ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

On Elliptic Curves Cryptography

Journal: INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY (Vol.3, No. 3)

Publication Date:

Authors : ; ;

Page : 112-118

Keywords : Cryptography; Elliptic curves; Field; Encryption; Decryption;

Source : Download Find it from : Google Scholarexternal

Abstract

Elliptic curve cryptography is an asymmetric key cryptography. The points on two dimensional elliptic curve are used for declaration of data encryption & decryption. It include public key generation on the elliptic curve and private key generation to decrypt the data.The present paper deals with an overview of Elliptic curve cryptography (ECC) and its implementation through co-ordinate geometry for data encryption. We introduce a new approach in the form of cardan's method to find points on X axis at elliptic curve over finite field and form public key cryptographic system and finally we define two dimensional alphabetic table and description in the form of algorithm to use it for plain text encryption

Last modified: 2016-07-02 17:59:07