, cycles, and Dijkstra's shortest path algorithm to create loop-free network topologies and ensure efficient routing.
3. It describes how SSL/TLS uses asymmetric and symmetric key cryptography, including RSA, to securely transmit data across networks by encrypting communications between devices.
The document discusses the objectives and concepts of cryptography. The four main objectives are confidentiality, data integrity, authentication, and non-repudiation. It describes symmetric-key cryptography which uses a single secret key for encryption and decryption, and asymmetric key cryptography which uses different keys for encryption and decryption. It also provides an overview of elliptic curve cryptography, including how it works and some benefits over RSA in providing equivalent security with smaller key sizes.
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...IJECEIAES
In this paper describes the basic idea of elliptic curve cryptography (ECC) as well as Vigenère symmetry key. Elliptic curve arithmetic can be used to develop elliptic curve coding schemes, including key exchange, encryption, and digital signature. The main attraction of elliptic curve cryptography compared to Rivest, Shamir, Adleman (RSA) is that it provides equivalent security for a smaller key size, which reduces processing costs. From the theorical basic, we proposed a cryptosystem using elliptic curves and Vigenère cryptography. We proposed and implemented our encryption algorithm in an integrated development environment named visual studio 2019 to design a safe, secure, and effective cryptosystem.
Similar to AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY (20)
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of user's approach to providing feedback for smart home devices. We will conduct an online survey for a sample of three to five students selected by simple random sampling to study the user's motto for giving feedback on smart home devices and their expectations. We have observed that most users are ready to actively share their input on smart home devices to improve the product's service and quality to fulfill the user’s needs and make their lives easier.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more
straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame
works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of
user's approach to providing feedback for smart home devices. We will conduct an online survey for a
sample of three to five students selected by simple random sampling to study the user's motto for giving
feedback on smart home devices and their expectations. We have observed that most users are ready to
actively share their input on smart home devices to improve the product's service and quality to fulfill the
user’s needs and make their lives easier.
October 2023-Top Cited Articles in IJU.pdfijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSijujournal
This document discusses methods for efficiently generating large prime numbers for use in RSA cryptography. It presents experimental results measuring the time taken to generate prime numbers when trial dividing the starting number by different numbers of initial primes before applying the Miller-Rabin primality test. The optimal number of trial divisions can be estimated as B=E/D, where E is the time for Miller-Rabin test and D is the maximum usefulness of trial division. Experimental results on different sized numbers support dividing by around 20 initial primes as optimal.
A novel integrated approach for handling anomalies in RFID dataijujournal
Radio Frequency Identification (RFID) is a convenient technology employed in various applications. The
success of these RFID applications depends heavily on the quality of the data stream generated by RFID
readers. Due to various anomalies found predominantly in RFID data it limits the widespread adoption of
this technology. Our work is to eliminate the anomalies present in RFID data in an effective manner so that
it can be applied for high end applications. Our approach is a hybrid approach of middleware and
deferred because it is not always possible to remove all anomalies and redundancies in middleware. The
processing of other anomalies is deferred until the query time and cleaned by business rules. Experimental
results show that the proposed approach performs the cleaning in an effective manner compared to the
existing approaches.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESijujournal
The population of elderly folks is ballooning worldwide as people live longer. But getting older often
means declining health and trouble living solo. Smart home tech could keep an eye on old folks and get
help quickly when needed so they can stay independent. This paper looks at a system combining wireless
sensors, video watches, automation, resident monitoring, emergency detection, and remote access. Sensors
track health signs, activities, appliance use. Video analytics spot odd stuff like falls. Sensor fusion and
machine learning find normal patterns so wonks can see unhealthy changes and send alerts. Multi-channel
alerts reach caregivers and emergency folks. A LabVIEW can integrate devices and enables local and
remote oversight and can control and handle emergency responses. Benefits seem to be early illness clues,
quick help, less burden on caregivers, and optimized home settings. But will old folks use all this tech? Can
we prove it really helps folks live longer and better? More research on maximizing reliability and
evaluating real-world impacts is needed. But designed thoughtfully, smart homes could may profoundly
improve the aging experience.
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEijujournal
In today’s Internet world, log file analysis is becoming a necessary task for analyzing the customer’s
behavior in order to improve advertising and sales as well as for datasets like environment, medical,
banking system it is important to analyze the log data to get required knowledge from it. Web mining is the
process of discovering the knowledge from the web data. Log files are getting generated very fast at the
rate of 1-10 Mb/s per machine, a single data center can generate tens of terabytes of log data in a day.
These datasets are huge. In order to analyze such large datasets we need parallel processing system and
reliable data storage mechanism. Virtual database system is an effective solution for integrating the data
but it becomes inefficient for large datasets. The Hadoop framework provides reliable data storage by
Hadoop Distributed File System and MapReduce programming model which is a parallel processing
system for large datasets. Hadoop distributed file system breaks up input data and sends fractions of the
original data to several machines in hadoop cluster to hold blocks of data. This mechanism helps to
process log data in parallel using all the machines in the hadoop cluster and computes result efficiently.
The dominant approach provided by hadoop to “Store first query later”, loads the data to the Hadoop
Distributed File System and then executes queries written in Pig Latin. This approach reduces the response
time as well as the load on to the end system. This paper proposes a log analysis system using Hadoop
MapReduce which will provide accurate results in minimum response time.
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
The document summarizes and compares several major service discovery approaches. It provides an overview of service discovery objectives and techniques, then surveys prominent protocols including SLP, Jini, and UPnP. Each approach is analyzed based on features like service description, discovery architecture, announcement/query mechanisms, and how they handle service usage and dynamic network changes. The comparison aims to identify strengths and limitations to guide future research in improving service discovery.
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
Opportunistic Networks are able to exploit social behavior to create connectivity opportunities. This
paradigm uses pair-wise contacts for routing messages between nodes. In this context we investigated if the
“six degrees of separation” conjecture of small-world networks can be used as a basis to route messages in
Opportunistic Networks. We propose a simple approach for routing that outperforms some popular
protocols in simulations that are carried out with real world traces using ONE simulator. We conclude that
static graph models are not suitable for underlay routing approaches in highly dynamic networks like
Opportunistic Networks without taking account of temporal factors such as time, duration and frequency of
previous encounters.
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...ijujournal
The aging population and the consequent increase in the incidence of dementias is causing many
challenges to health systems, mainly related to infrastructure, low services quality and high costs. One
solution is to provide the care at house of the patient, through of home care services. However, it is not a
trivial task, since a patient with dementia requires constant care and monitoring from a caregiver, who
suffers physical and emotional overload. In this context, this work presents an modelling for development of
pervasive systems aimed at helping the care of these patients in order to lessen the burden of the caregiver
while the patient continue to receive the necessary care.
A proposed Novel Approach for Sentiment Analysis and Opinion Miningijujournal
as the people are being dependent on internet the requirement of user view analysis is increasing
exponentially. Customer posts their experience and opinion about the product policy and services. But,
because of the massive volume of reviews, customers can’t read all reviews. In order to solve this problem,
a lot of research is being carried out in Opinion Mining. In order to solve this problem, a lot of research is
being carried out in Opinion Mining. Through the Opinion Mining, we can know about contents of whole
product reviews, Blogs are websites that allow one or more individuals to write about things they want to
share with other The valuable data contained in posts from a large number of users across geographic,
demographic and cultural boundaries provide a rich data source not only for commercial exploitation but
also for psychological & sociopolitical research. This paper tries to demonstrate the plausibility of the idea
through our clustering and classifying opinion mining experiment on analysis of blog posts on recent
product policy and services reviews. We are proposing a Nobel approach for analyzing the Review for the
customer opinion
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...ijujournal
Usability engineering and usability testing are concepts that continue to evolve. Interesting research studies
and new ideas come up every now and then. This paper tests the hypothesis of using an EDA-based
physiological measurements as a usability testing tool by considering three measures; which are observers‟
opinions, self-reported data and EDA-based physiological sensor data. These data were analyzed
comparatively and statistically. It concludes by discussing the findings that has been obtained from those
subjective and objective measures, which partially supports the hypothesis.
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSijujournal
Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors
embedded in mobile phones. The information generated by these devices is a big task in collection and
storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, we
made an attempt to propose a new security algorithm for providing security to Pervasive Computing
Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS)
algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it
automates various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a standard Home
gateway.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
The document compares the performance of various optical character recognition (OCR) tools. It analyzes eight OCR tools - Online OCR, Free Online OCR, OCR Convert, Convert image to text.net, Free OCR, i2OCR, Free OCR to Word Convert, and Google Docs. The document provides sample outputs of each tool processing the same input image. It then evaluates the tools based on character accuracy, character error rate, special symbol accuracy, and special symbol error rate to determine which tools most accurately convert images to editable text.
Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text
format. Many different types of Optical Character Recognition (OCR) tools are commercially available
today; it is a useful and popular method for different types of applications. OCR can predict the accurate
result depends on text pre-processing and segmentation algorithms. Image quality is one of the most
important factors that improve quality of recognition in performing OCR tools. Images can be processed
independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of
this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of
their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to
different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high
throughput for the network and increase the chance for multi path routing. This is because the multiple
channel availability for transmission decreases the probability of the most elegant problem called as
interference problem which is either of interflow and intraflow type. For avoiding the problem like
interference and maintaining the constant network performance or increasing the performance the WMN
need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting
several packets ready for transmission and sending them to the intended recipient through the channel,
while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different
available multiple paths is most the important factor in the both case for a routing algorithm. Hence the
most challenging factor is to determine a forwarding strategy which will provide the schedule for each
node for transmission within the channel. In this research work we have tried to implement two forwarding
strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We
have implemented Global State Routing (GSR) which will consider the packet forwarding concept and
Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding
and packet aggregation. After the successful implementation the network performance has been measured
by means of simulation study.
The Ipsos - AI - Monitor 2024 Report.pdfSocial Samosa
According to Ipsos AI Monitor's 2024 report, 65% Indians said that products and services using AI have profoundly changed their daily life in the past 3-5 years.
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Kaxil Naik
Navigating today's data landscape isn't just about managing workflows; it's about strategically propelling your business forward. Apache Airflow has stood out as the benchmark in this arena, driving data orchestration forward since its early days. As we dive into the complexities of our current data-rich environment, where the sheer volume of information and its timely, accurate processing are crucial for AI and ML applications, the role of Airflow has never been more critical.
In my journey as the Senior Engineering Director and a pivotal member of Apache Airflow's Project Management Committee (PMC), I've witnessed Airflow transform data handling, making agility and insight the norm in an ever-evolving digital space. At Astronomer, our collaboration with leading AI & ML teams worldwide has not only tested but also proven Airflow's mettle in delivering data reliably and efficiently—data that now powers not just insights but core business functions.
This session is a deep dive into the essence of Airflow's success. We'll trace its evolution from a budding project to the backbone of data orchestration it is today, constantly adapting to meet the next wave of data challenges, including those brought on by Generative AI. It's this forward-thinking adaptability that keeps Airflow at the forefront of innovation, ready for whatever comes next.
The ever-growing demands of AI and ML applications have ushered in an era where sophisticated data management isn't a luxury—it's a necessity. Airflow's innate flexibility and scalability are what makes it indispensable in managing the intricate workflows of today, especially those involving Large Language Models (LLMs).
This talk isn't just a rundown of Airflow's features; it's about harnessing these capabilities to turn your data workflows into a strategic asset. Together, we'll explore how Airflow remains at the cutting edge of data orchestration, ensuring your organization is not just keeping pace but setting the pace in a data-driven future.
Session in https://budapestdata.hu/2024/04/kaxil-naik-astronomer-io/ | https://dataml24.sessionize.com/session/667627
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataKiwi Creative
Harness the power of AI-backed reports, benchmarking and data analysis to predict trends and detect anomalies in your marketing efforts.
Peter Caputa, CEO at Databox, reveals how you can discover the strategies and tools to increase your growth rate (and margins!).
From metrics to track to data habits to pick up, enhance your reporting for powerful insights to improve your B2B tech company's marketing.
- - -
This is the webinar recording from the June 2024 HubSpot User Group (HUG) for B2B Technology USA.
Watch the video recording at https://youtu.be/5vjwGfPN9lw
Sign up for future HUG events at https://events.hubspot.com/b2b-technology-usa/
Codeless Generative AI Pipelines
(GenAI with Milvus)
https://ml.dssconf.pl/user.html#!/lecture/DSSML24-041a/rate
Discover the potential of real-time streaming in the context of GenAI as we delve into the intricacies of Apache NiFi and its capabilities. Learn how this tool can significantly simplify the data engineering workflow for GenAI applications, allowing you to focus on the creative aspects rather than the technical complexities. I will guide you through practical examples and use cases, showing the impact of automation on prompt building. From data ingestion to transformation and delivery, witness how Apache NiFi streamlines the entire pipeline, ensuring a smooth and hassle-free experience.
Timothy Spann
https://www.youtube.com/@FLaNK-Stack
https://medium.com/@tspann
https://www.datainmotion.dev/
milvus, unstructured data, vector database, zilliz, cloud, vectors, python, deep learning, generative ai, genai, nifi, kafka, flink, streaming, iot, edge
End-to-end pipeline agility - Berlin Buzzwords 2024Lars Albertsson
We describe how we achieve high change agility in data engineering by eliminating the fear of breaking downstream data pipelines through end-to-end pipeline testing, and by using schema metaprogramming to safely eliminate boilerplate involved in changes that affect whole pipelines.
A quick poll on agility in changing pipelines from end to end indicated a huge span in capabilities. For the question "How long time does it take for all downstream pipelines to be adapted to an upstream change," the median response was 6 months, but some respondents could do it in less than a day. When quantitative data engineering differences between the best and worst are measured, the span is often 100x-1000x, sometimes even more.
A long time ago, we suffered at Spotify from fear of changing pipelines due to not knowing what the impact might be downstream. We made plans for a technical solution to test pipelines end-to-end to mitigate that fear, but the effort failed for cultural reasons. We eventually solved this challenge, but in a different context. In this presentation we will describe how we test full pipelines effectively by manipulating workflow orchestration, which enables us to make changes in pipelines without fear of breaking downstream.
Making schema changes that affect many jobs also involves a lot of toil and boilerplate. Using schema-on-read mitigates some of it, but has drawbacks since it makes it more difficult to detect errors early. We will describe how we have rejected this tradeoff by applying schema metaprogramming, eliminating boilerplate but keeping the protection of static typing, thereby further improving agility to quickly modify data pipelines without fear.
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...Social Samosa
The Modern Marketing Reckoner (MMR) is a comprehensive resource packed with POVs from 60+ industry leaders on how AI is transforming the 4 key pillars of marketing – product, place, price and promotions.
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
1. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
DOI : 10.5121/iju.2022.13202 19
AUTHENTICATED PUBLIC KEY ENCRYPTION
SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
P. L. Sharma1
, Kritika Gupta2
, Nikhlesh Kumar Badoga3
,
Ashima4
and Himanshu Monga4
1,2,4
Department of Mathematics & Statistics, Himachal Pradesh
University, Shimla, India
3
Department of Computer Science and Engineering,
Thapar Institute of Engineering and Technology, Punjab, India
4
Department of Electronics & Communication Engineering
Jwaharlal Nehru Government Engineering College, Sundernagar, Mandi (H.P), India
ABSTRACT
Secure transformation of data is of prime importance in today’s world. In the present paper, we propose a
double fold authenticated public key encryption scheme which helps us in securely sending the confidential
data between sender and receiver. This scheme makes the encrypted data more secure against various
cryptographic attacks.
1. INTRODUCTION
The theory of elliptic curves in cryptography was first introduced by Miller [9] and Koblitz [4] in
the year 1985. Security of Elliptic Curve Cryptography mainly depends on the problem of solving
Elliptic Curve Discrete Logarithm Problem. The main advantage of using ECC over RSA is that
it provides same level of security but with lesser key size. Elliptic Curve Cryptography finds
many applications in wireless networks and mobile computing. Elliptic Curve Cryptography is an
active area of research. ECC can be used in several tasks like digital signature, decryption,
encryption, key agreement and authentication, see [2, 3, 5, 7, 8, 13]. The book “Guide to Elliptic
Curve Cryptography” provides many details of arithmetic of elliptic curves and implementation
issues, see [1]. Kumar et al. [6] proposed a secure and authentic method to encrypt a message.
Through Elliptic curve cryptography, we can securely transport keys between sender and receiver
and it also helps in authentic session key establishment protocols, see [10, 11, 12, 14, 15]. In the
present paper, we propose an encryption scheme that makes use of the specific public key and
XOR operation to encrypt the message securely. This scheme uses double fold encryption to
enhance the security of encrypted message. To securely send the data between sender and real
receiver is of prime importance in Bank transactions, e-commerce and tenders etc. Proposed
scheme provides confidentiality along with authentication and provides higher level of security.
We use elliptic curves over finite fields for this encryption algorithm.
2. PRELIMINARIES
2.1. Group Law on Elliptic Curves
Suppose that E(Fp) is an elliptic curve defined over the finite field Fp, then the set of points of
elliptic curve along with addition operation form an abelian group and point of infinity act as an
identity element of the group.
2. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
20
2.2. Point Addition
Let Fpbe any finite field with prime p. Equation of elliptic curve over Fp is
y2
= (x3
+ ax+ b) mod p.
Let S(𝑝1,𝑞1) and T(𝑝2,𝑞2) be two points on E(Fp) such that S ≠T and S + T =
U(𝑝3,𝑞3), then
𝑝3= {λ2
−𝑝1− 𝑝2} mod p
and
𝑞3= {λ(𝑝1− 𝑝3) − 𝑞1} mod p,
where
2.3. Point Doubling
Let S and T be two overlapping points on elliptic curve over Fp and S(𝑝1,𝑞1) + T(𝑝1, 𝑞1) =
U(𝑝2,𝑞2), then
𝑝2= {λ2
− 2𝑝1} mod p
and
𝑞2= {λ(𝑝1− 𝑝2) − 𝑞1} mod p,
where
2.4. Elliptic Curve Discrete Logarithm Problem
Security of ECC depends on Elliptic Curve Discrete Logarithm. Given two points S and T on
elliptic curve over finite field. For given x and S, it is easy to compute T = xS, but very difficult to
find x if S and T are given. The problem to find x is known as Elliptic Curve Discrete Logarithm
Problem.
3. PROPOSED SCHEME
If Alice wants to send some message to Bob, then they both will agree on an elliptic curve over
finite field and some common code table. Let G be a generator point of order n. Alice selects his
private keys α and 𝑛𝐴 in such a manner that α𝑛𝐴 lies in the interval [1,n − 1] and α and 𝑛𝐴 should
be large random numbers. He computes his public key as 𝑃𝐴= 𝑛𝐴G.
In the similar manner, Bob selects his private keys as β and 𝑛𝐵 and public key as 𝑃𝐵= 𝑛𝐵G. After
publishing their public keys, they calculate specific public keys for each other.
Specific public key generated by Alice only for Bob is A𝐵= α 𝑛𝐴𝑃𝐵 and specific public key
generated by Bob only for Alice isBA= β𝑛𝐵𝑃𝐴.
3.1. Encryption Stage 1
Alice converts the character of the message to point on elliptic curve using Code table. He
chooses a random integer k and generates cipher points for each message point as:
𝐶1= kG
3. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
21
and
𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA.
3.2. Encryption Stage 2
Step 1: Convert each coordinate of the points obtained in the above step to binary form.
Step 2: Perform XOR operation between binary form of x-coordinate of 𝐶1, binary form of x-
coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer
t. Randomly chosen integer must be kept confidential between sender and receiver.
Step 3: Result obtained in the above step will be changed to decimal value.
Step 4: Perform XOR operation between binary form of x-coordinate of 𝐶2, binary form of x-
coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer
t.
Step 5: Result obtained in the above step will be changed to decimal value.
Step 6: Performs XOR operation between binary form of y-coordinate of 𝐶1, binary form of y-
coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer
t and change the resultant value to decimal value.
Step 7: Performs XOR operation between binary form of y-coordinate of 𝐶2, binary form of y-
coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer
t and change the resultant value to decimal value. These four decimal values act as cipher text
corresponding to first character of the message.
Following the same procedure, he creates the cipher text corresponding to the remaining
characters of the message. But to encrypt the remaining characters of the message, he will use
binary form of preceding plain text in place of randomly chosen integer and send the cipher text
to receiver.
3.3. Decryption Stage 1
Step 1: After obtaining cipher text, he converts all the decimal values to binary form.
Step 2: Performs XOR operation between binary form of first decimal value, binary form of x-
coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer
t and the resultant will correspond to x-coordinate of 𝐶1.
Step 3: Performs XOR operation between binary form of second decimal value, binary form of x-
coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer
t and the resultant will correspond to x-coordinate of
𝐶2.
Step 4: Performs XOR operation between binary form of third decimal value, binary form of y-
coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer
t and the resultant will correspond to y-coordinate of 𝐶1. Step 5: Performs XOR operation
between binary form of fourth decimal value, binary form of y-coordinate of A𝐵, binary form of
y-coordinate of BAand binary form of a randomly chosen integer t and the resultant will
correspond to y-coordinate of𝐶2.
In the similar manner, he obtains all the cipher points (𝐶1,𝐶2) corresponding to each character of
the message.
3.4. Decryption Stage 2
After obtaining all the values for (𝐶1,𝐶2), Bob will decrypt the message Pm as:
4. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
22
𝑃m= 𝐶2− 𝐶1𝑛𝐵− βA𝐵.
and gets the original message.
4. ILLUSTRATION
Suppose Alice and Bob agree on elliptic curve y2
= (x3
+ 2x + 2) mod 17 over the finite field 𝐹17.
Elliptic curve points are as given below:
Table 1
∞ (16,13) (0,11) (5,16)
(5,1) (0,6) (16,4)
(6,3) (13,7) (9,1)
(10,6) (7,6) (3,16)
(3,1) (7,11) (10,11)
(9,16) (13,10) (6,14)
Here, ∞ is the point of infinity.
Generator of the elliptic curve is G = (5,1).
Private keys of Alice are α = 2, 𝑛𝐴= 3.
Private keys of Bob are β = 3, 𝑛𝐵= 4.
Public key of Alice is 𝑃𝐴= 𝑛𝐴G = (10,6).
Public key of Bob is 𝑃𝐵= 𝑛𝐵G = (3,1).
Specific public key generated by Alice for Bob is A𝐵= α𝑛𝐴𝑃𝐵= (9,16) and Specific public
key generated by Bob for Alice is BA= β𝑛𝐵𝑃𝐴= (6,14).
4.1. Encryption
If Alice wants to send the message ‘daring’ to Bob, he encodes the characters of the message
‘daring’ to points on elliptic curve using Code Table given below:
Code Table
* a b c d e f g
∞ (5,1) (6,3) (10,6) (3,1) (9,16) (16,13) (0,6)
h i j k l m n o
(13,7) (7,6) (7,11) (13,10) (0,11) (16,4) (9,1) (3,16)
p q r
(10,11) (6,14) (5,16)
4.2. Encryption Stage 1
Alice represents the letter ‘d’ of daring as (3,1). He selects a random number k = 6 and
encrypts the point (3,1). Cipher Points corresponding to point (3,1) are 𝐶1= kG= (16,13)
and 𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (9,16).
5. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
23
Alice represents the letter ‘a’ of daring as (5,1). He selects a random number k = 4 and
encrypts the point (5,1). Cipher Points corresponding to point (5,1) are 𝐶1= kG= (3,1) and
𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (16,4).
Alice represents the letter ‘r’ of daring as (5,16). He selects a random number k = 5 and
encrypts the point (5,16). Cipher Points corresponding to point (5,16) are 𝐶1= kG= (9,16)
and 𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (3,16).
Alice represents the letter ‘i’ of daring as (7,6). He selects a random number k = 8 and
encrypts the point (7,6). Cipher Points corresponding to point (7,6) are 𝐶1= kG= (13,7) and
𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (5,16).
Alice represents the letter ‘n’ of daring as (9,1). He selects a random number k = 9 and
encrypts the point (9,1). Cipher Points corresponding to point (9,1) are 𝐶1= kG= (7,6) and
𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (13,7).
Alice represents the letter ‘g’ of daring as (0,6). He selects a random number k = 10 and
encrypts the point (0,6). Cipher Points corresponding to point (0,6) are 𝐶1= kG= (7,11) and
𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (9,16).
C1 C2
(16,13) (9,16)
(3,1) (16,4)
(9,16) (3,16)
(13,7) (5,16)
(7,6) (13,7)
(7,11) (9,16)
4.3. Encryption Stage 2
Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary
form of x-coordinate of A𝐵 , binary form of x-coordinate of BAand binary form of a
randomly chosen integer t = 8, that is,
00010000 ⊕ 00001001 ⊕ 00000110 ⊕ 00001000 = 00010111.
Decimal value corresponding to 00010111 is 23.
Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary
form of x-coordinate of A𝐵 , binary form of x-coordinate of BAand binary form of a
randomly chosen integer t = 8, that is,
00001001 ⊕ 00001001 ⊕ 00000110 ⊕ 00001000 = 00001110.
Decimal value corresponding to 00001110 is 14.
Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary
form of y-coordinate of A𝐵 , binary form of y-coordinate of BAand binary form of a
randomly chosen integer t = 8, that is,
00001101 ⊕ 00010000 ⊕ 00001110 ⊕ 00001000 = 00011011.
Decimal value corresponding to 00011011 is 27.
6. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
24
Step 4: He performs XOR operation between binary form of y-coordinate of𝐶2, binary
form of y-coordinate of A𝐵 , binary form of y-coordinate ofA𝐵andbinary form of a
randomly chosen integer t = 8, that is,
00010000 ⊕ 00010000 ⊕ 00001110 ⊕ 00001000 = 00000110
Decimal value corresponding to 00000110 is 6.
Therefore, cipher text corresponding to first character of the message, that is, ‘d’ is 23,14,27,6.
Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text, ‘d’, that is,
00000011 ⊕ 00001001 ⊕ 00000110 ⊕ 01100100 = 01101000.
Decimal value corresponding to 01101000 is 104.
Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘d’, that is,
00010000 ⊕ 00001001 ⊕ 00000110 ⊕ 01100100 = 01111011.
Decimal value corresponding to 01111011 is 123.
Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘d’, that is,
00000001 ⊕ 00010000 ⊕ 00001110 ⊕ 01100100 = 01111011.
Decimal value corresponding to 01111011 is 123.
Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘d’, that is,
00000100 ⊕ 00010000 ⊕ 00001110 ⊕ 01100100 = 01111110
.
Therefore, cipher text corresponding to second character of the message, that is, ‘a’ is
104,123,123,126.
Step 1: He performs XOR operation between binary form of x-coordinate of𝐶1, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAbinary form of preceding
plain text ‘a’, that is,
00001001 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01110100
Decimal value corresponding to 01110100 is 116.
Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary
form of x-coordinate of A𝐵 , binary form of x-coordinate of BA and binary form of
preceding plain text ‘a’, that is,
00000011 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01111110.
7. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
25
Decimal value corresponding to 01111110 is 126.
Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary
form of y-coordinate of A𝐵 , binary form of y-coordinate of BA and binary form of
preceding plain text ‘a’, that is,
00010000 ⊕ 00010000 ⊕ 00001110 ⊕ 01110010 = 01111100.
Decimal value corresponding to 01111100 is 124.
Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary
form of y-coordinate of A𝐵 , binary form of y-coordinate of BA and binary form of
preceding plain text ‘a’, that is,
00010000 ⊕ 00010000 ⊕ 00001110 ⊕ 01110010 = 01111100.
Decimal value corresponding to 01111100 is 124.
Therefore, cipher text corresponding to third character of the message, that is, ‘r’ is
116,126,124,124.
Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘r’, that is,
00001101 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01110000.
Decimal value corresponding to 01110000 is 112.
Step 2: He performs XOR operation between binary form of x-coordinate of𝐶2, binary
form of x-coordinate of A𝐵 , binary form of x-coordinate of BA and binary form of
preceding plain text ‘r’, that is,
00000101 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01111000.
Decimal value corresponding to 01111000 is 120.
Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘r’, that is,
00000111 ⊕ 00010000 ⊕ 00001000 ⊕ 01110010 = 01101101.
Decimal value corresponding to 01101101 is 109.
Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘r’, that is,
00010000 ⊕ 00010000 ⊕ 00001000 ⊕ 01110010 = 01111010.
Decimal value corresponding to 01111010 is 122.
Therefore, cipher text corresponding to fourth character of the message, that is, ‘i’ is
112,120,109,122.
8. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
26
Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘i’, that is,
00000111 ⊕ 00001001 ⊕ 00000110 ⊕ 01101001 = 01100001.
Decimal value corresponding to 01100001 is 97.
Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘i’, that is,
00001101 ⊕ 00001001 ⊕ 00000110 ⊕ 01101001 = 01101011
Decimal value corresponding to 01101011 is 105.
Step 3: He performs XOR operation between binary form of y-coordinate of𝐶1, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAandbinary form of preceding
plain text ‘i’, that is,
00001101 ⊕ 00010000 ⊕ 00001000 ⊕ 01101001 = 01111100
Decimal value corresponding to 01111100 is 124.
Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘i’, that is,
00000111 ⊕ 00010000 ⊕ 00001000 ⊕ 01101001 = 01110110.
Decimal value corresponding to 01110110 is 118.
Therefore, cipher text corresponding to fifth character of the message, that is, ‘n’ is
97,105,124,118.
Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘n’, that is,
00000111 ⊕ 00001001 ⊕ 00000110 ⊕ 01101110 = 01100110.
Decimal value corresponding to 01100110 is 102.
Step 2: He performs XOR operation between binary form of x-coordinate of𝐶2, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘n’, that is,
00001001 ⊕ 00001001 ⊕ 00000110 ⊕ 01101110 = 01101000.
Decimal value corresponding to 01101000 is 104.
Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘n’, that is,
00001011 ⊕ 00010000 ⊕ 00000100 ⊕ 01101110 = 01110001.
Decimal value corresponding to 01110001 is 113.
9. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
27
Step 4: He performs XOR operation between binary form of y-coordinate of𝐶2, binary
form of y-coordinate of A𝐵 , binary form of y-coordinate of BA and binary form of
preceding plain text ‘n’, that is,
00010000 ⊕ 00010000 ⊕ 00000100 ⊕ 01101110 = 01101010.
Decimal value corresponding to 01101010 is 106.
Therefore, cipher text corresponding to sixth character of the message, that is, ‘g’ is
102,104,113,106.
Alice sends the cipher text 23, 14, 27, 6;104, 123, 123, 126; 116, 126, 124, 124; 112, 120, 109,
122; 97, 105, 124, 118; 102, 104, 113, 106 to Bob.
4.4. Decryption Stage 1
To get (𝐶1,𝐶2) corresponding to the first character of the message, he performs following steps:
Step 1: He performs XOR operation between binary form of first decimal value of cipher
text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form
of a randomly chosen integer t = 8, that is,
00010111 ⊕ 00001000 ⊕ 00000110 ⊕ 00001001 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as x-coordinate of 𝐶1.
Step 2: He performs XOR operation between binary form of second decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of a randomly chosen integer t = 8, that is,
00001110 ⊕ 00001000 ⊕ 00000110 ⊕ 00001001 = 00001001.
Decimal value corresponding to 00001001 is 9 and it serve as x-coordinate of 𝐶2.
Step 3: He performs XOR operation between binary form of third decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of a randomly chosen integer t = 8, that is,
00011011 ⊕ 00001000 ⊕ 00001110 ⊕ 00010000 = 00001101.
Decimal value corresponding to 00001101 is 13 and it serve as y-coordinate of 𝐶1.
Step 4: He performs XOR operation between binary form of fourth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of a randomly chosen integer t = 8, that is,
00000110 ⊕ 00001000 ⊕ 0001110 ⊕ 00010000 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of 𝐶2.
To get (𝐶1,𝐶2) corresponding to the second character of the message, he performs following
steps:
Step 1: Performs XOR operation between binary form of fifth decimal value of cipher text,
binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of
preceding plain text d, that is,
10. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
28
01101000 ⊕ 01100100 ⊕ 00000110 ⊕ 00001001 = 00000011.
Decimal value corresponding to 00000011 is 3 and it serve as x-coordinate of 𝐶1.
Step 2: Performs XOR operation between binary form of sixth decimal value of cipher
text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form
of preceding plain text d, that is,
00001001 ⊕ 00000110 ⊕ 01100100 ⊕ 01111011 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as x-coordinate of 𝐶2.
Step 3: Performs XOR operation between binary form of seventh decimal value of cipher
text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form
of preceding plain text d, that is,
01111011 ⊕ 01100100 ⊕ 00001110 ⊕ 00010000 = 00000001.
Decimal value corresponding to 00000001 is 1 and it serve as y-coordinate of 𝐶1.
Step 4: Performs XOR operation between binary form of eighth decimal value of cipher
text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form
of preceding plain text d, that is,
01111110 ⊕ 01100100 ⊕ 00001110 ⊕ 00010000 = 00000100.
Decimal value corresponding to 00000100 is 4 and it serve as y C2.
To get (𝐶1,𝐶2) corresponding to the third character of the message, he performs following steps:
Step 1: Performs XOR operation between binary form of ninth decimal value of cipher
text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary
form of preceding plain text, that is, a, that is,
01110100 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00001001.
Decimal value corresponding to 00001001 is 9 and it serve as x-coordinate of 𝐶1.
Step 2: Performs XOR operation between binary form of tenth decimal value of cipher
text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary
form of preceding plain text a, that is,
01111110 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00000011.
Decimal value corresponding to 00000011 is 16 and it serve as x-coordinate of 𝐶2.
Step 3: Performs XOR operation between binary form of eleventh decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text a, that is,
01111100 ⊕ 01110010 ⊕ 00001110 ⊕ 00010000 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of
𝐶1.
Step 4: Performs XOR operation between binary form of twelfth decimal value of cipher
text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary
form of preceding plain text a, that is,
11. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
29
01111100 ⊕ 01110010 ⊕ 00001110 ⊕ 00010000 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of
𝐶2.
To get (𝐶1,𝐶2) corresponding to the fourth character of the message, he performs following steps:
Step 1: Performs XOR operation between binary form of thirteenth decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain text, that is, r, that is,
01110000 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00001101.
Decimal value corresponding to 00001101 is 13 and it serve as x-coordinate of 𝐶1.
Step 2: Performs XOR operation between binary form of fourteenth decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain text r, that is,
01111000 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00000101.
Decimal value corresponding to 00000101 is 5 and it serve as x-coordinate of 𝐶2.
Step 3: Performs XOR operation between binary form of fifteenth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text r, that is,
01101101 ⊕ 01110010 ⊕ 00001000 ⊕ 00010000 = 00000111.
Decimal value corresponding to 00000111 is 7 and it serve as y-coordinate of 𝐶1.
Step 4: Performs XOR operation between binary form of sixteenth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text r, that is,
01111010 ⊕ 01110010 ⊕ 00001000 ⊕ 00010000 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of 𝐶2.
To get (𝐶1, 𝐶2) corresponding to the fifth character of the message, he performs following steps:
Step 1: Performs XOR operation between binary form of seventeenth decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain texti, that is,
01100001 ⊕ 01101001 ⊕ 00000110 ⊕ 00001001 = 00000111.
Decimal value corresponding to 00000111 is 7 and it serve as x-coordinate
of𝐶1.
Step 2: Performs XOR operation between binary form of eighteenth decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain text i, that is,
01101011 ⊕ 01101001 ⊕ 00000110 ⊕ 00001001 = 00001101.
Decimal value corresponding to 00001101 is 13 and it serve as x-coordinate of 𝐶2.
12. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
30
Step 3: Performs XOR operation between binary form of nineteenth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text i, that is,
01111100 ⊕ 01101001 ⊕ 00001000 ⊕ 00010000 = 00001101.
Decimal value corresponding to 00001101 is 6 and it serve as y-coordinate of 𝐶1.
Step 4: Performs XOR operation between binary form of twentieth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text i, that is,
01110110 ⊕ 01101001 ⊕ 00001000 ⊕ 00010000 = 00000111.
Decimal value corresponding to 00000111 is 7 and it serve as y-coordinate of 𝐶2.
To get (𝐶1,𝐶2) corresponding to the sixth character of the message, he performs following steps:
Step 1: Performs XOR operation between binary form of twenty first decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain text, that is, n, that is,
01100110 ⊕ 01101110 ⊕ 00000110 ⊕ 00001001 = 00000111.
Decimal value corresponding to 00000111 is 7 and it serve as x-coordinate of 𝐶1
Step 2: Performs XOR operation between binary form of twenty second decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain text n, that is,
01101000 ⊕ 01101110 ⊕ 00000110 ⊕ 00001001 = 00001001.
Decimal value corresponding to 00001001 is 9 and it serve as x-coordinate of 𝐶2.
Step 3: Performs XOR operation between binary form of twenty third decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text n, that is,
01110001 ⊕ 011101110 ⊕ 00000100 ⊕ 00010000 = 00001011.
Decimal value corresponding to 00001011 is 11 and it serve as y-coordinate of
𝐶1.
Step 4: Performs XOR operation between binary form of twenty fourth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text n, that is,
01101010 ⊕ 01101110n ⊕ 00000100 ⊕ 00010000 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of 𝐶2.
4.5. Decryption Stage 2
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (3,1) corresponding to the character ‘d’.
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (5,1) corresponding to the character ‘a’.
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (5,16) corresponding to the character ‘r’.
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (7,6) corresponding to the character ‘i’.
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (9,1) corresponding to the character ‘n’.
13. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
31
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (0,6) corresponding to the character ‘g’.
5. CONCLUSION
For Bank transactions and mobile computing security of encrypted text is of prime importance.
We proposed a new double fold authenticated encryption scheme which provides confidentiality
along with authentication. This scheme makes the encrypted message more secure using two
stage encryption process.
REFERENCES
[1] D. Hankerson, A. J. Menezes and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer
Professional Computing, First ed., Springer -Verlag New York (2004).
[2] A. M. Johnston and P. S. Gemmell, Authenticated Key Exchange Provably Secure Against the Man-
in-Middle Attack, Journal of Cryptology. 2 (2002) 139148.
[3] A. Joux, A One Round Protocol for Tripartite Diffie-Hellman, Journal of Cryptology. 17 (2004) 263-
276.
[4] N. Koblitz, Elliptic Curve Cryptosystem, Mathematics of Computation. 48 (1987) 203-209.
[5] N. Koblitz, A. J. Menezes and S. Vanstone, The State of Elliptic Curve Cryptography, Design, Codes
and Cryptography. 19 (2000) 173-193.
[6] D. S. Kumar, CH. Suneetha and A. Chandrasekhar, Encryption of Data Using Elliptic Curve Over
Finite Fields, International Journal of Distributed and Parallel Systems (IJDPS). 3 (2012) 301-308.
[7] A. K. Lenstra and E. R. Verheul, Selecting Cryptographic Key Size, Journal of Cryptology. 14 (2001)
255-293.
[8] M. Machhout, Z. Guitouni, K. Torki and L. Khriji, Coupled FPGA/ASIC Implementation of Elliptic
Curve Crypto-Processor, International Journal of Network Security & Its Applications. 2 (2010).
[9] V. S. Miller, Uses of Elliptic Curves in Cryptography, In Advances in Cryptology-CRYPTO’85
Proceedings, Crypto 1985. 218 (1986) 417-426.
[10] G. L. Mullen and D. Panario, Handbook of Finite Fields, First ed., Chapman and Hall/CRC (2013).
[11] K. R. C. Pillai and M. P. Sebastian, Elliptic Curve Based Authenticated Session Key Establishment
Protocol for High Security Applications in Constrained Network Environment, International Journal
of Network Security and Its Applications (IJNSA). 2 (2010).
[12] J. H. Silverman, The Arithmetic of Elliptic Curves, Graduate Texts in Mathematics. 106 (2009).
[13] L. D. Singh and K. M. Singh, Implementation of Text Encryption Using Elliptic Curve Cryptography,
Procedia Computer Science. 54 (2015) 73-82.
[14] CH. Suneetha, D. S. Kumar and A. Chandrasekhar, Secure Key Transport in Symmetric
Cryptographic Protocols Using Elliptic Curves Over Finite Fields, International Journal of Computer
Applications. 36 (2011).
[15] L. C. Washington, Elliptic Curves Number Theory and Cryptography, Second ed., Chapman and
Hall/CRC (2008).