SlideShare a Scribd company logo
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
DOI : 10.5121/iju.2022.13202 19
AUTHENTICATED PUBLIC KEY ENCRYPTION
SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
P. L. Sharma1
, Kritika Gupta2
, Nikhlesh Kumar Badoga3
,
Ashima4
and Himanshu Monga4
1,2,4
Department of Mathematics & Statistics, Himachal Pradesh
University, Shimla, India
3
Department of Computer Science and Engineering,
Thapar Institute of Engineering and Technology, Punjab, India
4
Department of Electronics & Communication Engineering
Jwaharlal Nehru Government Engineering College, Sundernagar, Mandi (H.P), India
ABSTRACT
Secure transformation of data is of prime importance in today’s world. In the present paper, we propose a
double fold authenticated public key encryption scheme which helps us in securely sending the confidential
data between sender and receiver. This scheme makes the encrypted data more secure against various
cryptographic attacks.
1. INTRODUCTION
The theory of elliptic curves in cryptography was first introduced by Miller [9] and Koblitz [4] in
the year 1985. Security of Elliptic Curve Cryptography mainly depends on the problem of solving
Elliptic Curve Discrete Logarithm Problem. The main advantage of using ECC over RSA is that
it provides same level of security but with lesser key size. Elliptic Curve Cryptography finds
many applications in wireless networks and mobile computing. Elliptic Curve Cryptography is an
active area of research. ECC can be used in several tasks like digital signature, decryption,
encryption, key agreement and authentication, see [2, 3, 5, 7, 8, 13]. The book “Guide to Elliptic
Curve Cryptography” provides many details of arithmetic of elliptic curves and implementation
issues, see [1]. Kumar et al. [6] proposed a secure and authentic method to encrypt a message.
Through Elliptic curve cryptography, we can securely transport keys between sender and receiver
and it also helps in authentic session key establishment protocols, see [10, 11, 12, 14, 15]. In the
present paper, we propose an encryption scheme that makes use of the specific public key and
XOR operation to encrypt the message securely. This scheme uses double fold encryption to
enhance the security of encrypted message. To securely send the data between sender and real
receiver is of prime importance in Bank transactions, e-commerce and tenders etc. Proposed
scheme provides confidentiality along with authentication and provides higher level of security.
We use elliptic curves over finite fields for this encryption algorithm.
2. PRELIMINARIES
2.1. Group Law on Elliptic Curves
Suppose that E(Fp) is an elliptic curve defined over the finite field Fp, then the set of points of
elliptic curve along with addition operation form an abelian group and point of infinity act as an
identity element of the group.
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
20
2.2. Point Addition
Let Fpbe any finite field with prime p. Equation of elliptic curve over Fp is
y2
= (x3
+ ax+ b) mod p.
Let S(𝑝1,𝑞1) and T(𝑝2,𝑞2) be two points on E(Fp) such that S ≠T and S + T =
U(𝑝3,𝑞3), then
𝑝3= {λ2
−𝑝1− 𝑝2} mod p
and
𝑞3= {λ(𝑝1− 𝑝3) − 𝑞1} mod p,
where
2.3. Point Doubling
Let S and T be two overlapping points on elliptic curve over Fp and S(𝑝1,𝑞1) + T(𝑝1, 𝑞1) =
U(𝑝2,𝑞2), then
𝑝2= {λ2
− 2𝑝1} mod p
and
𝑞2= {λ(𝑝1− 𝑝2) − 𝑞1} mod p,
where
2.4. Elliptic Curve Discrete Logarithm Problem
Security of ECC depends on Elliptic Curve Discrete Logarithm. Given two points S and T on
elliptic curve over finite field. For given x and S, it is easy to compute T = xS, but very difficult to
find x if S and T are given. The problem to find x is known as Elliptic Curve Discrete Logarithm
Problem.
3. PROPOSED SCHEME
If Alice wants to send some message to Bob, then they both will agree on an elliptic curve over
finite field and some common code table. Let G be a generator point of order n. Alice selects his
private keys α and 𝑛𝐴 in such a manner that α𝑛𝐴 lies in the interval [1,n − 1] and α and 𝑛𝐴 should
be large random numbers. He computes his public key as 𝑃𝐴= 𝑛𝐴G.
In the similar manner, Bob selects his private keys as β and 𝑛𝐵 and public key as 𝑃𝐵= 𝑛𝐵G. After
publishing their public keys, they calculate specific public keys for each other.
Specific public key generated by Alice only for Bob is A𝐵= α 𝑛𝐴𝑃𝐵 and specific public key
generated by Bob only for Alice isBA= β𝑛𝐵𝑃𝐴.
3.1. Encryption Stage 1
Alice converts the character of the message to point on elliptic curve using Code table. He
chooses a random integer k and generates cipher points for each message point as:
𝐶1= kG
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
21
and
𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA.
3.2. Encryption Stage 2
Step 1: Convert each coordinate of the points obtained in the above step to binary form.
Step 2: Perform XOR operation between binary form of x-coordinate of 𝐶1, binary form of x-
coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer
t. Randomly chosen integer must be kept confidential between sender and receiver.
Step 3: Result obtained in the above step will be changed to decimal value.
Step 4: Perform XOR operation between binary form of x-coordinate of 𝐶2, binary form of x-
coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer
t.
Step 5: Result obtained in the above step will be changed to decimal value.
Step 6: Performs XOR operation between binary form of y-coordinate of 𝐶1, binary form of y-
coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer
t and change the resultant value to decimal value.
Step 7: Performs XOR operation between binary form of y-coordinate of 𝐶2, binary form of y-
coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer
t and change the resultant value to decimal value. These four decimal values act as cipher text
corresponding to first character of the message.
Following the same procedure, he creates the cipher text corresponding to the remaining
characters of the message. But to encrypt the remaining characters of the message, he will use
binary form of preceding plain text in place of randomly chosen integer and send the cipher text
to receiver.
3.3. Decryption Stage 1
Step 1: After obtaining cipher text, he converts all the decimal values to binary form.
Step 2: Performs XOR operation between binary form of first decimal value, binary form of x-
coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer
t and the resultant will correspond to x-coordinate of 𝐶1.
Step 3: Performs XOR operation between binary form of second decimal value, binary form of x-
coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer
t and the resultant will correspond to x-coordinate of
𝐶2.
Step 4: Performs XOR operation between binary form of third decimal value, binary form of y-
coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer
t and the resultant will correspond to y-coordinate of 𝐶1. Step 5: Performs XOR operation
between binary form of fourth decimal value, binary form of y-coordinate of A𝐵, binary form of
y-coordinate of BAand binary form of a randomly chosen integer t and the resultant will
correspond to y-coordinate of𝐶2.
In the similar manner, he obtains all the cipher points (𝐶1,𝐶2) corresponding to each character of
the message.
3.4. Decryption Stage 2
After obtaining all the values for (𝐶1,𝐶2), Bob will decrypt the message Pm as:
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
22
𝑃m= 𝐶2− 𝐶1𝑛𝐵− βA𝐵.
and gets the original message.
4. ILLUSTRATION
Suppose Alice and Bob agree on elliptic curve y2
= (x3
+ 2x + 2) mod 17 over the finite field 𝐹17.
Elliptic curve points are as given below:
Table 1
∞ (16,13) (0,11) (5,16)
(5,1) (0,6) (16,4)
(6,3) (13,7) (9,1)
(10,6) (7,6) (3,16)
(3,1) (7,11) (10,11)
(9,16) (13,10) (6,14)
Here, ∞ is the point of infinity.
Generator of the elliptic curve is G = (5,1).
Private keys of Alice are α = 2, 𝑛𝐴= 3.
Private keys of Bob are β = 3, 𝑛𝐵= 4.
Public key of Alice is 𝑃𝐴= 𝑛𝐴G = (10,6).
Public key of Bob is 𝑃𝐵= 𝑛𝐵G = (3,1).
Specific public key generated by Alice for Bob is A𝐵= α𝑛𝐴𝑃𝐵= (9,16) and Specific public
key generated by Bob for Alice is BA= β𝑛𝐵𝑃𝐴= (6,14).
4.1. Encryption
If Alice wants to send the message ‘daring’ to Bob, he encodes the characters of the message
‘daring’ to points on elliptic curve using Code Table given below:
Code Table
* a b c d e f g
∞ (5,1) (6,3) (10,6) (3,1) (9,16) (16,13) (0,6)
h i j k l m n o
(13,7) (7,6) (7,11) (13,10) (0,11) (16,4) (9,1) (3,16)
p q r
(10,11) (6,14) (5,16)
4.2. Encryption Stage 1
 Alice represents the letter ‘d’ of daring as (3,1). He selects a random number k = 6 and
encrypts the point (3,1). Cipher Points corresponding to point (3,1) are 𝐶1= kG= (16,13)
and 𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (9,16).
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
23
 Alice represents the letter ‘a’ of daring as (5,1). He selects a random number k = 4 and
encrypts the point (5,1). Cipher Points corresponding to point (5,1) are 𝐶1= kG= (3,1) and
𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (16,4).
 Alice represents the letter ‘r’ of daring as (5,16). He selects a random number k = 5 and
encrypts the point (5,16). Cipher Points corresponding to point (5,16) are 𝐶1= kG= (9,16)
and 𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (3,16).
 Alice represents the letter ‘i’ of daring as (7,6). He selects a random number k = 8 and
encrypts the point (7,6). Cipher Points corresponding to point (7,6) are 𝐶1= kG= (13,7) and
𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (5,16).
 Alice represents the letter ‘n’ of daring as (9,1). He selects a random number k = 9 and
encrypts the point (9,1). Cipher Points corresponding to point (9,1) are 𝐶1= kG= (7,6) and
𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (13,7).
 Alice represents the letter ‘g’ of daring as (0,6). He selects a random number k = 10 and
encrypts the point (0,6). Cipher Points corresponding to point (0,6) are 𝐶1= kG= (7,11) and
𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (9,16).
C1 C2
(16,13) (9,16)
(3,1) (16,4)
(9,16) (3,16)
(13,7) (5,16)
(7,6) (13,7)
(7,11) (9,16)
4.3. Encryption Stage 2
 Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary
form of x-coordinate of A𝐵 , binary form of x-coordinate of BAand binary form of a
randomly chosen integer t = 8, that is,
00010000 ⊕ 00001001 ⊕ 00000110 ⊕ 00001000 = 00010111.
Decimal value corresponding to 00010111 is 23.
 Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary
form of x-coordinate of A𝐵 , binary form of x-coordinate of BAand binary form of a
randomly chosen integer t = 8, that is,
00001001 ⊕ 00001001 ⊕ 00000110 ⊕ 00001000 = 00001110.
Decimal value corresponding to 00001110 is 14.
 Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary
form of y-coordinate of A𝐵 , binary form of y-coordinate of BAand binary form of a
randomly chosen integer t = 8, that is,
00001101 ⊕ 00010000 ⊕ 00001110 ⊕ 00001000 = 00011011.
Decimal value corresponding to 00011011 is 27.
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
24
 Step 4: He performs XOR operation between binary form of y-coordinate of𝐶2, binary
form of y-coordinate of A𝐵 , binary form of y-coordinate ofA𝐵andbinary form of a
randomly chosen integer t = 8, that is,
00010000 ⊕ 00010000 ⊕ 00001110 ⊕ 00001000 = 00000110
Decimal value corresponding to 00000110 is 6.
Therefore, cipher text corresponding to first character of the message, that is, ‘d’ is 23,14,27,6.
 Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text, ‘d’, that is,
00000011 ⊕ 00001001 ⊕ 00000110 ⊕ 01100100 = 01101000.
Decimal value corresponding to 01101000 is 104.
 Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘d’, that is,
00010000 ⊕ 00001001 ⊕ 00000110 ⊕ 01100100 = 01111011.
Decimal value corresponding to 01111011 is 123.
 Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘d’, that is,
00000001 ⊕ 00010000 ⊕ 00001110 ⊕ 01100100 = 01111011.
Decimal value corresponding to 01111011 is 123.
 Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘d’, that is,
00000100 ⊕ 00010000 ⊕ 00001110 ⊕ 01100100 = 01111110
.
Therefore, cipher text corresponding to second character of the message, that is, ‘a’ is
104,123,123,126.
 Step 1: He performs XOR operation between binary form of x-coordinate of𝐶1, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAbinary form of preceding
plain text ‘a’, that is,
00001001 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01110100
Decimal value corresponding to 01110100 is 116.
 Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary
form of x-coordinate of A𝐵 , binary form of x-coordinate of BA and binary form of
preceding plain text ‘a’, that is,
00000011 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01111110.
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
25
Decimal value corresponding to 01111110 is 126.
 Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary
form of y-coordinate of A𝐵 , binary form of y-coordinate of BA and binary form of
preceding plain text ‘a’, that is,
00010000 ⊕ 00010000 ⊕ 00001110 ⊕ 01110010 = 01111100.
Decimal value corresponding to 01111100 is 124.
 Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary
form of y-coordinate of A𝐵 , binary form of y-coordinate of BA and binary form of
preceding plain text ‘a’, that is,
00010000 ⊕ 00010000 ⊕ 00001110 ⊕ 01110010 = 01111100.
Decimal value corresponding to 01111100 is 124.
Therefore, cipher text corresponding to third character of the message, that is, ‘r’ is
116,126,124,124.
 Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘r’, that is,
00001101 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01110000.
Decimal value corresponding to 01110000 is 112.
 Step 2: He performs XOR operation between binary form of x-coordinate of𝐶2, binary
form of x-coordinate of A𝐵 , binary form of x-coordinate of BA and binary form of
preceding plain text ‘r’, that is,
00000101 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01111000.
Decimal value corresponding to 01111000 is 120.
 Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘r’, that is,
00000111 ⊕ 00010000 ⊕ 00001000 ⊕ 01110010 = 01101101.
Decimal value corresponding to 01101101 is 109.
 Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘r’, that is,
00010000 ⊕ 00010000 ⊕ 00001000 ⊕ 01110010 = 01111010.
Decimal value corresponding to 01111010 is 122.
Therefore, cipher text corresponding to fourth character of the message, that is, ‘i’ is
112,120,109,122.
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
26
 Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘i’, that is,
00000111 ⊕ 00001001 ⊕ 00000110 ⊕ 01101001 = 01100001.
Decimal value corresponding to 01100001 is 97.
 Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘i’, that is,
00001101 ⊕ 00001001 ⊕ 00000110 ⊕ 01101001 = 01101011
Decimal value corresponding to 01101011 is 105.
 Step 3: He performs XOR operation between binary form of y-coordinate of𝐶1, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAandbinary form of preceding
plain text ‘i’, that is,
00001101 ⊕ 00010000 ⊕ 00001000 ⊕ 01101001 = 01111100
Decimal value corresponding to 01111100 is 124.
 Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘i’, that is,
00000111 ⊕ 00010000 ⊕ 00001000 ⊕ 01101001 = 01110110.
Decimal value corresponding to 01110110 is 118.
Therefore, cipher text corresponding to fifth character of the message, that is, ‘n’ is
97,105,124,118.
 Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘n’, that is,
00000111 ⊕ 00001001 ⊕ 00000110 ⊕ 01101110 = 01100110.
Decimal value corresponding to 01100110 is 102.
 Step 2: He performs XOR operation between binary form of x-coordinate of𝐶2, binary
form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding
plain text ‘n’, that is,
00001001 ⊕ 00001001 ⊕ 00000110 ⊕ 01101110 = 01101000.
Decimal value corresponding to 01101000 is 104.
 Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary
form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding
plain text ‘n’, that is,
00001011 ⊕ 00010000 ⊕ 00000100 ⊕ 01101110 = 01110001.
Decimal value corresponding to 01110001 is 113.
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
27
 Step 4: He performs XOR operation between binary form of y-coordinate of𝐶2, binary
form of y-coordinate of A𝐵 , binary form of y-coordinate of BA and binary form of
preceding plain text ‘n’, that is,
00010000 ⊕ 00010000 ⊕ 00000100 ⊕ 01101110 = 01101010.
Decimal value corresponding to 01101010 is 106.
Therefore, cipher text corresponding to sixth character of the message, that is, ‘g’ is
102,104,113,106.
Alice sends the cipher text 23, 14, 27, 6;104, 123, 123, 126; 116, 126, 124, 124; 112, 120, 109,
122; 97, 105, 124, 118; 102, 104, 113, 106 to Bob.
4.4. Decryption Stage 1
To get (𝐶1,𝐶2) corresponding to the first character of the message, he performs following steps:
 Step 1: He performs XOR operation between binary form of first decimal value of cipher
text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form
of a randomly chosen integer t = 8, that is,
00010111 ⊕ 00001000 ⊕ 00000110 ⊕ 00001001 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as x-coordinate of 𝐶1.
 Step 2: He performs XOR operation between binary form of second decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of a randomly chosen integer t = 8, that is,
00001110 ⊕ 00001000 ⊕ 00000110 ⊕ 00001001 = 00001001.
Decimal value corresponding to 00001001 is 9 and it serve as x-coordinate of 𝐶2.
 Step 3: He performs XOR operation between binary form of third decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of a randomly chosen integer t = 8, that is,
00011011 ⊕ 00001000 ⊕ 00001110 ⊕ 00010000 = 00001101.
Decimal value corresponding to 00001101 is 13 and it serve as y-coordinate of 𝐶1.
 Step 4: He performs XOR operation between binary form of fourth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of a randomly chosen integer t = 8, that is,
00000110 ⊕ 00001000 ⊕ 0001110 ⊕ 00010000 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of 𝐶2.
To get (𝐶1,𝐶2) corresponding to the second character of the message, he performs following
steps:
 Step 1: Performs XOR operation between binary form of fifth decimal value of cipher text,
binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of
preceding plain text d, that is,
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
28
01101000 ⊕ 01100100 ⊕ 00000110 ⊕ 00001001 = 00000011.
Decimal value corresponding to 00000011 is 3 and it serve as x-coordinate of 𝐶1.
 Step 2: Performs XOR operation between binary form of sixth decimal value of cipher
text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form
of preceding plain text d, that is,
00001001 ⊕ 00000110 ⊕ 01100100 ⊕ 01111011 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as x-coordinate of 𝐶2.
 Step 3: Performs XOR operation between binary form of seventh decimal value of cipher
text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form
of preceding plain text d, that is,
01111011 ⊕ 01100100 ⊕ 00001110 ⊕ 00010000 = 00000001.
Decimal value corresponding to 00000001 is 1 and it serve as y-coordinate of 𝐶1.
 Step 4: Performs XOR operation between binary form of eighth decimal value of cipher
text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form
of preceding plain text d, that is,
01111110 ⊕ 01100100 ⊕ 00001110 ⊕ 00010000 = 00000100.
Decimal value corresponding to 00000100 is 4 and it serve as y C2.
To get (𝐶1,𝐶2) corresponding to the third character of the message, he performs following steps:
 Step 1: Performs XOR operation between binary form of ninth decimal value of cipher
text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary
form of preceding plain text, that is, a, that is,
01110100 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00001001.
Decimal value corresponding to 00001001 is 9 and it serve as x-coordinate of 𝐶1.
 Step 2: Performs XOR operation between binary form of tenth decimal value of cipher
text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary
form of preceding plain text a, that is,
01111110 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00000011.
Decimal value corresponding to 00000011 is 16 and it serve as x-coordinate of 𝐶2.
 Step 3: Performs XOR operation between binary form of eleventh decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text a, that is,
01111100 ⊕ 01110010 ⊕ 00001110 ⊕ 00010000 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of
𝐶1.
 Step 4: Performs XOR operation between binary form of twelfth decimal value of cipher
text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary
form of preceding plain text a, that is,
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
29
01111100 ⊕ 01110010 ⊕ 00001110 ⊕ 00010000 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of
𝐶2.
To get (𝐶1,𝐶2) corresponding to the fourth character of the message, he performs following steps:
 Step 1: Performs XOR operation between binary form of thirteenth decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain text, that is, r, that is,
01110000 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00001101.
Decimal value corresponding to 00001101 is 13 and it serve as x-coordinate of 𝐶1.
 Step 2: Performs XOR operation between binary form of fourteenth decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain text r, that is,
01111000 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00000101.
Decimal value corresponding to 00000101 is 5 and it serve as x-coordinate of 𝐶2.
 Step 3: Performs XOR operation between binary form of fifteenth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text r, that is,
01101101 ⊕ 01110010 ⊕ 00001000 ⊕ 00010000 = 00000111.
Decimal value corresponding to 00000111 is 7 and it serve as y-coordinate of 𝐶1.
 Step 4: Performs XOR operation between binary form of sixteenth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text r, that is,
01111010 ⊕ 01110010 ⊕ 00001000 ⊕ 00010000 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of 𝐶2.
To get (𝐶1, 𝐶2) corresponding to the fifth character of the message, he performs following steps:
 Step 1: Performs XOR operation between binary form of seventeenth decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain texti, that is,
01100001 ⊕ 01101001 ⊕ 00000110 ⊕ 00001001 = 00000111.
Decimal value corresponding to 00000111 is 7 and it serve as x-coordinate
of𝐶1.
 Step 2: Performs XOR operation between binary form of eighteenth decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain text i, that is,
01101011 ⊕ 01101001 ⊕ 00000110 ⊕ 00001001 = 00001101.
Decimal value corresponding to 00001101 is 13 and it serve as x-coordinate of 𝐶2.
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
30
 Step 3: Performs XOR operation between binary form of nineteenth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text i, that is,
01111100 ⊕ 01101001 ⊕ 00001000 ⊕ 00010000 = 00001101.
Decimal value corresponding to 00001101 is 6 and it serve as y-coordinate of 𝐶1.
 Step 4: Performs XOR operation between binary form of twentieth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text i, that is,
01110110 ⊕ 01101001 ⊕ 00001000 ⊕ 00010000 = 00000111.
Decimal value corresponding to 00000111 is 7 and it serve as y-coordinate of 𝐶2.
To get (𝐶1,𝐶2) corresponding to the sixth character of the message, he performs following steps:
 Step 1: Performs XOR operation between binary form of twenty first decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain text, that is, n, that is,
01100110 ⊕ 01101110 ⊕ 00000110 ⊕ 00001001 = 00000111.
Decimal value corresponding to 00000111 is 7 and it serve as x-coordinate of 𝐶1
 Step 2: Performs XOR operation between binary form of twenty second decimal value of
cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand
binary form of preceding plain text n, that is,
01101000 ⊕ 01101110 ⊕ 00000110 ⊕ 00001001 = 00001001.
Decimal value corresponding to 00001001 is 9 and it serve as x-coordinate of 𝐶2.
 Step 3: Performs XOR operation between binary form of twenty third decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text n, that is,
01110001 ⊕ 011101110 ⊕ 00000100 ⊕ 00010000 = 00001011.
Decimal value corresponding to 00001011 is 11 and it serve as y-coordinate of
𝐶1.
 Step 4: Performs XOR operation between binary form of twenty fourth decimal value of
cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand
binary form of preceding plain text n, that is,
01101010 ⊕ 01101110n ⊕ 00000100 ⊕ 00010000 = 00010000.
Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of 𝐶2.
4.5. Decryption Stage 2
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (3,1) corresponding to the character ‘d’.
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (5,1) corresponding to the character ‘a’.
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (5,16) corresponding to the character ‘r’.
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (7,6) corresponding to the character ‘i’.
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (9,1) corresponding to the character ‘n’.
International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
31
𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (0,6) corresponding to the character ‘g’.
5. CONCLUSION
For Bank transactions and mobile computing security of encrypted text is of prime importance.
We proposed a new double fold authenticated encryption scheme which provides confidentiality
along with authentication. This scheme makes the encrypted message more secure using two
stage encryption process.
REFERENCES
[1] D. Hankerson, A. J. Menezes and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer
Professional Computing, First ed., Springer -Verlag New York (2004).
[2] A. M. Johnston and P. S. Gemmell, Authenticated Key Exchange Provably Secure Against the Man-
in-Middle Attack, Journal of Cryptology. 2 (2002) 139148.
[3] A. Joux, A One Round Protocol for Tripartite Diffie-Hellman, Journal of Cryptology. 17 (2004) 263-
276.
[4] N. Koblitz, Elliptic Curve Cryptosystem, Mathematics of Computation. 48 (1987) 203-209.
[5] N. Koblitz, A. J. Menezes and S. Vanstone, The State of Elliptic Curve Cryptography, Design, Codes
and Cryptography. 19 (2000) 173-193.
[6] D. S. Kumar, CH. Suneetha and A. Chandrasekhar, Encryption of Data Using Elliptic Curve Over
Finite Fields, International Journal of Distributed and Parallel Systems (IJDPS). 3 (2012) 301-308.
[7] A. K. Lenstra and E. R. Verheul, Selecting Cryptographic Key Size, Journal of Cryptology. 14 (2001)
255-293.
[8] M. Machhout, Z. Guitouni, K. Torki and L. Khriji, Coupled FPGA/ASIC Implementation of Elliptic
Curve Crypto-Processor, International Journal of Network Security & Its Applications. 2 (2010).
[9] V. S. Miller, Uses of Elliptic Curves in Cryptography, In Advances in Cryptology-CRYPTO’85
Proceedings, Crypto 1985. 218 (1986) 417-426.
[10] G. L. Mullen and D. Panario, Handbook of Finite Fields, First ed., Chapman and Hall/CRC (2013).
[11] K. R. C. Pillai and M. P. Sebastian, Elliptic Curve Based Authenticated Session Key Establishment
Protocol for High Security Applications in Constrained Network Environment, International Journal
of Network Security and Its Applications (IJNSA). 2 (2010).
[12] J. H. Silverman, The Arithmetic of Elliptic Curves, Graduate Texts in Mathematics. 106 (2009).
[13] L. D. Singh and K. M. Singh, Implementation of Text Encryption Using Elliptic Curve Cryptography,
Procedia Computer Science. 54 (2015) 73-82.
[14] CH. Suneetha, D. S. Kumar and A. Chandrasekhar, Secure Key Transport in Symmetric
Cryptographic Protocols Using Elliptic Curves Over Finite Fields, International Journal of Computer
Applications. 36 (2011).
[15] L. C. Washington, Elliptic Curves Number Theory and Cryptography, Second ed., Chapman and
Hall/CRC (2008).

More Related Content

Similar to AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY

Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
IDES Editor
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
Computer Science Journals
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptography
inventy
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
IOSR Journals
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
IOSR Journals
 
Modified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCModified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECC
idescitation
 
rs_1.pptx
rs_1.pptxrs_1.pptx
rs_1.pptx
MaddulaCharishma
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
IJNSA Journal
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
IJNSA Journal
 
Encoding in sc
Encoding in scEncoding in sc
Encoding in sc
rajshreemuthiah
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
IJNSA Journal
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...
journalBEEI
 
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
ijcsity
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsa
Soham Mondal
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
IJNSA Journal
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
Journal For Research
 
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftMathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
AlexanderCominsky
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
Soham Mondal
 
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
IJECEIAES
 

Similar to AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY (20)

Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptography
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Modified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCModified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECC
 
rs_1.pptx
rs_1.pptxrs_1.pptx
rs_1.pptx
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
Encoding in sc
Encoding in scEncoding in sc
Encoding in sc
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...
 
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsa
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
 
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftMathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
 
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
 

More from ijujournal

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
ijujournal
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
ijujournal
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdf
ijujournal
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ijujournal
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
ijujournal
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
ijujournal
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ijujournal
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
ijujournal
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
ijujournal
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
ijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
ijujournal
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
ijujournal
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
ijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
ijujournal
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
ijujournal
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
ijujournal
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
ijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
ijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
ijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ijujournal
 

More from ijujournal (20)

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdf
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 

Recently uploaded

一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Kaxil Naik
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
y3i0qsdzb
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
VyNguyen709676
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
bmucuha
 
Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024
facilitymanager11
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 

Recently uploaded (20)

一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
 
Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 

AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY

  • 1. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 DOI : 10.5121/iju.2022.13202 19 AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY P. L. Sharma1 , Kritika Gupta2 , Nikhlesh Kumar Badoga3 , Ashima4 and Himanshu Monga4 1,2,4 Department of Mathematics & Statistics, Himachal Pradesh University, Shimla, India 3 Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Punjab, India 4 Department of Electronics & Communication Engineering Jwaharlal Nehru Government Engineering College, Sundernagar, Mandi (H.P), India ABSTRACT Secure transformation of data is of prime importance in today’s world. In the present paper, we propose a double fold authenticated public key encryption scheme which helps us in securely sending the confidential data between sender and receiver. This scheme makes the encrypted data more secure against various cryptographic attacks. 1. INTRODUCTION The theory of elliptic curves in cryptography was first introduced by Miller [9] and Koblitz [4] in the year 1985. Security of Elliptic Curve Cryptography mainly depends on the problem of solving Elliptic Curve Discrete Logarithm Problem. The main advantage of using ECC over RSA is that it provides same level of security but with lesser key size. Elliptic Curve Cryptography finds many applications in wireless networks and mobile computing. Elliptic Curve Cryptography is an active area of research. ECC can be used in several tasks like digital signature, decryption, encryption, key agreement and authentication, see [2, 3, 5, 7, 8, 13]. The book “Guide to Elliptic Curve Cryptography” provides many details of arithmetic of elliptic curves and implementation issues, see [1]. Kumar et al. [6] proposed a secure and authentic method to encrypt a message. Through Elliptic curve cryptography, we can securely transport keys between sender and receiver and it also helps in authentic session key establishment protocols, see [10, 11, 12, 14, 15]. In the present paper, we propose an encryption scheme that makes use of the specific public key and XOR operation to encrypt the message securely. This scheme uses double fold encryption to enhance the security of encrypted message. To securely send the data between sender and real receiver is of prime importance in Bank transactions, e-commerce and tenders etc. Proposed scheme provides confidentiality along with authentication and provides higher level of security. We use elliptic curves over finite fields for this encryption algorithm. 2. PRELIMINARIES 2.1. Group Law on Elliptic Curves Suppose that E(Fp) is an elliptic curve defined over the finite field Fp, then the set of points of elliptic curve along with addition operation form an abelian group and point of infinity act as an identity element of the group.
  • 2. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 20 2.2. Point Addition Let Fpbe any finite field with prime p. Equation of elliptic curve over Fp is y2 = (x3 + ax+ b) mod p. Let S(𝑝1,𝑞1) and T(𝑝2,𝑞2) be two points on E(Fp) such that S ≠T and S + T = U(𝑝3,𝑞3), then 𝑝3= {λ2 −𝑝1− 𝑝2} mod p and 𝑞3= {λ(𝑝1− 𝑝3) − 𝑞1} mod p, where 2.3. Point Doubling Let S and T be two overlapping points on elliptic curve over Fp and S(𝑝1,𝑞1) + T(𝑝1, 𝑞1) = U(𝑝2,𝑞2), then 𝑝2= {λ2 − 2𝑝1} mod p and 𝑞2= {λ(𝑝1− 𝑝2) − 𝑞1} mod p, where 2.4. Elliptic Curve Discrete Logarithm Problem Security of ECC depends on Elliptic Curve Discrete Logarithm. Given two points S and T on elliptic curve over finite field. For given x and S, it is easy to compute T = xS, but very difficult to find x if S and T are given. The problem to find x is known as Elliptic Curve Discrete Logarithm Problem. 3. PROPOSED SCHEME If Alice wants to send some message to Bob, then they both will agree on an elliptic curve over finite field and some common code table. Let G be a generator point of order n. Alice selects his private keys α and 𝑛𝐴 in such a manner that α𝑛𝐴 lies in the interval [1,n − 1] and α and 𝑛𝐴 should be large random numbers. He computes his public key as 𝑃𝐴= 𝑛𝐴G. In the similar manner, Bob selects his private keys as β and 𝑛𝐵 and public key as 𝑃𝐵= 𝑛𝐵G. After publishing their public keys, they calculate specific public keys for each other. Specific public key generated by Alice only for Bob is A𝐵= α 𝑛𝐴𝑃𝐵 and specific public key generated by Bob only for Alice isBA= β𝑛𝐵𝑃𝐴. 3.1. Encryption Stage 1 Alice converts the character of the message to point on elliptic curve using Code table. He chooses a random integer k and generates cipher points for each message point as: 𝐶1= kG
  • 3. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 21 and 𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA. 3.2. Encryption Stage 2 Step 1: Convert each coordinate of the points obtained in the above step to binary form. Step 2: Perform XOR operation between binary form of x-coordinate of 𝐶1, binary form of x- coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer t. Randomly chosen integer must be kept confidential between sender and receiver. Step 3: Result obtained in the above step will be changed to decimal value. Step 4: Perform XOR operation between binary form of x-coordinate of 𝐶2, binary form of x- coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer t. Step 5: Result obtained in the above step will be changed to decimal value. Step 6: Performs XOR operation between binary form of y-coordinate of 𝐶1, binary form of y- coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer t and change the resultant value to decimal value. Step 7: Performs XOR operation between binary form of y-coordinate of 𝐶2, binary form of y- coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer t and change the resultant value to decimal value. These four decimal values act as cipher text corresponding to first character of the message. Following the same procedure, he creates the cipher text corresponding to the remaining characters of the message. But to encrypt the remaining characters of the message, he will use binary form of preceding plain text in place of randomly chosen integer and send the cipher text to receiver. 3.3. Decryption Stage 1 Step 1: After obtaining cipher text, he converts all the decimal values to binary form. Step 2: Performs XOR operation between binary form of first decimal value, binary form of x- coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer t and the resultant will correspond to x-coordinate of 𝐶1. Step 3: Performs XOR operation between binary form of second decimal value, binary form of x- coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer t and the resultant will correspond to x-coordinate of 𝐶2. Step 4: Performs XOR operation between binary form of third decimal value, binary form of y- coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer t and the resultant will correspond to y-coordinate of 𝐶1. Step 5: Performs XOR operation between binary form of fourth decimal value, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer t and the resultant will correspond to y-coordinate of𝐶2. In the similar manner, he obtains all the cipher points (𝐶1,𝐶2) corresponding to each character of the message. 3.4. Decryption Stage 2 After obtaining all the values for (𝐶1,𝐶2), Bob will decrypt the message Pm as:
  • 4. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 22 𝑃m= 𝐶2− 𝐶1𝑛𝐵− βA𝐵. and gets the original message. 4. ILLUSTRATION Suppose Alice and Bob agree on elliptic curve y2 = (x3 + 2x + 2) mod 17 over the finite field 𝐹17. Elliptic curve points are as given below: Table 1 ∞ (16,13) (0,11) (5,16) (5,1) (0,6) (16,4) (6,3) (13,7) (9,1) (10,6) (7,6) (3,16) (3,1) (7,11) (10,11) (9,16) (13,10) (6,14) Here, ∞ is the point of infinity. Generator of the elliptic curve is G = (5,1). Private keys of Alice are α = 2, 𝑛𝐴= 3. Private keys of Bob are β = 3, 𝑛𝐵= 4. Public key of Alice is 𝑃𝐴= 𝑛𝐴G = (10,6). Public key of Bob is 𝑃𝐵= 𝑛𝐵G = (3,1). Specific public key generated by Alice for Bob is A𝐵= α𝑛𝐴𝑃𝐵= (9,16) and Specific public key generated by Bob for Alice is BA= β𝑛𝐵𝑃𝐴= (6,14). 4.1. Encryption If Alice wants to send the message ‘daring’ to Bob, he encodes the characters of the message ‘daring’ to points on elliptic curve using Code Table given below: Code Table * a b c d e f g ∞ (5,1) (6,3) (10,6) (3,1) (9,16) (16,13) (0,6) h i j k l m n o (13,7) (7,6) (7,11) (13,10) (0,11) (16,4) (9,1) (3,16) p q r (10,11) (6,14) (5,16) 4.2. Encryption Stage 1  Alice represents the letter ‘d’ of daring as (3,1). He selects a random number k = 6 and encrypts the point (3,1). Cipher Points corresponding to point (3,1) are 𝐶1= kG= (16,13) and 𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (9,16).
  • 5. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 23  Alice represents the letter ‘a’ of daring as (5,1). He selects a random number k = 4 and encrypts the point (5,1). Cipher Points corresponding to point (5,1) are 𝐶1= kG= (3,1) and 𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (16,4).  Alice represents the letter ‘r’ of daring as (5,16). He selects a random number k = 5 and encrypts the point (5,16). Cipher Points corresponding to point (5,16) are 𝐶1= kG= (9,16) and 𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (3,16).  Alice represents the letter ‘i’ of daring as (7,6). He selects a random number k = 8 and encrypts the point (7,6). Cipher Points corresponding to point (7,6) are 𝐶1= kG= (13,7) and 𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (5,16).  Alice represents the letter ‘n’ of daring as (9,1). He selects a random number k = 9 and encrypts the point (9,1). Cipher Points corresponding to point (9,1) are 𝐶1= kG= (7,6) and 𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (13,7).  Alice represents the letter ‘g’ of daring as (0,6). He selects a random number k = 10 and encrypts the point (0,6). Cipher Points corresponding to point (0,6) are 𝐶1= kG= (7,11) and 𝐶2= 𝑃𝑚+ k𝑃𝐵+ αBA= (9,16). C1 C2 (16,13) (9,16) (3,1) (16,4) (9,16) (3,16) (13,7) (5,16) (7,6) (13,7) (7,11) (9,16) 4.3. Encryption Stage 2  Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary form of x-coordinate of A𝐵 , binary form of x-coordinate of BAand binary form of a randomly chosen integer t = 8, that is, 00010000 ⊕ 00001001 ⊕ 00000110 ⊕ 00001000 = 00010111. Decimal value corresponding to 00010111 is 23.  Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary form of x-coordinate of A𝐵 , binary form of x-coordinate of BAand binary form of a randomly chosen integer t = 8, that is, 00001001 ⊕ 00001001 ⊕ 00000110 ⊕ 00001000 = 00001110. Decimal value corresponding to 00001110 is 14.  Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary form of y-coordinate of A𝐵 , binary form of y-coordinate of BAand binary form of a randomly chosen integer t = 8, that is, 00001101 ⊕ 00010000 ⊕ 00001110 ⊕ 00001000 = 00011011. Decimal value corresponding to 00011011 is 27.
  • 6. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 24  Step 4: He performs XOR operation between binary form of y-coordinate of𝐶2, binary form of y-coordinate of A𝐵 , binary form of y-coordinate ofA𝐵andbinary form of a randomly chosen integer t = 8, that is, 00010000 ⊕ 00010000 ⊕ 00001110 ⊕ 00001000 = 00000110 Decimal value corresponding to 00000110 is 6. Therefore, cipher text corresponding to first character of the message, that is, ‘d’ is 23,14,27,6.  Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text, ‘d’, that is, 00000011 ⊕ 00001001 ⊕ 00000110 ⊕ 01100100 = 01101000. Decimal value corresponding to 01101000 is 104.  Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text ‘d’, that is, 00010000 ⊕ 00001001 ⊕ 00000110 ⊕ 01100100 = 01111011. Decimal value corresponding to 01111011 is 123.  Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text ‘d’, that is, 00000001 ⊕ 00010000 ⊕ 00001110 ⊕ 01100100 = 01111011. Decimal value corresponding to 01111011 is 123.  Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text ‘d’, that is, 00000100 ⊕ 00010000 ⊕ 00001110 ⊕ 01100100 = 01111110 . Therefore, cipher text corresponding to second character of the message, that is, ‘a’ is 104,123,123,126.  Step 1: He performs XOR operation between binary form of x-coordinate of𝐶1, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAbinary form of preceding plain text ‘a’, that is, 00001001 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01110100 Decimal value corresponding to 01110100 is 116.  Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary form of x-coordinate of A𝐵 , binary form of x-coordinate of BA and binary form of preceding plain text ‘a’, that is, 00000011 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01111110.
  • 7. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 25 Decimal value corresponding to 01111110 is 126.  Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary form of y-coordinate of A𝐵 , binary form of y-coordinate of BA and binary form of preceding plain text ‘a’, that is, 00010000 ⊕ 00010000 ⊕ 00001110 ⊕ 01110010 = 01111100. Decimal value corresponding to 01111100 is 124.  Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary form of y-coordinate of A𝐵 , binary form of y-coordinate of BA and binary form of preceding plain text ‘a’, that is, 00010000 ⊕ 00010000 ⊕ 00001110 ⊕ 01110010 = 01111100. Decimal value corresponding to 01111100 is 124. Therefore, cipher text corresponding to third character of the message, that is, ‘r’ is 116,126,124,124.  Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text ‘r’, that is, 00001101 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01110000. Decimal value corresponding to 01110000 is 112.  Step 2: He performs XOR operation between binary form of x-coordinate of𝐶2, binary form of x-coordinate of A𝐵 , binary form of x-coordinate of BA and binary form of preceding plain text ‘r’, that is, 00000101 ⊕ 00001001 ⊕ 00000110 ⊕ 01110010 = 01111000. Decimal value corresponding to 01111000 is 120.  Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text ‘r’, that is, 00000111 ⊕ 00010000 ⊕ 00001000 ⊕ 01110010 = 01101101. Decimal value corresponding to 01101101 is 109.  Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text ‘r’, that is, 00010000 ⊕ 00010000 ⊕ 00001000 ⊕ 01110010 = 01111010. Decimal value corresponding to 01111010 is 122. Therefore, cipher text corresponding to fourth character of the message, that is, ‘i’ is 112,120,109,122.
  • 8. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 26  Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text ‘i’, that is, 00000111 ⊕ 00001001 ⊕ 00000110 ⊕ 01101001 = 01100001. Decimal value corresponding to 01100001 is 97.  Step 2: He performs XOR operation between binary form of x-coordinate of 𝐶2, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text ‘i’, that is, 00001101 ⊕ 00001001 ⊕ 00000110 ⊕ 01101001 = 01101011 Decimal value corresponding to 01101011 is 105.  Step 3: He performs XOR operation between binary form of y-coordinate of𝐶1, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAandbinary form of preceding plain text ‘i’, that is, 00001101 ⊕ 00010000 ⊕ 00001000 ⊕ 01101001 = 01111100 Decimal value corresponding to 01111100 is 124.  Step 4: He performs XOR operation between binary form of y-coordinate of 𝐶2, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text ‘i’, that is, 00000111 ⊕ 00010000 ⊕ 00001000 ⊕ 01101001 = 01110110. Decimal value corresponding to 01110110 is 118. Therefore, cipher text corresponding to fifth character of the message, that is, ‘n’ is 97,105,124,118.  Step 1: He performs XOR operation between binary form of x-coordinate of 𝐶1, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text ‘n’, that is, 00000111 ⊕ 00001001 ⊕ 00000110 ⊕ 01101110 = 01100110. Decimal value corresponding to 01100110 is 102.  Step 2: He performs XOR operation between binary form of x-coordinate of𝐶2, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text ‘n’, that is, 00001001 ⊕ 00001001 ⊕ 00000110 ⊕ 01101110 = 01101000. Decimal value corresponding to 01101000 is 104.  Step 3: He performs XOR operation between binary form of y-coordinate of 𝐶1, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text ‘n’, that is, 00001011 ⊕ 00010000 ⊕ 00000100 ⊕ 01101110 = 01110001. Decimal value corresponding to 01110001 is 113.
  • 9. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 27  Step 4: He performs XOR operation between binary form of y-coordinate of𝐶2, binary form of y-coordinate of A𝐵 , binary form of y-coordinate of BA and binary form of preceding plain text ‘n’, that is, 00010000 ⊕ 00010000 ⊕ 00000100 ⊕ 01101110 = 01101010. Decimal value corresponding to 01101010 is 106. Therefore, cipher text corresponding to sixth character of the message, that is, ‘g’ is 102,104,113,106. Alice sends the cipher text 23, 14, 27, 6;104, 123, 123, 126; 116, 126, 124, 124; 112, 120, 109, 122; 97, 105, 124, 118; 102, 104, 113, 106 to Bob. 4.4. Decryption Stage 1 To get (𝐶1,𝐶2) corresponding to the first character of the message, he performs following steps:  Step 1: He performs XOR operation between binary form of first decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer t = 8, that is, 00010111 ⊕ 00001000 ⊕ 00000110 ⊕ 00001001 = 00010000. Decimal value corresponding to 00010000 is 16 and it serve as x-coordinate of 𝐶1.  Step 2: He performs XOR operation between binary form of second decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of a randomly chosen integer t = 8, that is, 00001110 ⊕ 00001000 ⊕ 00000110 ⊕ 00001001 = 00001001. Decimal value corresponding to 00001001 is 9 and it serve as x-coordinate of 𝐶2.  Step 3: He performs XOR operation between binary form of third decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer t = 8, that is, 00011011 ⊕ 00001000 ⊕ 00001110 ⊕ 00010000 = 00001101. Decimal value corresponding to 00001101 is 13 and it serve as y-coordinate of 𝐶1.  Step 4: He performs XOR operation between binary form of fourth decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of a randomly chosen integer t = 8, that is, 00000110 ⊕ 00001000 ⊕ 0001110 ⊕ 00010000 = 00010000. Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of 𝐶2. To get (𝐶1,𝐶2) corresponding to the second character of the message, he performs following steps:  Step 1: Performs XOR operation between binary form of fifth decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text d, that is,
  • 10. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 28 01101000 ⊕ 01100100 ⊕ 00000110 ⊕ 00001001 = 00000011. Decimal value corresponding to 00000011 is 3 and it serve as x-coordinate of 𝐶1.  Step 2: Performs XOR operation between binary form of sixth decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text d, that is, 00001001 ⊕ 00000110 ⊕ 01100100 ⊕ 01111011 = 00010000. Decimal value corresponding to 00010000 is 16 and it serve as x-coordinate of 𝐶2.  Step 3: Performs XOR operation between binary form of seventh decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text d, that is, 01111011 ⊕ 01100100 ⊕ 00001110 ⊕ 00010000 = 00000001. Decimal value corresponding to 00000001 is 1 and it serve as y-coordinate of 𝐶1.  Step 4: Performs XOR operation between binary form of eighth decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text d, that is, 01111110 ⊕ 01100100 ⊕ 00001110 ⊕ 00010000 = 00000100. Decimal value corresponding to 00000100 is 4 and it serve as y C2. To get (𝐶1,𝐶2) corresponding to the third character of the message, he performs following steps:  Step 1: Performs XOR operation between binary form of ninth decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text, that is, a, that is, 01110100 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00001001. Decimal value corresponding to 00001001 is 9 and it serve as x-coordinate of 𝐶1.  Step 2: Performs XOR operation between binary form of tenth decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text a, that is, 01111110 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00000011. Decimal value corresponding to 00000011 is 16 and it serve as x-coordinate of 𝐶2.  Step 3: Performs XOR operation between binary form of eleventh decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text a, that is, 01111100 ⊕ 01110010 ⊕ 00001110 ⊕ 00010000 = 00010000. Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of 𝐶1.  Step 4: Performs XOR operation between binary form of twelfth decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text a, that is,
  • 11. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 29 01111100 ⊕ 01110010 ⊕ 00001110 ⊕ 00010000 = 00010000. Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of 𝐶2. To get (𝐶1,𝐶2) corresponding to the fourth character of the message, he performs following steps:  Step 1: Performs XOR operation between binary form of thirteenth decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text, that is, r, that is, 01110000 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00001101. Decimal value corresponding to 00001101 is 13 and it serve as x-coordinate of 𝐶1.  Step 2: Performs XOR operation between binary form of fourteenth decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text r, that is, 01111000 ⊕ 01110010 ⊕ 00000110 ⊕ 00001001 = 00000101. Decimal value corresponding to 00000101 is 5 and it serve as x-coordinate of 𝐶2.  Step 3: Performs XOR operation between binary form of fifteenth decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text r, that is, 01101101 ⊕ 01110010 ⊕ 00001000 ⊕ 00010000 = 00000111. Decimal value corresponding to 00000111 is 7 and it serve as y-coordinate of 𝐶1.  Step 4: Performs XOR operation between binary form of sixteenth decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text r, that is, 01111010 ⊕ 01110010 ⊕ 00001000 ⊕ 00010000 = 00010000. Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of 𝐶2. To get (𝐶1, 𝐶2) corresponding to the fifth character of the message, he performs following steps:  Step 1: Performs XOR operation between binary form of seventeenth decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain texti, that is, 01100001 ⊕ 01101001 ⊕ 00000110 ⊕ 00001001 = 00000111. Decimal value corresponding to 00000111 is 7 and it serve as x-coordinate of𝐶1.  Step 2: Performs XOR operation between binary form of eighteenth decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text i, that is, 01101011 ⊕ 01101001 ⊕ 00000110 ⊕ 00001001 = 00001101. Decimal value corresponding to 00001101 is 13 and it serve as x-coordinate of 𝐶2.
  • 12. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 30  Step 3: Performs XOR operation between binary form of nineteenth decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text i, that is, 01111100 ⊕ 01101001 ⊕ 00001000 ⊕ 00010000 = 00001101. Decimal value corresponding to 00001101 is 6 and it serve as y-coordinate of 𝐶1.  Step 4: Performs XOR operation between binary form of twentieth decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text i, that is, 01110110 ⊕ 01101001 ⊕ 00001000 ⊕ 00010000 = 00000111. Decimal value corresponding to 00000111 is 7 and it serve as y-coordinate of 𝐶2. To get (𝐶1,𝐶2) corresponding to the sixth character of the message, he performs following steps:  Step 1: Performs XOR operation between binary form of twenty first decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text, that is, n, that is, 01100110 ⊕ 01101110 ⊕ 00000110 ⊕ 00001001 = 00000111. Decimal value corresponding to 00000111 is 7 and it serve as x-coordinate of 𝐶1  Step 2: Performs XOR operation between binary form of twenty second decimal value of cipher text, binary form of x-coordinate of A𝐵, binary form of x-coordinate of BAand binary form of preceding plain text n, that is, 01101000 ⊕ 01101110 ⊕ 00000110 ⊕ 00001001 = 00001001. Decimal value corresponding to 00001001 is 9 and it serve as x-coordinate of 𝐶2.  Step 3: Performs XOR operation between binary form of twenty third decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text n, that is, 01110001 ⊕ 011101110 ⊕ 00000100 ⊕ 00010000 = 00001011. Decimal value corresponding to 00001011 is 11 and it serve as y-coordinate of 𝐶1.  Step 4: Performs XOR operation between binary form of twenty fourth decimal value of cipher text, binary form of y-coordinate of A𝐵, binary form of y-coordinate of BAand binary form of preceding plain text n, that is, 01101010 ⊕ 01101110n ⊕ 00000100 ⊕ 00010000 = 00010000. Decimal value corresponding to 00010000 is 16 and it serve as y-coordinate of 𝐶2. 4.5. Decryption Stage 2 𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (3,1) corresponding to the character ‘d’. 𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (5,1) corresponding to the character ‘a’. 𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (5,16) corresponding to the character ‘r’. 𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (7,6) corresponding to the character ‘i’. 𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (9,1) corresponding to the character ‘n’.
  • 13. International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022 31 𝑃m= 𝐶2− 𝐶1𝑛𝐵− β𝐴B= (0,6) corresponding to the character ‘g’. 5. CONCLUSION For Bank transactions and mobile computing security of encrypted text is of prime importance. We proposed a new double fold authenticated encryption scheme which provides confidentiality along with authentication. This scheme makes the encrypted message more secure using two stage encryption process. REFERENCES [1] D. Hankerson, A. J. Menezes and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer Professional Computing, First ed., Springer -Verlag New York (2004). [2] A. M. Johnston and P. S. Gemmell, Authenticated Key Exchange Provably Secure Against the Man- in-Middle Attack, Journal of Cryptology. 2 (2002) 139148. [3] A. Joux, A One Round Protocol for Tripartite Diffie-Hellman, Journal of Cryptology. 17 (2004) 263- 276. [4] N. Koblitz, Elliptic Curve Cryptosystem, Mathematics of Computation. 48 (1987) 203-209. [5] N. Koblitz, A. J. Menezes and S. Vanstone, The State of Elliptic Curve Cryptography, Design, Codes and Cryptography. 19 (2000) 173-193. [6] D. S. Kumar, CH. Suneetha and A. Chandrasekhar, Encryption of Data Using Elliptic Curve Over Finite Fields, International Journal of Distributed and Parallel Systems (IJDPS). 3 (2012) 301-308. [7] A. K. Lenstra and E. R. Verheul, Selecting Cryptographic Key Size, Journal of Cryptology. 14 (2001) 255-293. [8] M. Machhout, Z. Guitouni, K. Torki and L. Khriji, Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor, International Journal of Network Security & Its Applications. 2 (2010). [9] V. S. Miller, Uses of Elliptic Curves in Cryptography, In Advances in Cryptology-CRYPTO’85 Proceedings, Crypto 1985. 218 (1986) 417-426. [10] G. L. Mullen and D. Panario, Handbook of Finite Fields, First ed., Chapman and Hall/CRC (2013). [11] K. R. C. Pillai and M. P. Sebastian, Elliptic Curve Based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment, International Journal of Network Security and Its Applications (IJNSA). 2 (2010). [12] J. H. Silverman, The Arithmetic of Elliptic Curves, Graduate Texts in Mathematics. 106 (2009). [13] L. D. Singh and K. M. Singh, Implementation of Text Encryption Using Elliptic Curve Cryptography, Procedia Computer Science. 54 (2015) 73-82. [14] CH. Suneetha, D. S. Kumar and A. Chandrasekhar, Secure Key Transport in Symmetric Cryptographic Protocols Using Elliptic Curves Over Finite Fields, International Journal of Computer Applications. 36 (2011). [15] L. C. Washington, Elliptic Curves Number Theory and Cryptography, Second ed., Chapman and Hall/CRC (2008).