Elliptic Curve Cryptography: An efficient approach for encryption&decryption of a data sequence
Journal: International Journal of Science and Research (IJSR) (Vol.2, No. 5)Publication Date: 2013-05-05
Authors : Ankita Soni; Nisheeth Saxena;
Page : 203-208
Keywords : Elliptic curve cryptography ECC; Elliptic Curve EC; Discrete Logarithm Problem DLP; Elliptic Curve Diffie Hellman ECDH;
Abstract
The paper describes the basic idea of Elliptic Curve Cryptography (ECC) and the use of Elliptic curves in Elliptic curve cryptography. This paper gives an introduction to elliptic curves and the basic operations of elliptic curves. Elliptic Curve Diffie Hellman (ECDH) key exchange protocol of ECC is described. The paper illustrates the procedure of Encryption and Decryption of message by first transforming the message into an affine point on the Elliptic Curve (EC), over the finite field GF (p). In ECC we normally starts with an affine point called Pm (x, y) which lies on the elliptic curve [1]. And further the process of encryption and decryption of a text message is implemented. A comparison is performed between the encrypted text messages using different key sizes, to calculate the time consumed by each. The security strength of ECC lies in the unfeasibility of solving the ECDLP (Elliptic Curve Discrete Logarithmic Problem) [2].
Other Latest Articles
- Improved approach to predict user future sessions using classification and clustering
- Enhancement in Nunit Testing Framework by binding Logging with Unit testing
- Detect And Localize Text In Natural Image Using Wavelet Transformation
- Identification Of Improvement Opportunity In Drum Mix Plant Manufacturing Using Iso 9001 - Qms Standard
- Analysis Of Supplier Selection Process On Product Quality
Last modified: 2021-06-30 20:16:32