Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Elliptical Curve Intermediate Key Methodology and its Implementation for 192 & 256 Bit Sizes

Author : Kalasagarvarma.K 1 Neetha Tirmal 2 Kartik A 3 S C Rathnakara 4

Date of Publication :7th July 2016

Abstract: Data encryption is widely used to ensure security in Open networks such as the internet and wireless communications. Any security method used for protecting data should be more robust and highly difficult to break. Advances in technology have made the conventional security algorithms such as AES kind leading to sense of insecurity in using the channel itself. The Wellknown public-key cryptography algorithms RSA, El-Gamal, and DSA (Digital Signature algorithm) are highly secured but have a constraint of higher key sizes. Elliptical curve cryptography (ECC) is an efficient technique in public-key cryptographic methods, which has overcome the limitations of the current crypto systems in terms of security and the key sizes. But ECC cannot be directly implemented in encryption and decryption operations such as real time operations; it can be used standalone to encrypt and decrypt the public keys. A novel method, “Elliptical Curve Intermediate-Key Method” is proposed in the paper to addresses the direct implementation of elliptical curve cryptography in the context of encryption and decryption. This paper shows the implementation of the method and results with respect to 192 and 256 bit prime fields.

Reference :

  1. [1] Koblitz N., Menezes A.J., and Vanstone S.A. The state Of Elliptic curve cryptography. Design, Codes, and cryptography. Vol 19, Issue 2-3, 2000, 173-193.

    [2] Encoding And Decoding of a message in the Implementation of Elliptical Curve Cryptography using Koblitz‟s method.Padma Bh,D.Chandravathi,P.Prapoorns Roja.

    [3] CRYPTOGRAPHY WITH ELLIPTIC CURVES,Tarun Narayan Shankar, International Journal Of Computer Science And Applications Vol. 2, No. 1,April / May 2009

    [4] Elliptic Curve Cryptography Engineering, Alessandro Cilardo,Luigi Coppolino, Nicola Mazzocca , and Luigi Romano, Invited paper, Proceedings of the IEEE, vol.94, no. 2nd, February 2006

    [5] Analytical study of implementation issues of Elliptical Curve Cryptography for Wireless Sensor networks,Pritam ssss

    [6] GajkumarShah, Xu Huang, Dharmendra Sharma, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops


Recent Article