Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
Fault Detection Scheme for AES Using Composite FieldAJAL A J
The cipher Rijndael is one of the five finalists of the Advanced Encryption Standard (AES)
The algorithm has been designed by Joan Daemen and Vincent Rijmen
It is a Block cipher.
The hardware implementation with 128-bit blocks and 128-bit keys is presented.
VLSI optimizations of the Rijndael algorithm are discussed and several hardware design modifications and techniques are used, such as memory sharing and parallelism.
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
Fault Detection Scheme for AES Using Composite FieldAJAL A J
The cipher Rijndael is one of the five finalists of the Advanced Encryption Standard (AES)
The algorithm has been designed by Joan Daemen and Vincent Rijmen
It is a Block cipher.
The hardware implementation with 128-bit blocks and 128-bit keys is presented.
VLSI optimizations of the Rijndael algorithm are discussed and several hardware design modifications and techniques are used, such as memory sharing and parallelism.
Performance Analysis of Encryption Algorithm for Network Security on Parallel...ijsrd.com
Nowadays the typical desktop computer processors have four or more independent CPU core, which are called as multi-core processors to execute instructions. So parallel programming language come into play to execute instructions concurrently for multi core architecture using openMP. Users prefer cryptographic algorithms to encrypt and decrypt data in order to send it securely over an unsafe environment like the internet. This paper describes the implementation and test results of Caesar cipher and RSA cryptographic algorithms in parallelization are done using OpenMP API 3.1 Standard and performance Analysis. According to our test results, the parallel design approach for security algorithm exhibits improved performance over the sequential approach in terms of execution of time
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
In this paper, we have combined the Robust
Cryptosystem for Non-invertible matrices based on Hill Cipher
technique with steganography method in order to securely
transmit text message. The steganography method used is LSB
insertion technique. The encryption and steganography
methods are used subsequently along with two randomization
technique: one of XOR the encrypted text and another of
randomized LSB insertion in any cover image. These two layers
of shuffling of text at different stages of encryption and
steganography provide two extra layers of security and make
the system robust against cryptanalytic attacks.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
AES and DES are two different crypto algorithms having different features. This projects consists of integrating these algorithms to develop a new structure. Here, read and write of text files is employed. Thus, the text files listed should exist in the same folder as the project is in. Implementation is carried in VHDL on Modelsim.
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
In a world of accelerating communications, cryptography has become an essential component of the modern
means of communication systems. The emergence of the webas a reliable medium for commerce and
communication has made cryptography an essential component. Many algorithms or ciphers are in use
nowadays. The quality of the cipher is judged byits ability to prevent an unrelated party fromknowingthe
original content of the encrypted message. The proposed “Multilevel Encryption Model” is a cryptosystem that
adopts the basic principles of cryptography. It uses five symmetric keys (multiple)
in floating point numbers, plaintext, substitution techniques and key combinations with unintelligible
sequence to produce the ciphertext. The decryption process is also designed to reproduce the plaintext
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
Because of lack of infrastructure and Central Authority(CA), secure communication is
a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its
nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET
because the network is managed by the nodes themselves without any fixed infrastructure and centralized
authority. In this paper, we created a distributed PUblic Key Infrastructure (PKI) using
Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private
key. The traditional PKI protocols require centralized authority and heavy computing power to
manage public and private keys, thus making them not suitable for MANETs. To establish a secure
communication for the MANET nodes, we proposed a lightweight crypto protocol which requires
limited resources, making it suitable for MANETs.
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
The Hill cipher algorithm is one of the symmetric
key algorithms that have several advantages in data
encryption. But, the inverse of the key matrix used for
encrypting the plaintext does not always exist. Then if the
key matrix is not invertible, then encrypted text cannot be
decrypted. In the Involutory matrix generation method the
key matrix used for the encryption is itself invertible. So, at
the time of decryption we need not to find the inverse of the
key matrix. The objective of this paper is to encrypt an
image using a technique different from the conventional Hill
Cipher. In this paper a novel advanced Hill (AdvHill)
encryption technique has been proposed which uses an
involutory key matrix. The scheme is a fast encryption
scheme which overcomes problems of encrypting the images
with homogeneous background. A comparative study of the
proposed encryption scheme and the existing scheme is
made. The output encrypted images reveal that the
proposed technique is quite reliable and robust.
Modified Koblitz Encoding Method for ECCidescitation
Extensive use of Wireless Sensor Networks is giving
rise to different types of threats in certain commercial and
military applications. To protect the WSN data communication
against various threats appropriate security schemes are
needed. However, WSN nodes are resource constrained, with
respect to limited battery energy, and limited computational
and memory available with each WSN node. Hence, the
security model to be used in WSN’s should use minimal
resources to the extent possible and it should also provide
good security. Elliptic curve cryptography (ECC) is the best
suited algorithm for WSNs, as it offers better security for
smaller key sizes compared to the popular RSA algorithm. In
ECC, encoding of message data to a point lying on the give
Elliptic Curve is a major problem as the encoding consumes
more resources. This paper provides a novel encoding
procedure to overcome these problems to a large extent. This
paper also describes implementation aspects of the proposed
encoding and decoding methods.
Design and implementation of network security using genetic algorithmeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
This paper presents an algorithm which is hybrib of
Transposition and Substitution method.The main advantage
of this approach is ,it doesn’t use any key from outside because
key is present within the original message.Due to this the
main problem of exchanging keys securely is solved.Both Transposition
and Substitution method have their own limitations.So
we use both these method so that the resultant cipher is more
secure and strong.
Image and text Encryption using RSA algorithm in java PiyushPatil73
About RSA
RSA is an encryption algorithm.
Developed in: 1977.
Developed by: Ron Rivest, Adi Shamir, and Leonard Adleman.
The RSA algorithm is the most commonly used public key encryption algorithm.
Two keys are used: Public Key and Private Key.
Public Key: For encryption.
Private Key: For decryption, also known as a secret key.
Public Key: Shared with the public that wants to send us data.
Private Key: Kept secret so that when someone sends us data encrypted by our
Public Key, we can decrypt the data using the Private Key.
Performance Analysis of Encryption Algorithm for Network Security on Parallel...ijsrd.com
Nowadays the typical desktop computer processors have four or more independent CPU core, which are called as multi-core processors to execute instructions. So parallel programming language come into play to execute instructions concurrently for multi core architecture using openMP. Users prefer cryptographic algorithms to encrypt and decrypt data in order to send it securely over an unsafe environment like the internet. This paper describes the implementation and test results of Caesar cipher and RSA cryptographic algorithms in parallelization are done using OpenMP API 3.1 Standard and performance Analysis. According to our test results, the parallel design approach for security algorithm exhibits improved performance over the sequential approach in terms of execution of time
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
In this paper, we have combined the Robust
Cryptosystem for Non-invertible matrices based on Hill Cipher
technique with steganography method in order to securely
transmit text message. The steganography method used is LSB
insertion technique. The encryption and steganography
methods are used subsequently along with two randomization
technique: one of XOR the encrypted text and another of
randomized LSB insertion in any cover image. These two layers
of shuffling of text at different stages of encryption and
steganography provide two extra layers of security and make
the system robust against cryptanalytic attacks.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
AES and DES are two different crypto algorithms having different features. This projects consists of integrating these algorithms to develop a new structure. Here, read and write of text files is employed. Thus, the text files listed should exist in the same folder as the project is in. Implementation is carried in VHDL on Modelsim.
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
In a world of accelerating communications, cryptography has become an essential component of the modern
means of communication systems. The emergence of the webas a reliable medium for commerce and
communication has made cryptography an essential component. Many algorithms or ciphers are in use
nowadays. The quality of the cipher is judged byits ability to prevent an unrelated party fromknowingthe
original content of the encrypted message. The proposed “Multilevel Encryption Model” is a cryptosystem that
adopts the basic principles of cryptography. It uses five symmetric keys (multiple)
in floating point numbers, plaintext, substitution techniques and key combinations with unintelligible
sequence to produce the ciphertext. The decryption process is also designed to reproduce the plaintext
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
Because of lack of infrastructure and Central Authority(CA), secure communication is
a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its
nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET
because the network is managed by the nodes themselves without any fixed infrastructure and centralized
authority. In this paper, we created a distributed PUblic Key Infrastructure (PKI) using
Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private
key. The traditional PKI protocols require centralized authority and heavy computing power to
manage public and private keys, thus making them not suitable for MANETs. To establish a secure
communication for the MANET nodes, we proposed a lightweight crypto protocol which requires
limited resources, making it suitable for MANETs.
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
The Hill cipher algorithm is one of the symmetric
key algorithms that have several advantages in data
encryption. But, the inverse of the key matrix used for
encrypting the plaintext does not always exist. Then if the
key matrix is not invertible, then encrypted text cannot be
decrypted. In the Involutory matrix generation method the
key matrix used for the encryption is itself invertible. So, at
the time of decryption we need not to find the inverse of the
key matrix. The objective of this paper is to encrypt an
image using a technique different from the conventional Hill
Cipher. In this paper a novel advanced Hill (AdvHill)
encryption technique has been proposed which uses an
involutory key matrix. The scheme is a fast encryption
scheme which overcomes problems of encrypting the images
with homogeneous background. A comparative study of the
proposed encryption scheme and the existing scheme is
made. The output encrypted images reveal that the
proposed technique is quite reliable and robust.
Modified Koblitz Encoding Method for ECCidescitation
Extensive use of Wireless Sensor Networks is giving
rise to different types of threats in certain commercial and
military applications. To protect the WSN data communication
against various threats appropriate security schemes are
needed. However, WSN nodes are resource constrained, with
respect to limited battery energy, and limited computational
and memory available with each WSN node. Hence, the
security model to be used in WSN’s should use minimal
resources to the extent possible and it should also provide
good security. Elliptic curve cryptography (ECC) is the best
suited algorithm for WSNs, as it offers better security for
smaller key sizes compared to the popular RSA algorithm. In
ECC, encoding of message data to a point lying on the give
Elliptic Curve is a major problem as the encoding consumes
more resources. This paper provides a novel encoding
procedure to overcome these problems to a large extent. This
paper also describes implementation aspects of the proposed
encoding and decoding methods.
Design and implementation of network security using genetic algorithmeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
This paper presents an algorithm which is hybrib of
Transposition and Substitution method.The main advantage
of this approach is ,it doesn’t use any key from outside because
key is present within the original message.Due to this the
main problem of exchanging keys securely is solved.Both Transposition
and Substitution method have their own limitations.So
we use both these method so that the resultant cipher is more
secure and strong.
Image and text Encryption using RSA algorithm in java PiyushPatil73
About RSA
RSA is an encryption algorithm.
Developed in: 1977.
Developed by: Ron Rivest, Adi Shamir, and Leonard Adleman.
The RSA algorithm is the most commonly used public key encryption algorithm.
Two keys are used: Public Key and Private Key.
Public Key: For encryption.
Private Key: For decryption, also known as a secret key.
Public Key: Shared with the public that wants to send us data.
Private Key: Kept secret so that when someone sends us data encrypted by our
Public Key, we can decrypt the data using the Private Key.
Factor analysis as a tool for evaluation of spatial and temporal variations i...IOSR Journals
In this case study, factor analysis was applied for evaluation of temporal/spatial variations in the
groundwater quality of Aravakurichi block, Karur district, Tamil Nadu, India. This statistical technique was
employed for the better interpretation of large complex water quality data set obtained from twenty five
groundwater locations in four seasons during the year 2012. The water samples were characterized for the
physico-chemical parameters such as pH, total alkalinity, electrical conductivity, total hardness, calcium ions,
magnesium ions, total dissolved solids, fluorides, chlorides and sulphates. Factor analysis indicated four factors
initially and when rotation of the factor axis was executed, it yielded two factors with clear indication of high
loadings for some variable and low loadings for others, facilitating data interpretation in terms of original
variables. Overall, this case study demonstrated the effectiveness of factor analysis to identify marker variables
for assessing the chemistry of groundwater besides earmarking representative sampling stations to undertake
suitable water quality management in a shortest possible time.
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
Abstract: A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration. Mobile ad-hoc network have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment. In this paper we have compared the energy consumption of reactive, proactive & hybrid routing protocol AODV,DSR,RIP & ZRP by using different mobility model. We have analyzed the Network lifetime of protocols by varying pay load, mobility, pause time and type of traffic (CBR). A detailed simulation has been carried out in qualnet. The metrics used for performance analysis are energy consumed & battery consumption. It has been observed that RIP has better network lifetime than other.
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...IOSR Journals
It is a well-experienced fact that whenever one tries to detect a weak object point in the vicinity of an intense point object, viz., a binary star-SIRUS and its companion weak satellite star, there is always loss of resolution of the optical system. In other words, one wants to improve the defectively of the system, there is always a loss of resolution capabilities of the system. Thus, there is a trade-off between Detection and Resolution of optical systems under various imaging situations. In this first paper of discussion of this trade-off, we have derived the Fourier analytical formulation of this problem. This formulation will be used to find out a compatible trade-off between Detection and Resolution in our further publications
Reduction of Side Lobes by Using Complementary Codes for Radar ApplicationIOSR Journals
The analysis of new types of Complementary direct sequence complex signals which have synthesized
with well – know code sequences like Barker, Walsh, Golay, and complementary codes. Build on the
autocorrelation function (ACF) and ambiguity function (AF) of signals, the numerical method estimates the
volume of side lobes separately for each signal. The results obtained show that the signals, which have a low
volume of side lobes, means of approximately zero in by using complementary codes with compare to different
codes
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...IOSR Journals
The present study aimed to extract and purify the compound of Secoisolariciresinoldiglucoside
oligomers (lignan) from flax seed (Linumusitatissimum) and its antioxidant activity. The Lignan was extracted
by solvents which gave the best results were ethanol : 1,4 dioxane (1:1, v:v).SDG release after alkaline
hydrolysisby using a methanolicNaOH , 20 mM, pH=8 at 50 ºC.followed by using following chromatographic
techniques: Liquid-liquid, Sephadex LH-20 column chromatography, thin layer chromatographic (TLC), high
performance liquid chromatographic (HPLC) and Fourier Transform Infra-Red(FTIR) . The EC50 values of
Pure lignan extract (9 μg/ml) was shown possess DPPH radical scavenging activity compared to reference
substances BHT and vitamin C (EC50= 3 and 4.2 μg/ml) respectively, and this was higher than partial pure
lignan component (EC50= 25.5 μg/ml).The total phenolic content of the pure lignanwas higher than partial
pure lignan which gave 22.312 and 14.85 g/ml respectively.
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
Wireless communications is the fastest growing segment of the communications industry. Everyone
wants the quality of services anytime & anywhere. Wireless networks can integrate various heterogeneous radio
access technologies as GSM, WLAN, Wimax etc. WiMAX is an IP based, wireless broadband access technology
that provides performance similar to 802.11/Wi-Fi networks with the coverage and QOS (quality of service) of
cellular networks. WiMAX is also an acronym meaning "Worldwide Interoperability for Microwave Access
(WiMAX). The main promise of interconnecting these heterogeneous networks is to provide high performance in
achieving a high data rate and support real time applications. These services require various networks (such as
CDMA2000 and Wireless LAN) to be integrated into IP-based networks, which further require a seamless
vertical handoff to 4th generation wireless networks. When a mobile host (MH) changes its point of attachment,
its IP address gets changed. MH should be able to maintain all the existing connections using the new IP
address. This process of changing a connection from one IP address to another one in IP network is called
handoff. Vertical handoff is switching from one network to another while maintaining the session. Vertical
Handoff (VHO) is a major concern for different heterogeneous networks. VHO can be user requested or based
on some criteria already designed by the researcher of that particular algorithm. The main objective is to
implement efficient & effective handoff scheme between two heterogeneous network ie. 802.11 WLAN &
CDMA
Data Security Using Elliptic Curve CryptographyIJCERT
Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
Abstract— Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is becoming widely used for mobile applications. Recently the bilinear pairing such as Weil Pairing or Tate Pairing on elliptic curves and hyper elliptic curves has been found various applications in cryptography. Several identity-based cryptosystems using bilinear pairings of elliptic curves or hyper elliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the signer’s privacy. The proposed method focuses an ID-based ring signature scheme which is based on the pairings with elliptic curve cryptography. The proposed method is used to reduce the number of computation of the pairing for the verification of the id based signature and also decoding of the id based public key cryptosystems with authentication by factor of 2.
Elliptic Curve Cryptography (ECC) provides a secure
means of key exchange between communicating nodes using the
Diffie-Hellman (DH) Key Exchange algorithm. This work
presents an ECC encryption implementation using of the DH
key exchange algorithm. Both encryption and decryption of text
messages using this algorithm, have been attempted. In ECC,
encoding is carried out by mapping a message character to an
affine point on an elliptic curve. It can be observed from the
comparison of the proposed algorithm and Koblitz’s encoding
method, that the proposed algorithm is as secure as Koblitz’s
encoding method and the proposed algorithm has less
computational complexity as the encoding phase is eliminated
altogether. Hence, energy efficiency of the crypto system is
improved and the same can be used in resource constrained
applications, such as Wireless sensor networks (WSNs). It is
almost infeasible to attempt a brute force attack. The security
strength of the algorithm is proportional to the key length.
However, any increase in the key length results in more
communication overhead due to encryption.
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.
Elliptic curve cryptography (ECC) is the most efficient public key encryption scheme based on
elliptic curve concepts that can be used to create faster, smaller, and efficient cryptographic keys. ECC
generates keys through the properties of the elliptic curve equation instead of the conventional method of
key generation. This scheme can be used with public key encryption methods, such as RSA, Diffie-Hellman key
exchange and Digital Signature. Review of the four protocols which applies ECC namely Bitcoin, secure
shell (SSH), transport layer security (TLS), and the Austrian e-ID Card describes the high security by using
elliptic curve cryptography.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Improved authenticated elliptic curve cryptography scheme for resource starve...CSITiaesprime
Elliptic curve cryptography (ECC) remains the best approach to asymmetric cryptography when it comes to securing communication among communication partners in low-computing devices such as wireless sensor networks (WSN) and the Internet of Things (IoT) due to its effectiveness in generating small keys with a strong encryption mechanism. The ECC cuts down on power use and improves device performance, so it can be used in a wide range of devices that don't have a lot of resources. However, most of the existing ECC implementations suffer from implementation flaws that make them vulnerable to cryptanalysis attacks. In this study, flaws in the existing implementation of ECC are identified. A new scheme where the identified flaws are remedied was developed. The results of the security analysis show that the new scheme is an indistinguishable authenticated adaptive chosen ciphertext attack (IND-CCA3), resistant to malleability and man-in-the-middle attacks (MIMA). The results of comparative security analysis show that the mapping scheme employed in the new scheme maps any blocks of plaintext to distinct points on an elliptic curve, which makes it resistant to all attacks that the existing schemes are vulnerable to without having a negative effect on its encryption and decryption time, throughput, or power consumption.
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
In current scenario the entire world is moving towards digital communication for fast and better communication. But in this a problem rises with security i.e. when we have to store information (either data or image) at any casual location or transmit information through internet. As internet is an open transmission medium, security of data becomes very important. To defend our information from piracy or from hacking we use a technique and i.e. known as Encryption Technique. In this paper, we use image as information and use an advance approach of well-known encryption techniques like AES, Genetic Algorithm, and RSA algorithm to encrypt it and keep our information safe from hackers or intruders making it highly difficult and time consuming to decipher the image without using the key.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Fundamentals of Electric Drives and its applications.pptx
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 7, Issue 3 (Sep. - Oct. 2013), PP 56-60
www.iosrjournals.org
www.iosrjournals.org 56 | Page
“Proposed Model for Network Security Issues Using Elliptical
Curve Cryptography”
1
Garima Kaushik, 2
Mr. Shailendra Gaur
1
Btech (CSE 4th
year), Bhagwan Parshuram Institute of Technology, GGSIPU, India
2
Assisstant Professor, Bhagwan Parshuram Institute of Technology, GGSIPU, India
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
I. Introduction
The electronic revolution in our daily life has created an environment where information is available to
the masses; let it be our address, phone number, our social security number or personal conversation on a
website. In this age of information overload there are some elements that can use this information against you.
So, we need to convert our data in a form that cannot be read or understood by anyone. This is the idea of
encryption.
Every alphabet or character that we type is represented by a binary number. The Encryption process
focuses on mixing up these binary numbers after performing mathematical operations which converts the binary
number in a newer arrangement which is not understandable. This is done by a key.
Every encryption process uses a “key” for encryption. The key we use to encrypt a text is used again to
decrypt it. Such encryption process is called symmetric encryption. There is one more process that uses two
distinct keys, one to encrypt and a different one to decrypt. The mathematics of this was first purposed by
Elliptical Curve Cryptography. [1]
The key is a parameter that is passed in the encryption function along with the text needed to be
encrypted, which generates a cipher text. This cipher text can be transmitted over an unsecure net-work. When
received by the intended recipient, it will decrypt the cipher text using a key, which is again passed into a
decryption function to recover the plain text back. If any other eavesdropper intercepts the message over the
network, he will not be able to decode it, as the key is not known to him. [ 2]
Figure 1.1 – Encryption/ Decryption Process
II. Elliptic Curve Cryptography (ECC)
A: Basics Of Elliptic Curve
Elliptic Curve (EC) systems as applied to cryptography were first proposed in 1985 independently by Neal
Koblitz and Victor Miller.
Elliptic Curve Cryptography is based on the complexity of elliptic curve discrete algorithm which is also
known as N.P hard Problem.
ECC was basically designed to run on small, constrained devices especially embedded devices which has
less storage space capacity, less processing capabilities , less power consumption.
ECC can be widely used in information security and Ecommerce.
ECC uses points on the elliptic curve to derive a 162 bits public key that is equivalent in strength to 1024
bits RSA key. Hence, main benefit of ECC is that by using smaller key it provide equivalent level of
security as the conventional crypto systems.
RSA has exponentiation which is raising the message or ciphertext to the public or private values whereas
2. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 57 | Page
ECC has point multiplication which has repeated addition of two points.
The idea of Elliptic Curve has unique property which makes it suitable for use in cryptography. This
uniqueness forms the ability to take any two points on a specific curve, add them together, and get a third
point on the same curve. The confusion in cryptography is that which two points were added together to
obtain the third point.
Basic Concepts -
The Elliptic Curve [3] has a very unique property which makes it suitable for use in cryptography. This
uniqueness forms the ability to take any two points on a specific curve, add them together, and get a third point
on the same curve.An elliptic curve is defined by an equation is two variables, with coefficient. For the purpose
of cryptography, the variable and coefficient are limited to a special kind of set called a FINITE FIELD. The
general equation for an elliptic curve is:
y2
+ axy + by = x3
+ cx2
+ dx + e
where a,b,c,d and e are real numbers and x and y also take their values from real number .A simplified version
of the equation will be:
y2
– x8
+ dx + e
In Elliptical Curve Cryptography, the Elliptic Curve is used to define the members of the set over which the
group is calculated i.e. an operation on any two elements of the set will give a result that is the member of the
same set as well as operations between them.
ECC is considered as the one which has the highest security quality in per bit key among current public
key cryptosystems. It‟s characterized by small key, small system parameter, small public key, saving bandwidth,
fast implementation, low power, and low hardware requirements. [4]
ECC is "an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite
fields" [ 5].For the purpose of cryptography the variables and coefficients are limited to a special kind of set
called a FINITE FIELD.
The security of ECC depends on the difficulty of Elliptic Curve Discrete Logarithm Problem (ECDLP).
Let P and Q be the two points on the curve such that kP = Q, where k is a scalar and is called elliptic curve
discrete logarithm of Q to the base P. Given P and Q, it is computationally infeasible to obtain k, if k is
sufficiently large. [6]
The implementation of ECC mainly relies on the operations at three levels: the scalar multiplication,
the pointaddition / doubling, and the finite field modulo arithmetic. The ECC system based on GF(2n) is widely
utilized for its simple field arithmetic and efficient scalar multiplication algorithms.
Two different coordinates: the affine coordinate and the projective coordinate can be used for the ECC
where the curve is defined over GF(2n). It was shown in [3][7][8] that the projective coordinate is more
desirable for hardwareimplementation because it avoids the costly field inversion operation
In Wireless sensor Networks, Elliptic Curve Cryptography (ECC) was the natural choice between
Various Public Key Cryptographic options due to its efficient execution and computation, small key size and
signatures comparable to other PKC schemes such as RSA.
For example, an ECC protocol only needs 160 bit keys to provide equivalent security to 1024-bit RSA. In
addition, the benefits of having small key size results significant advantages such as smaller ROM, smaller
RAM, faster execution and more efficient storage. [9]
III. Algorithm / Methodology Used
The mathematical operations of ECC are defined over the elliptic curve equation
y² = x³ + ax + b
where 4a3 + 27b2 ≠ 0. Each value of „a‟ and „b‟ gives a different elliptic curve. All points (x, y) which satisfy
the above equation for given (a, b) plus a point atinfinity. The public key is a point on the curve and the private
key is a random number. The public key is obtained by multiplying the private key with a generator point P on
the curve. [6]
At the Sender End –
Step 1 - The sender will take a point P on the elliptic curve equation given above.
Step 2 – A random number„d‟ is selected within the range of 1- (n-1). „d‟ is the private key.
Step 3 – The sender will generate a public key Q by private key and point P.
Q = d*P
3. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 58 | Page
Step 4 – The message to be sent has point „M‟ on curve E.
Step 5 – Randomly select „k‟ from 1 to (n-1).
Step 6 – Generate two cipher text strings C1 and C2.
C1 = k *P
C2 = M+K*Q
Step 7 – Send C1 and C2. C1 and C2 are encrypted texts.
Figure 1.2 – Encryption at sender site
At the Receiver End –
Step 1 – The receiver uses the cipher texts C1 and C2 to decrypt the message M.
Step 2 – The receiver uses the private key to decrypt the message M.
Step 3 – The receiver has private key „d‟.
M = C2 – d*C1
Step 4 – „M‟ is the original message.
So, we get the original message back which we sent.
Figure 1.3 – Decryption at the receiver site
V. Output
The given Algorithm has been implemented by use of the above mentioned codes. It has been given
inputs of various length bit words i.e. it can take messages of 1-bit, 2-bit,3-bit….10bits. It generates a random
number which is taken as a point on curve. Sender has a private key which is known to only him and the
receiver. The public keys as two cipher texts are generated and sent over the carrier. These are the encrypted
texts. At the receiver end, the two cipher texts are received which along with the private key help to decrypt the
text.
Encrypted texts
C1 and C2
Private key of
receiver, d
M= C2-d*C1 Original Message,
M
4. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 59 | Page
Figure 1.4 – Output of 1bit number Figure 1.5 – Output of 1bit number
VI. Analysis Of The Output
At the sender end :
At the receiver end :
5. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 60 | Page
The Encrypted message sent at the receiver side is same as the Decrypted message at the Receiver site.
VI. Conclusion
The digital signature based Elliptic Curve Cryptography covers all four aspects of security - Integrity,
Authentication , Non-repudiation and Confidentiality.
The promise of ECC for the better and secure data transmission is opening new dimensions of its
application in every field of communication. Mobile computing, wireless sensor net-works, server based
encryption, image encryption, government and financial communication protocols and many other. But there is
still a lot of research required for its practical implementation.
1. It is used in the growing wireless industry.
2. It depends on the case of use and level of security it provides.
Future Work-
This is a completely new domain and has tremendous scope of research.
ECC can be used to provide authentication and enhanced security.
USE OF ECC - Mobile computing, wireless sensor net-works, server based encryption, image encryption,
government and financial communication protocols and many other areas.
References -
[1]. An Elliptic Curve Cryptography Primer, Certicom “Catch the curve” White paper series, June 2004
[2]. Elliptic Curve Cryptography A new way for Encryption, Rahim Ali , Department of Computer Science and Engineering, Bahria
University, 13 National Stadium Road Karachi
[3]. IEEE Standard P 1363-2000, IEEE standard specification for public key cryptography‟, Aug2000.
[4]. The Study and Application of Elliptic Curve Cryptography Library on Wireless Sensor Network, 2008 11th
IEEE International
Conference on Communication Technology Proceedings.
[5]. D. R. Hankerson, S. A. Vanstone, and A. J. Menezes, Guide to Elliptic Curve Cryptography:Springer, 2004.
[6]. “Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography” , 2009 First International Conference on
Computational Intelligence, Communication Systems and Networks.
[7]. G. Agnew, R. Mullin, and S. Vanstone, “On the development of a fast elliptic curve processor chip”, Advances in Cryptology
CRYPTO’91, pp. 482-487, New York, Springer-Verlag, 1991.
[8]. D. V. Chudnovsky and G. V. Chudnovsky, “Sequences of numbers generated by addition in formal groups and new primality and
factorization tests.” Advances in Applied Mathematics vol. 7, no. 4, pp. 385-434, May 1986.
[9]. “New Low Complexity Key Exchange and Encryption protocols for Wireless Sensor Networks Clusters based on Elliptic Curve
Cryptography”, NRSC2009.