On Elliptic Curves Cryptography
Journal: INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY (Vol.3, No. 3)Publication Date: 2013-08-31
Authors : A.M. Khan; Kazi Hazim Ali;
Page : 112-118
Keywords : Cryptography; Elliptic curves; Field; Encryption; Decryption;
Abstract
Elliptic curve cryptography is an asymmetric key cryptography. The points on two dimensional elliptic curve are used for declaration of data encryption & decryption. It include public key generation on the elliptic curve and private key generation to decrypt the data.The present paper deals with an overview of Elliptic curve cryptography (ECC) and its implementation through co-ordinate geometry for data encryption. We introduce a new approach in the form of cardan's method to find points on X axis at elliptic curve over finite field and form public key cryptographic system and finally we define two dimensional alphabetic table and description in the form of algorithm to use it for plain text encryption
Other Latest Articles
- Formal specification, verification and correction of security policies based on the decision tree approach
- Technologies of cracking of cryptographic algorithms through the analysis of dynamics of consuming of power in case of their implementation
- THE ESTIMATION OF INTERPHASESPERIODDURATION OF COLLECTION SWEET PEPPER SAMPLES IN GREENHOUSES
- Maine aspects teaching clinical pharmacy to pharmacists on postgraduate education
- Achieving High Throughput of Steganography & Steganalysis for Concealing images Information Using Buffers Concept
Last modified: 2016-07-02 17:59:07