Text Encryption with Improved Elliptic Curve Cryptography
نویسندگان
چکیده
The security of data encrypted with an encryption algorithm should be guaranteed such that it is never easy for a third party to recover the message from data. To this effect, ECC has been reliable option. However, base equation defines Elliptic Curve Cryptography (ECC) in form linear one unknown which solve. ease can solved weak point algorithm. Thus, aim research work improve by improving nature its equation.
 curve arithmetic was used develop improved model. process specifically targeted and single double using separate constant each round encryption. Simulation done 256 bits key size on selected number character inputs. Java programming language simulate model Net Beans IDE. Results show despite longer process, performed better than existing both decryption times, but compared RSA, higher while time lower. Generally, shows out – systems therefore better.
منابع مشابه
Software Elliptic Curve Cryptography
In this thesis, we study the software implementation of the NIST-recommended elliptic curves over prime fields. Our implementation goals are to achieve a fast, small, and portable cryptographic library, which supports elliptic curve digital signature generation and verification. The implementation results are presented on a Pentium I1 448.81 MHz. We also consider the sliding window algorithm (S...
متن کاملElliptic Curve Cryptography
There is a re-emerging demand for low-end devices such as 8-bit processors, driven by needs for pervasive applications like sensor networks and RF-ID tags. Security in pervasive applications, however, has been a major concern for their widespread acceptance. Public-key cryptosystems (PKC) like RSA and DSA generally involve computation-intensive arithmetic operations with operand sizes of 1024 −...
متن کاملElliptic Curve Cryptography
Public key cryptography systems are based on sound mathematical foundations that are designed to make the problem hard for an intruder to break into the system. The major approaches that since 1976 have withstood intruder attacks, are the discrete logarithm Mr. Raja Ghosal PhD Student, Auto-ID Lab, ADELAIDE School of Electrical and Electronics Engineering, The University of Adelaide Prof. Peter...
متن کاملFormalized Elliptic Curve Cryptography
Formalizing a mathematical theory is a necessary first step to proving the correctness of programs that refer to that theory in their specification. This paper demonstrates how the mathematical theory of elliptic curves and their application to cryptography can be formalized in higher order logic. This formal development is mechanized using the HOL4 theorem prover, resulting in a collection of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of advances in mathematics and computer science
سال: 2023
ISSN: ['2456-9968']
DOI: https://doi.org/10.9734/jamcs/2023/v38i31749