SlideShare a Scribd company logo
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 7, Issue 3 (Sep. - Oct. 2013), PP 56-60
www.iosrjournals.org
www.iosrjournals.org 56 | Page
“Proposed Model for Network Security Issues Using Elliptical
Curve Cryptography”
1
Garima Kaushik, 2
Mr. Shailendra Gaur
1
Btech (CSE 4th
year), Bhagwan Parshuram Institute of Technology, GGSIPU, India
2
Assisstant Professor, Bhagwan Parshuram Institute of Technology, GGSIPU, India
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
I. Introduction
The electronic revolution in our daily life has created an environment where information is available to
the masses; let it be our address, phone number, our social security number or personal conversation on a
website. In this age of information overload there are some elements that can use this information against you.
So, we need to convert our data in a form that cannot be read or understood by anyone. This is the idea of
encryption.
Every alphabet or character that we type is represented by a binary number. The Encryption process
focuses on mixing up these binary numbers after performing mathematical operations which converts the binary
number in a newer arrangement which is not understandable. This is done by a key.
Every encryption process uses a “key” for encryption. The key we use to encrypt a text is used again to
decrypt it. Such encryption process is called symmetric encryption. There is one more process that uses two
distinct keys, one to encrypt and a different one to decrypt. The mathematics of this was first purposed by
Elliptical Curve Cryptography. [1]
The key is a parameter that is passed in the encryption function along with the text needed to be
encrypted, which generates a cipher text. This cipher text can be transmitted over an unsecure net-work. When
received by the intended recipient, it will decrypt the cipher text using a key, which is again passed into a
decryption function to recover the plain text back. If any other eavesdropper intercepts the message over the
network, he will not be able to decode it, as the key is not known to him. [ 2]
Figure 1.1 – Encryption/ Decryption Process
II. Elliptic Curve Cryptography (ECC)
A: Basics Of Elliptic Curve
 Elliptic Curve (EC) systems as applied to cryptography were first proposed in 1985 independently by Neal
Koblitz and Victor Miller.
 Elliptic Curve Cryptography is based on the complexity of elliptic curve discrete algorithm which is also
known as N.P hard Problem.
 ECC was basically designed to run on small, constrained devices especially embedded devices which has
less storage space capacity, less processing capabilities , less power consumption.
 ECC can be widely used in information security and Ecommerce.
 ECC uses points on the elliptic curve to derive a 162 bits public key that is equivalent in strength to 1024
bits RSA key. Hence, main benefit of ECC is that by using smaller key it provide equivalent level of
security as the conventional crypto systems.
 RSA has exponentiation which is raising the message or ciphertext to the public or private values whereas
“Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 57 | Page
ECC has point multiplication which has repeated addition of two points.
 The idea of Elliptic Curve has unique property which makes it suitable for use in cryptography. This
uniqueness forms the ability to take any two points on a specific curve, add them together, and get a third
point on the same curve. The confusion in cryptography is that which two points were added together to
obtain the third point.
Basic Concepts -
The Elliptic Curve [3] has a very unique property which makes it suitable for use in cryptography. This
uniqueness forms the ability to take any two points on a specific curve, add them together, and get a third point
on the same curve.An elliptic curve is defined by an equation is two variables, with coefficient. For the purpose
of cryptography, the variable and coefficient are limited to a special kind of set called a FINITE FIELD. The
general equation for an elliptic curve is:
y2
+ axy + by = x3
+ cx2
+ dx + e
where a,b,c,d and e are real numbers and x and y also take their values from real number .A simplified version
of the equation will be:
y2
– x8
+ dx + e
In Elliptical Curve Cryptography, the Elliptic Curve is used to define the members of the set over which the
group is calculated i.e. an operation on any two elements of the set will give a result that is the member of the
same set as well as operations between them.
ECC is considered as the one which has the highest security quality in per bit key among current public
key cryptosystems. It‟s characterized by small key, small system parameter, small public key, saving bandwidth,
fast implementation, low power, and low hardware requirements. [4]
ECC is "an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite
fields" [ 5].For the purpose of cryptography the variables and coefficients are limited to a special kind of set
called a FINITE FIELD.
The security of ECC depends on the difficulty of Elliptic Curve Discrete Logarithm Problem (ECDLP).
Let P and Q be the two points on the curve such that kP = Q, where k is a scalar and is called elliptic curve
discrete logarithm of Q to the base P. Given P and Q, it is computationally infeasible to obtain k, if k is
sufficiently large. [6]
The implementation of ECC mainly relies on the operations at three levels: the scalar multiplication,
the pointaddition / doubling, and the finite field modulo arithmetic. The ECC system based on GF(2n) is widely
utilized for its simple field arithmetic and efficient scalar multiplication algorithms.
Two different coordinates: the affine coordinate and the projective coordinate can be used for the ECC
where the curve is defined over GF(2n). It was shown in [3][7][8] that the projective coordinate is more
desirable for hardwareimplementation because it avoids the costly field inversion operation
In Wireless sensor Networks, Elliptic Curve Cryptography (ECC) was the natural choice between
Various Public Key Cryptographic options due to its efficient execution and computation, small key size and
signatures comparable to other PKC schemes such as RSA.
For example, an ECC protocol only needs 160 bit keys to provide equivalent security to 1024-bit RSA. In
addition, the benefits of having small key size results significant advantages such as smaller ROM, smaller
RAM, faster execution and more efficient storage. [9]
III. Algorithm / Methodology Used
The mathematical operations of ECC are defined over the elliptic curve equation
y² = x³ + ax + b
where 4a3 + 27b2 ≠ 0. Each value of „a‟ and „b‟ gives a different elliptic curve. All points (x, y) which satisfy
the above equation for given (a, b) plus a point atinfinity. The public key is a point on the curve and the private
key is a random number. The public key is obtained by multiplying the private key with a generator point P on
the curve. [6]
At the Sender End –
Step 1 - The sender will take a point P on the elliptic curve equation given above.
Step 2 – A random number„d‟ is selected within the range of 1- (n-1). „d‟ is the private key.
Step 3 – The sender will generate a public key Q by private key and point P.
Q = d*P
“Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 58 | Page
Step 4 – The message to be sent has point „M‟ on curve E.
Step 5 – Randomly select „k‟ from 1 to (n-1).
Step 6 – Generate two cipher text strings C1 and C2.
C1 = k *P
C2 = M+K*Q
Step 7 – Send C1 and C2. C1 and C2 are encrypted texts.
Figure 1.2 – Encryption at sender site
At the Receiver End –
Step 1 – The receiver uses the cipher texts C1 and C2 to decrypt the message M.
Step 2 – The receiver uses the private key to decrypt the message M.
Step 3 – The receiver has private key „d‟.
M = C2 – d*C1
Step 4 – „M‟ is the original message.
So, we get the original message back which we sent.
Figure 1.3 – Decryption at the receiver site
V. Output
The given Algorithm has been implemented by use of the above mentioned codes. It has been given
inputs of various length bit words i.e. it can take messages of 1-bit, 2-bit,3-bit….10bits. It generates a random
number which is taken as a point on curve. Sender has a private key which is known to only him and the
receiver. The public keys as two cipher texts are generated and sent over the carrier. These are the encrypted
texts. At the receiver end, the two cipher texts are received which along with the private key help to decrypt the
text.
Encrypted texts
C1 and C2
Private key of
receiver, d
M= C2-d*C1 Original Message,
M
“Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 59 | Page
Figure 1.4 – Output of 1bit number Figure 1.5 – Output of 1bit number
VI. Analysis Of The Output
At the sender end :
At the receiver end :
“Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 60 | Page
The Encrypted message sent at the receiver side is same as the Decrypted message at the Receiver site.
VI. Conclusion
The digital signature based Elliptic Curve Cryptography covers all four aspects of security - Integrity,
Authentication , Non-repudiation and Confidentiality.
The promise of ECC for the better and secure data transmission is opening new dimensions of its
application in every field of communication. Mobile computing, wireless sensor net-works, server based
encryption, image encryption, government and financial communication protocols and many other. But there is
still a lot of research required for its practical implementation.
1. It is used in the growing wireless industry.
2. It depends on the case of use and level of security it provides.
Future Work-
This is a completely new domain and has tremendous scope of research.
ECC can be used to provide authentication and enhanced security.
USE OF ECC - Mobile computing, wireless sensor net-works, server based encryption, image encryption,
government and financial communication protocols and many other areas.
References -
[1]. An Elliptic Curve Cryptography Primer, Certicom “Catch the curve” White paper series, June 2004
[2]. Elliptic Curve Cryptography A new way for Encryption, Rahim Ali , Department of Computer Science and Engineering, Bahria
University, 13 National Stadium Road Karachi
[3]. IEEE Standard P 1363-2000, IEEE standard specification for public key cryptography‟, Aug2000.
[4]. The Study and Application of Elliptic Curve Cryptography Library on Wireless Sensor Network, 2008 11th
IEEE International
Conference on Communication Technology Proceedings.
[5]. D. R. Hankerson, S. A. Vanstone, and A. J. Menezes, Guide to Elliptic Curve Cryptography:Springer, 2004.
[6]. “Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography” , 2009 First International Conference on
Computational Intelligence, Communication Systems and Networks.
[7]. G. Agnew, R. Mullin, and S. Vanstone, “On the development of a fast elliptic curve processor chip”, Advances in Cryptology
CRYPTO’91, pp. 482-487, New York, Springer-Verlag, 1991.
[8]. D. V. Chudnovsky and G. V. Chudnovsky, “Sequences of numbers generated by addition in formal groups and new primality and
factorization tests.” Advances in Applied Mathematics vol. 7, no. 4, pp. 385-434, May 1986.
[9]. “New Low Complexity Key Exchange and Encryption protocols for Wireless Sensor Networks Clusters based on Elliptic Curve
Cryptography”, NRSC2009.

More Related Content

What's hot

IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
Cs6701 cryptography and network security
Cs6701 cryptography and network securityCs6701 cryptography and network security
Cs6701 cryptography and network security
ArthyR3
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
CAS
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
ijsrd.com
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
IDES Editor
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
AM Publications
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
Editor IJCATR
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
Hardik Manocha
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
IJCNCJournal
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
IDES Editor
 
Modified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCModified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECC
idescitation
 
Design and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmDesign and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithm
eSAT Publishing House
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
IDES Editor
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
PiyushPatil73
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET Journal
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
prashantdahake
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
Raju Raj
 

What's hot (19)

IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
Cs6701 cryptography and network security
Cs6701 cryptography and network securityCs6701 cryptography and network security
Cs6701 cryptography and network security
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
Modified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCModified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECC
 
Design and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmDesign and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithm
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 

Viewers also liked

Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...
Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...
Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...
IOSR Journals
 
E017352634
E017352634E017352634
E017352634
IOSR Journals
 
On Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsOn Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable Labelings
IOSR Journals
 
F010214048
F010214048F010214048
F010214048
IOSR Journals
 
A017210110
A017210110A017210110
A017210110
IOSR Journals
 
D017241723
D017241723D017241723
D017241723
IOSR Journals
 
B012210512
B012210512B012210512
B012210512
IOSR Journals
 
B010611015
B010611015B010611015
B010611015
IOSR Journals
 
I017256165
I017256165I017256165
I017256165
IOSR Journals
 
Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...
IOSR Journals
 
R01754129132
R01754129132R01754129132
R01754129132
IOSR Journals
 
D010223139
D010223139D010223139
D010223139
IOSR Journals
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
IOSR Journals
 
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...
IOSR Journals
 
Reduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar ApplicationReduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar Application
IOSR Journals
 
A1304010106
A1304010106A1304010106
A1304010106
IOSR Journals
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth Networks
IOSR Journals
 
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
IOSR Journals
 
Modeling & Testing Of Hybrid Composite Laminate
Modeling & Testing Of Hybrid Composite LaminateModeling & Testing Of Hybrid Composite Laminate
Modeling & Testing Of Hybrid Composite Laminate
IOSR Journals
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
IOSR Journals
 

Viewers also liked (20)

Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...
Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...
Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...
 
E017352634
E017352634E017352634
E017352634
 
On Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsOn Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable Labelings
 
F010214048
F010214048F010214048
F010214048
 
A017210110
A017210110A017210110
A017210110
 
D017241723
D017241723D017241723
D017241723
 
B012210512
B012210512B012210512
B012210512
 
B010611015
B010611015B010611015
B010611015
 
I017256165
I017256165I017256165
I017256165
 
Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...
 
R01754129132
R01754129132R01754129132
R01754129132
 
D010223139
D010223139D010223139
D010223139
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...
 
Reduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar ApplicationReduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar Application
 
A1304010106
A1304010106A1304010106
A1304010106
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth Networks
 
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
 
Modeling & Testing Of Hybrid Composite Laminate
Modeling & Testing Of Hybrid Composite LaminateModeling & Testing Of Hybrid Composite Laminate
Modeling & Testing Of Hybrid Composite Laminate
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 

Similar to “Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”

Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
IJCERT
 
C0281010016
C0281010016C0281010016
C0281010016
inventionjournals
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
IDES Editor
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
Meetendra Singh
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
Shivam Singh
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
journalBEEI
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
IRJET Journal
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
IRJET Journal
 
A Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve CryptographyA Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve Cryptography
editor1knowledgecuddle
 
Ci25500508
Ci25500508Ci25500508
Ci25500508
IJERA Editor
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...
CSITiaesprime
 
D018141922
D018141922D018141922
D018141922
IOSR Journals
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
IJCNCJournal
 
G05124550
G05124550G05124550
G05124550
IOSR-JEN
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
IJEACS
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Marisa Paryasto
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 

Similar to “Proposed Model for Network Security Issues Using Elliptical Curve Cryptography” (20)

Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
C0281010016
C0281010016C0281010016
C0281010016
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
 
A Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve CryptographyA Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve Cryptography
 
Ci25500508
Ci25500508Ci25500508
Ci25500508
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...
 
D018141922
D018141922D018141922
D018141922
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
G05124550
G05124550G05124550
G05124550
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 

Recently uploaded (20)

WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 

“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 7, Issue 3 (Sep. - Oct. 2013), PP 56-60 www.iosrjournals.org www.iosrjournals.org 56 | Page “Proposed Model for Network Security Issues Using Elliptical Curve Cryptography” 1 Garima Kaushik, 2 Mr. Shailendra Gaur 1 Btech (CSE 4th year), Bhagwan Parshuram Institute of Technology, GGSIPU, India 2 Assisstant Professor, Bhagwan Parshuram Institute of Technology, GGSIPU, India Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security systems. . ECC is a faster and more secure method of encryption as compared to other Public Key Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The Private key is known only to sender and receiver and hence data transmission is secure. I. Introduction The electronic revolution in our daily life has created an environment where information is available to the masses; let it be our address, phone number, our social security number or personal conversation on a website. In this age of information overload there are some elements that can use this information against you. So, we need to convert our data in a form that cannot be read or understood by anyone. This is the idea of encryption. Every alphabet or character that we type is represented by a binary number. The Encryption process focuses on mixing up these binary numbers after performing mathematical operations which converts the binary number in a newer arrangement which is not understandable. This is done by a key. Every encryption process uses a “key” for encryption. The key we use to encrypt a text is used again to decrypt it. Such encryption process is called symmetric encryption. There is one more process that uses two distinct keys, one to encrypt and a different one to decrypt. The mathematics of this was first purposed by Elliptical Curve Cryptography. [1] The key is a parameter that is passed in the encryption function along with the text needed to be encrypted, which generates a cipher text. This cipher text can be transmitted over an unsecure net-work. When received by the intended recipient, it will decrypt the cipher text using a key, which is again passed into a decryption function to recover the plain text back. If any other eavesdropper intercepts the message over the network, he will not be able to decode it, as the key is not known to him. [ 2] Figure 1.1 – Encryption/ Decryption Process II. Elliptic Curve Cryptography (ECC) A: Basics Of Elliptic Curve  Elliptic Curve (EC) systems as applied to cryptography were first proposed in 1985 independently by Neal Koblitz and Victor Miller.  Elliptic Curve Cryptography is based on the complexity of elliptic curve discrete algorithm which is also known as N.P hard Problem.  ECC was basically designed to run on small, constrained devices especially embedded devices which has less storage space capacity, less processing capabilities , less power consumption.  ECC can be widely used in information security and Ecommerce.  ECC uses points on the elliptic curve to derive a 162 bits public key that is equivalent in strength to 1024 bits RSA key. Hence, main benefit of ECC is that by using smaller key it provide equivalent level of security as the conventional crypto systems.  RSA has exponentiation which is raising the message or ciphertext to the public or private values whereas
  • 2. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography” www.iosrjournals.org 57 | Page ECC has point multiplication which has repeated addition of two points.  The idea of Elliptic Curve has unique property which makes it suitable for use in cryptography. This uniqueness forms the ability to take any two points on a specific curve, add them together, and get a third point on the same curve. The confusion in cryptography is that which two points were added together to obtain the third point. Basic Concepts - The Elliptic Curve [3] has a very unique property which makes it suitable for use in cryptography. This uniqueness forms the ability to take any two points on a specific curve, add them together, and get a third point on the same curve.An elliptic curve is defined by an equation is two variables, with coefficient. For the purpose of cryptography, the variable and coefficient are limited to a special kind of set called a FINITE FIELD. The general equation for an elliptic curve is: y2 + axy + by = x3 + cx2 + dx + e where a,b,c,d and e are real numbers and x and y also take their values from real number .A simplified version of the equation will be: y2 – x8 + dx + e In Elliptical Curve Cryptography, the Elliptic Curve is used to define the members of the set over which the group is calculated i.e. an operation on any two elements of the set will give a result that is the member of the same set as well as operations between them. ECC is considered as the one which has the highest security quality in per bit key among current public key cryptosystems. It‟s characterized by small key, small system parameter, small public key, saving bandwidth, fast implementation, low power, and low hardware requirements. [4] ECC is "an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields" [ 5].For the purpose of cryptography the variables and coefficients are limited to a special kind of set called a FINITE FIELD. The security of ECC depends on the difficulty of Elliptic Curve Discrete Logarithm Problem (ECDLP). Let P and Q be the two points on the curve such that kP = Q, where k is a scalar and is called elliptic curve discrete logarithm of Q to the base P. Given P and Q, it is computationally infeasible to obtain k, if k is sufficiently large. [6] The implementation of ECC mainly relies on the operations at three levels: the scalar multiplication, the pointaddition / doubling, and the finite field modulo arithmetic. The ECC system based on GF(2n) is widely utilized for its simple field arithmetic and efficient scalar multiplication algorithms. Two different coordinates: the affine coordinate and the projective coordinate can be used for the ECC where the curve is defined over GF(2n). It was shown in [3][7][8] that the projective coordinate is more desirable for hardwareimplementation because it avoids the costly field inversion operation In Wireless sensor Networks, Elliptic Curve Cryptography (ECC) was the natural choice between Various Public Key Cryptographic options due to its efficient execution and computation, small key size and signatures comparable to other PKC schemes such as RSA. For example, an ECC protocol only needs 160 bit keys to provide equivalent security to 1024-bit RSA. In addition, the benefits of having small key size results significant advantages such as smaller ROM, smaller RAM, faster execution and more efficient storage. [9] III. Algorithm / Methodology Used The mathematical operations of ECC are defined over the elliptic curve equation y² = x³ + ax + b where 4a3 + 27b2 ≠ 0. Each value of „a‟ and „b‟ gives a different elliptic curve. All points (x, y) which satisfy the above equation for given (a, b) plus a point atinfinity. The public key is a point on the curve and the private key is a random number. The public key is obtained by multiplying the private key with a generator point P on the curve. [6] At the Sender End – Step 1 - The sender will take a point P on the elliptic curve equation given above. Step 2 – A random number„d‟ is selected within the range of 1- (n-1). „d‟ is the private key. Step 3 – The sender will generate a public key Q by private key and point P. Q = d*P
  • 3. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography” www.iosrjournals.org 58 | Page Step 4 – The message to be sent has point „M‟ on curve E. Step 5 – Randomly select „k‟ from 1 to (n-1). Step 6 – Generate two cipher text strings C1 and C2. C1 = k *P C2 = M+K*Q Step 7 – Send C1 and C2. C1 and C2 are encrypted texts. Figure 1.2 – Encryption at sender site At the Receiver End – Step 1 – The receiver uses the cipher texts C1 and C2 to decrypt the message M. Step 2 – The receiver uses the private key to decrypt the message M. Step 3 – The receiver has private key „d‟. M = C2 – d*C1 Step 4 – „M‟ is the original message. So, we get the original message back which we sent. Figure 1.3 – Decryption at the receiver site V. Output The given Algorithm has been implemented by use of the above mentioned codes. It has been given inputs of various length bit words i.e. it can take messages of 1-bit, 2-bit,3-bit….10bits. It generates a random number which is taken as a point on curve. Sender has a private key which is known to only him and the receiver. The public keys as two cipher texts are generated and sent over the carrier. These are the encrypted texts. At the receiver end, the two cipher texts are received which along with the private key help to decrypt the text. Encrypted texts C1 and C2 Private key of receiver, d M= C2-d*C1 Original Message, M
  • 4. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography” www.iosrjournals.org 59 | Page Figure 1.4 – Output of 1bit number Figure 1.5 – Output of 1bit number VI. Analysis Of The Output At the sender end : At the receiver end :
  • 5. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography” www.iosrjournals.org 60 | Page The Encrypted message sent at the receiver side is same as the Decrypted message at the Receiver site. VI. Conclusion The digital signature based Elliptic Curve Cryptography covers all four aspects of security - Integrity, Authentication , Non-repudiation and Confidentiality. The promise of ECC for the better and secure data transmission is opening new dimensions of its application in every field of communication. Mobile computing, wireless sensor net-works, server based encryption, image encryption, government and financial communication protocols and many other. But there is still a lot of research required for its practical implementation. 1. It is used in the growing wireless industry. 2. It depends on the case of use and level of security it provides. Future Work- This is a completely new domain and has tremendous scope of research. ECC can be used to provide authentication and enhanced security. USE OF ECC - Mobile computing, wireless sensor net-works, server based encryption, image encryption, government and financial communication protocols and many other areas. References - [1]. An Elliptic Curve Cryptography Primer, Certicom “Catch the curve” White paper series, June 2004 [2]. Elliptic Curve Cryptography A new way for Encryption, Rahim Ali , Department of Computer Science and Engineering, Bahria University, 13 National Stadium Road Karachi [3]. IEEE Standard P 1363-2000, IEEE standard specification for public key cryptography‟, Aug2000. [4]. The Study and Application of Elliptic Curve Cryptography Library on Wireless Sensor Network, 2008 11th IEEE International Conference on Communication Technology Proceedings. [5]. D. R. Hankerson, S. A. Vanstone, and A. J. Menezes, Guide to Elliptic Curve Cryptography:Springer, 2004. [6]. “Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography” , 2009 First International Conference on Computational Intelligence, Communication Systems and Networks. [7]. G. Agnew, R. Mullin, and S. Vanstone, “On the development of a fast elliptic curve processor chip”, Advances in Cryptology CRYPTO’91, pp. 482-487, New York, Springer-Verlag, 1991. [8]. D. V. Chudnovsky and G. V. Chudnovsky, “Sequences of numbers generated by addition in formal groups and new primality and factorization tests.” Advances in Applied Mathematics vol. 7, no. 4, pp. 385-434, May 1986. [9]. “New Low Complexity Key Exchange and Encryption protocols for Wireless Sensor Networks Clusters based on Elliptic Curve Cryptography”, NRSC2009.