SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 7, Issue 3 (Sep. - Oct. 2013), PP 56-60
www.iosrjournals.org
www.iosrjournals.org 56 | Page
“Proposed Model for Network Security Issues Using Elliptical
Curve Cryptography”
1
Garima Kaushik, 2
Mr. Shailendra Gaur
1
Btech (CSE 4th
year), Bhagwan Parshuram Institute of Technology, GGSIPU, India
2
Assisstant Professor, Bhagwan Parshuram Institute of Technology, GGSIPU, India
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
I. Introduction
The electronic revolution in our daily life has created an environment where information is available to
the masses; let it be our address, phone number, our social security number or personal conversation on a
website. In this age of information overload there are some elements that can use this information against you.
So, we need to convert our data in a form that cannot be read or understood by anyone. This is the idea of
encryption.
Every alphabet or character that we type is represented by a binary number. The Encryption process
focuses on mixing up these binary numbers after performing mathematical operations which converts the binary
number in a newer arrangement which is not understandable. This is done by a key.
Every encryption process uses a “key” for encryption. The key we use to encrypt a text is used again to
decrypt it. Such encryption process is called symmetric encryption. There is one more process that uses two
distinct keys, one to encrypt and a different one to decrypt. The mathematics of this was first purposed by
Elliptical Curve Cryptography. [1]
The key is a parameter that is passed in the encryption function along with the text needed to be
encrypted, which generates a cipher text. This cipher text can be transmitted over an unsecure net-work. When
received by the intended recipient, it will decrypt the cipher text using a key, which is again passed into a
decryption function to recover the plain text back. If any other eavesdropper intercepts the message over the
network, he will not be able to decode it, as the key is not known to him. [ 2]
Figure 1.1 – Encryption/ Decryption Process
II. Elliptic Curve Cryptography (ECC)
A: Basics Of Elliptic Curve
 Elliptic Curve (EC) systems as applied to cryptography were first proposed in 1985 independently by Neal
Koblitz and Victor Miller.
 Elliptic Curve Cryptography is based on the complexity of elliptic curve discrete algorithm which is also
known as N.P hard Problem.
 ECC was basically designed to run on small, constrained devices especially embedded devices which has
less storage space capacity, less processing capabilities , less power consumption.
 ECC can be widely used in information security and Ecommerce.
 ECC uses points on the elliptic curve to derive a 162 bits public key that is equivalent in strength to 1024
bits RSA key. Hence, main benefit of ECC is that by using smaller key it provide equivalent level of
security as the conventional crypto systems.
 RSA has exponentiation which is raising the message or ciphertext to the public or private values whereas
“Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 57 | Page
ECC has point multiplication which has repeated addition of two points.
 The idea of Elliptic Curve has unique property which makes it suitable for use in cryptography. This
uniqueness forms the ability to take any two points on a specific curve, add them together, and get a third
point on the same curve. The confusion in cryptography is that which two points were added together to
obtain the third point.
Basic Concepts -
The Elliptic Curve [3] has a very unique property which makes it suitable for use in cryptography. This
uniqueness forms the ability to take any two points on a specific curve, add them together, and get a third point
on the same curve.An elliptic curve is defined by an equation is two variables, with coefficient. For the purpose
of cryptography, the variable and coefficient are limited to a special kind of set called a FINITE FIELD. The
general equation for an elliptic curve is:
y2
+ axy + by = x3
+ cx2
+ dx + e
where a,b,c,d and e are real numbers and x and y also take their values from real number .A simplified version
of the equation will be:
y2
– x8
+ dx + e
In Elliptical Curve Cryptography, the Elliptic Curve is used to define the members of the set over which the
group is calculated i.e. an operation on any two elements of the set will give a result that is the member of the
same set as well as operations between them.
ECC is considered as the one which has the highest security quality in per bit key among current public
key cryptosystems. It‟s characterized by small key, small system parameter, small public key, saving bandwidth,
fast implementation, low power, and low hardware requirements. [4]
ECC is "an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite
fields" [ 5].For the purpose of cryptography the variables and coefficients are limited to a special kind of set
called a FINITE FIELD.
The security of ECC depends on the difficulty of Elliptic Curve Discrete Logarithm Problem (ECDLP).
Let P and Q be the two points on the curve such that kP = Q, where k is a scalar and is called elliptic curve
discrete logarithm of Q to the base P. Given P and Q, it is computationally infeasible to obtain k, if k is
sufficiently large. [6]
The implementation of ECC mainly relies on the operations at three levels: the scalar multiplication,
the pointaddition / doubling, and the finite field modulo arithmetic. The ECC system based on GF(2n) is widely
utilized for its simple field arithmetic and efficient scalar multiplication algorithms.
Two different coordinates: the affine coordinate and the projective coordinate can be used for the ECC
where the curve is defined over GF(2n). It was shown in [3][7][8] that the projective coordinate is more
desirable for hardwareimplementation because it avoids the costly field inversion operation
In Wireless sensor Networks, Elliptic Curve Cryptography (ECC) was the natural choice between
Various Public Key Cryptographic options due to its efficient execution and computation, small key size and
signatures comparable to other PKC schemes such as RSA.
For example, an ECC protocol only needs 160 bit keys to provide equivalent security to 1024-bit RSA. In
addition, the benefits of having small key size results significant advantages such as smaller ROM, smaller
RAM, faster execution and more efficient storage. [9]
III. Algorithm / Methodology Used
The mathematical operations of ECC are defined over the elliptic curve equation
y² = x³ + ax + b
where 4a3 + 27b2 ≠ 0. Each value of „a‟ and „b‟ gives a different elliptic curve. All points (x, y) which satisfy
the above equation for given (a, b) plus a point atinfinity. The public key is a point on the curve and the private
key is a random number. The public key is obtained by multiplying the private key with a generator point P on
the curve. [6]
At the Sender End –
Step 1 - The sender will take a point P on the elliptic curve equation given above.
Step 2 – A random number„d‟ is selected within the range of 1- (n-1). „d‟ is the private key.
Step 3 – The sender will generate a public key Q by private key and point P.
Q = d*P
“Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 58 | Page
Step 4 – The message to be sent has point „M‟ on curve E.
Step 5 – Randomly select „k‟ from 1 to (n-1).
Step 6 – Generate two cipher text strings C1 and C2.
C1 = k *P
C2 = M+K*Q
Step 7 – Send C1 and C2. C1 and C2 are encrypted texts.
Figure 1.2 – Encryption at sender site
At the Receiver End –
Step 1 – The receiver uses the cipher texts C1 and C2 to decrypt the message M.
Step 2 – The receiver uses the private key to decrypt the message M.
Step 3 – The receiver has private key „d‟.
M = C2 – d*C1
Step 4 – „M‟ is the original message.
So, we get the original message back which we sent.
Figure 1.3 – Decryption at the receiver site
V. Output
The given Algorithm has been implemented by use of the above mentioned codes. It has been given
inputs of various length bit words i.e. it can take messages of 1-bit, 2-bit,3-bit….10bits. It generates a random
number which is taken as a point on curve. Sender has a private key which is known to only him and the
receiver. The public keys as two cipher texts are generated and sent over the carrier. These are the encrypted
texts. At the receiver end, the two cipher texts are received which along with the private key help to decrypt the
text.
Encrypted texts
C1 and C2
Private key of
receiver, d
M= C2-d*C1 Original Message,
M
“Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 59 | Page
Figure 1.4 – Output of 1bit number Figure 1.5 – Output of 1bit number
VI. Analysis Of The Output
At the sender end :
At the receiver end :
“Proposed Model For Network Security Issues Using Elliptical Curve Cryptography”
www.iosrjournals.org 60 | Page
The Encrypted message sent at the receiver side is same as the Decrypted message at the Receiver site.
VI. Conclusion
The digital signature based Elliptic Curve Cryptography covers all four aspects of security - Integrity,
Authentication , Non-repudiation and Confidentiality.
The promise of ECC for the better and secure data transmission is opening new dimensions of its
application in every field of communication. Mobile computing, wireless sensor net-works, server based
encryption, image encryption, government and financial communication protocols and many other. But there is
still a lot of research required for its practical implementation.
1. It is used in the growing wireless industry.
2. It depends on the case of use and level of security it provides.
Future Work-
This is a completely new domain and has tremendous scope of research.
ECC can be used to provide authentication and enhanced security.
USE OF ECC - Mobile computing, wireless sensor net-works, server based encryption, image encryption,
government and financial communication protocols and many other areas.
References -
[1]. An Elliptic Curve Cryptography Primer, Certicom “Catch the curve” White paper series, June 2004
[2]. Elliptic Curve Cryptography A new way for Encryption, Rahim Ali , Department of Computer Science and Engineering, Bahria
University, 13 National Stadium Road Karachi
[3]. IEEE Standard P 1363-2000, IEEE standard specification for public key cryptography‟, Aug2000.
[4]. The Study and Application of Elliptic Curve Cryptography Library on Wireless Sensor Network, 2008 11th
IEEE International
Conference on Communication Technology Proceedings.
[5]. D. R. Hankerson, S. A. Vanstone, and A. J. Menezes, Guide to Elliptic Curve Cryptography:Springer, 2004.
[6]. “Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography” , 2009 First International Conference on
Computational Intelligence, Communication Systems and Networks.
[7]. G. Agnew, R. Mullin, and S. Vanstone, “On the development of a fast elliptic curve processor chip”, Advances in Cryptology
CRYPTO’91, pp. 482-487, New York, Springer-Verlag, 1991.
[8]. D. V. Chudnovsky and G. V. Chudnovsky, “Sequences of numbers generated by addition in formal groups and new primality and
factorization tests.” Advances in Applied Mathematics vol. 7, no. 4, pp. 385-434, May 1986.
[9]. “New Low Complexity Key Exchange and Encryption protocols for Wireless Sensor Networks Clusters based on Elliptic Curve
Cryptography”, NRSC2009.

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
Cs6701 cryptography and network security
Cs6701 cryptography and network securityCs6701 cryptography and network security
Cs6701 cryptography and network securityArthyR3
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...CAS
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...ijsrd.com
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
 
Modified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCModified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCidescitation
 
Design and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmDesign and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmeSAT Publishing House
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 

Was ist angesagt? (19)

IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
Cs6701 cryptography and network security
Cs6701 cryptography and network securityCs6701 cryptography and network security
Cs6701 cryptography and network security
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
Modified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCModified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECC
 
Design and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmDesign and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithm
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 

Andere mochten auch

Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...
Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...
Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...IOSR Journals
 
On Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsOn Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsIOSR Journals
 
Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...IOSR Journals
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...IOSR Journals
 
Reduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar ApplicationReduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar ApplicationIOSR Journals
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksIOSR Journals
 
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...IOSR Journals
 
Modeling & Testing Of Hybrid Composite Laminate
Modeling & Testing Of Hybrid Composite LaminateModeling & Testing Of Hybrid Composite Laminate
Modeling & Testing Of Hybrid Composite LaminateIOSR Journals
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 

Andere mochten auch (20)

Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...
Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...
Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Func...
 
E017352634
E017352634E017352634
E017352634
 
On Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsOn Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable Labelings
 
F010214048
F010214048F010214048
F010214048
 
A017210110
A017210110A017210110
A017210110
 
D017241723
D017241723D017241723
D017241723
 
B012210512
B012210512B012210512
B012210512
 
B010611015
B010611015B010611015
B010611015
 
I017256165
I017256165I017256165
I017256165
 
Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...
 
R01754129132
R01754129132R01754129132
R01754129132
 
D010223139
D010223139D010223139
D010223139
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...
 
Reduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar ApplicationReduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar Application
 
A1304010106
A1304010106A1304010106
A1304010106
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth Networks
 
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
 
Modeling & Testing Of Hybrid Composite Laminate
Modeling & Testing Of Hybrid Composite LaminateModeling & Testing Of Hybrid Composite Laminate
Modeling & Testing Of Hybrid Composite Laminate
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 

Ähnlich wie “Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”

Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sIDES Editor
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storageShivam Singh
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...IRJET Journal
 
A Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve CryptographyA Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve Cryptographyeditor1knowledgecuddle
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...CSITiaesprime
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Marisa Paryasto
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 

Ähnlich wie “Proposed Model for Network Security Issues Using Elliptical Curve Cryptography” (20)

Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
C0281010016
C0281010016C0281010016
C0281010016
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
 
A Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve CryptographyA Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve Cryptography
 
Ci25500508
Ci25500508Ci25500508
Ci25500508
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...
 
D018141922
D018141922D018141922
D018141922
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
G05124550
G05124550G05124550
G05124550
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 

Kürzlich hochgeladen (20)

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 7, Issue 3 (Sep. - Oct. 2013), PP 56-60 www.iosrjournals.org www.iosrjournals.org 56 | Page “Proposed Model for Network Security Issues Using Elliptical Curve Cryptography” 1 Garima Kaushik, 2 Mr. Shailendra Gaur 1 Btech (CSE 4th year), Bhagwan Parshuram Institute of Technology, GGSIPU, India 2 Assisstant Professor, Bhagwan Parshuram Institute of Technology, GGSIPU, India Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security systems. . ECC is a faster and more secure method of encryption as compared to other Public Key Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The Private key is known only to sender and receiver and hence data transmission is secure. I. Introduction The electronic revolution in our daily life has created an environment where information is available to the masses; let it be our address, phone number, our social security number or personal conversation on a website. In this age of information overload there are some elements that can use this information against you. So, we need to convert our data in a form that cannot be read or understood by anyone. This is the idea of encryption. Every alphabet or character that we type is represented by a binary number. The Encryption process focuses on mixing up these binary numbers after performing mathematical operations which converts the binary number in a newer arrangement which is not understandable. This is done by a key. Every encryption process uses a “key” for encryption. The key we use to encrypt a text is used again to decrypt it. Such encryption process is called symmetric encryption. There is one more process that uses two distinct keys, one to encrypt and a different one to decrypt. The mathematics of this was first purposed by Elliptical Curve Cryptography. [1] The key is a parameter that is passed in the encryption function along with the text needed to be encrypted, which generates a cipher text. This cipher text can be transmitted over an unsecure net-work. When received by the intended recipient, it will decrypt the cipher text using a key, which is again passed into a decryption function to recover the plain text back. If any other eavesdropper intercepts the message over the network, he will not be able to decode it, as the key is not known to him. [ 2] Figure 1.1 – Encryption/ Decryption Process II. Elliptic Curve Cryptography (ECC) A: Basics Of Elliptic Curve  Elliptic Curve (EC) systems as applied to cryptography were first proposed in 1985 independently by Neal Koblitz and Victor Miller.  Elliptic Curve Cryptography is based on the complexity of elliptic curve discrete algorithm which is also known as N.P hard Problem.  ECC was basically designed to run on small, constrained devices especially embedded devices which has less storage space capacity, less processing capabilities , less power consumption.  ECC can be widely used in information security and Ecommerce.  ECC uses points on the elliptic curve to derive a 162 bits public key that is equivalent in strength to 1024 bits RSA key. Hence, main benefit of ECC is that by using smaller key it provide equivalent level of security as the conventional crypto systems.  RSA has exponentiation which is raising the message or ciphertext to the public or private values whereas
  • 2. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography” www.iosrjournals.org 57 | Page ECC has point multiplication which has repeated addition of two points.  The idea of Elliptic Curve has unique property which makes it suitable for use in cryptography. This uniqueness forms the ability to take any two points on a specific curve, add them together, and get a third point on the same curve. The confusion in cryptography is that which two points were added together to obtain the third point. Basic Concepts - The Elliptic Curve [3] has a very unique property which makes it suitable for use in cryptography. This uniqueness forms the ability to take any two points on a specific curve, add them together, and get a third point on the same curve.An elliptic curve is defined by an equation is two variables, with coefficient. For the purpose of cryptography, the variable and coefficient are limited to a special kind of set called a FINITE FIELD. The general equation for an elliptic curve is: y2 + axy + by = x3 + cx2 + dx + e where a,b,c,d and e are real numbers and x and y also take their values from real number .A simplified version of the equation will be: y2 – x8 + dx + e In Elliptical Curve Cryptography, the Elliptic Curve is used to define the members of the set over which the group is calculated i.e. an operation on any two elements of the set will give a result that is the member of the same set as well as operations between them. ECC is considered as the one which has the highest security quality in per bit key among current public key cryptosystems. It‟s characterized by small key, small system parameter, small public key, saving bandwidth, fast implementation, low power, and low hardware requirements. [4] ECC is "an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields" [ 5].For the purpose of cryptography the variables and coefficients are limited to a special kind of set called a FINITE FIELD. The security of ECC depends on the difficulty of Elliptic Curve Discrete Logarithm Problem (ECDLP). Let P and Q be the two points on the curve such that kP = Q, where k is a scalar and is called elliptic curve discrete logarithm of Q to the base P. Given P and Q, it is computationally infeasible to obtain k, if k is sufficiently large. [6] The implementation of ECC mainly relies on the operations at three levels: the scalar multiplication, the pointaddition / doubling, and the finite field modulo arithmetic. The ECC system based on GF(2n) is widely utilized for its simple field arithmetic and efficient scalar multiplication algorithms. Two different coordinates: the affine coordinate and the projective coordinate can be used for the ECC where the curve is defined over GF(2n). It was shown in [3][7][8] that the projective coordinate is more desirable for hardwareimplementation because it avoids the costly field inversion operation In Wireless sensor Networks, Elliptic Curve Cryptography (ECC) was the natural choice between Various Public Key Cryptographic options due to its efficient execution and computation, small key size and signatures comparable to other PKC schemes such as RSA. For example, an ECC protocol only needs 160 bit keys to provide equivalent security to 1024-bit RSA. In addition, the benefits of having small key size results significant advantages such as smaller ROM, smaller RAM, faster execution and more efficient storage. [9] III. Algorithm / Methodology Used The mathematical operations of ECC are defined over the elliptic curve equation y² = x³ + ax + b where 4a3 + 27b2 ≠ 0. Each value of „a‟ and „b‟ gives a different elliptic curve. All points (x, y) which satisfy the above equation for given (a, b) plus a point atinfinity. The public key is a point on the curve and the private key is a random number. The public key is obtained by multiplying the private key with a generator point P on the curve. [6] At the Sender End – Step 1 - The sender will take a point P on the elliptic curve equation given above. Step 2 – A random number„d‟ is selected within the range of 1- (n-1). „d‟ is the private key. Step 3 – The sender will generate a public key Q by private key and point P. Q = d*P
  • 3. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography” www.iosrjournals.org 58 | Page Step 4 – The message to be sent has point „M‟ on curve E. Step 5 – Randomly select „k‟ from 1 to (n-1). Step 6 – Generate two cipher text strings C1 and C2. C1 = k *P C2 = M+K*Q Step 7 – Send C1 and C2. C1 and C2 are encrypted texts. Figure 1.2 – Encryption at sender site At the Receiver End – Step 1 – The receiver uses the cipher texts C1 and C2 to decrypt the message M. Step 2 – The receiver uses the private key to decrypt the message M. Step 3 – The receiver has private key „d‟. M = C2 – d*C1 Step 4 – „M‟ is the original message. So, we get the original message back which we sent. Figure 1.3 – Decryption at the receiver site V. Output The given Algorithm has been implemented by use of the above mentioned codes. It has been given inputs of various length bit words i.e. it can take messages of 1-bit, 2-bit,3-bit….10bits. It generates a random number which is taken as a point on curve. Sender has a private key which is known to only him and the receiver. The public keys as two cipher texts are generated and sent over the carrier. These are the encrypted texts. At the receiver end, the two cipher texts are received which along with the private key help to decrypt the text. Encrypted texts C1 and C2 Private key of receiver, d M= C2-d*C1 Original Message, M
  • 4. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography” www.iosrjournals.org 59 | Page Figure 1.4 – Output of 1bit number Figure 1.5 – Output of 1bit number VI. Analysis Of The Output At the sender end : At the receiver end :
  • 5. “Proposed Model For Network Security Issues Using Elliptical Curve Cryptography” www.iosrjournals.org 60 | Page The Encrypted message sent at the receiver side is same as the Decrypted message at the Receiver site. VI. Conclusion The digital signature based Elliptic Curve Cryptography covers all four aspects of security - Integrity, Authentication , Non-repudiation and Confidentiality. The promise of ECC for the better and secure data transmission is opening new dimensions of its application in every field of communication. Mobile computing, wireless sensor net-works, server based encryption, image encryption, government and financial communication protocols and many other. But there is still a lot of research required for its practical implementation. 1. It is used in the growing wireless industry. 2. It depends on the case of use and level of security it provides. Future Work- This is a completely new domain and has tremendous scope of research. ECC can be used to provide authentication and enhanced security. USE OF ECC - Mobile computing, wireless sensor net-works, server based encryption, image encryption, government and financial communication protocols and many other areas. References - [1]. An Elliptic Curve Cryptography Primer, Certicom “Catch the curve” White paper series, June 2004 [2]. Elliptic Curve Cryptography A new way for Encryption, Rahim Ali , Department of Computer Science and Engineering, Bahria University, 13 National Stadium Road Karachi [3]. IEEE Standard P 1363-2000, IEEE standard specification for public key cryptography‟, Aug2000. [4]. The Study and Application of Elliptic Curve Cryptography Library on Wireless Sensor Network, 2008 11th IEEE International Conference on Communication Technology Proceedings. [5]. D. R. Hankerson, S. A. Vanstone, and A. J. Menezes, Guide to Elliptic Curve Cryptography:Springer, 2004. [6]. “Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography” , 2009 First International Conference on Computational Intelligence, Communication Systems and Networks. [7]. G. Agnew, R. Mullin, and S. Vanstone, “On the development of a fast elliptic curve processor chip”, Advances in Cryptology CRYPTO’91, pp. 482-487, New York, Springer-Verlag, 1991. [8]. D. V. Chudnovsky and G. V. Chudnovsky, “Sequences of numbers generated by addition in formal groups and new primality and factorization tests.” Advances in Applied Mathematics vol. 7, no. 4, pp. 385-434, May 1986. [9]. “New Low Complexity Key Exchange and Encryption protocols for Wireless Sensor Networks Clusters based on Elliptic Curve Cryptography”, NRSC2009.