Text Encryption with Improved Elliptic Curve Cryptography

نویسندگان

چکیده

The security of data encrypted with an encryption algorithm should be guaranteed such that it is never easy for a third party to recover the message from data. To this effect, ECC has been reliable option. However, base equation defines Elliptic Curve Cryptography (ECC) in form linear one unknown which solve. ease can solved weak point algorithm. Thus, aim research work improve by improving nature its equation.
 curve arithmetic was used develop improved model. process specifically targeted and single double using separate constant each round encryption. Simulation done 256 bits key size on selected number character inputs. Java programming language simulate model Net Beans IDE. Results show despite longer process, performed better than existing both decryption times, but compared RSA, higher while time lower. Generally, shows out – systems therefore better.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software Elliptic Curve Cryptography

In this thesis, we study the software implementation of the NIST-recommended elliptic curves over prime fields. Our implementation goals are to achieve a fast, small, and portable cryptographic library, which supports elliptic curve digital signature generation and verification. The implementation results are presented on a Pentium I1 448.81 MHz. We also consider the sliding window algorithm (S...

متن کامل

Elliptic Curve Cryptography

There is a re-emerging demand for low-end devices such as 8-bit processors, driven by needs for pervasive applications like sensor networks and RF-ID tags. Security in pervasive applications, however, has been a major concern for their widespread acceptance. Public-key cryptosystems (PKC) like RSA and DSA generally involve computation-intensive arithmetic operations with operand sizes of 1024 −...

متن کامل

Elliptic Curve Cryptography

Public key cryptography systems are based on sound mathematical foundations that are designed to make the problem hard for an intruder to break into the system. The major approaches that since 1976 have withstood intruder attacks, are the discrete logarithm Mr. Raja Ghosal PhD Student, Auto-ID Lab, ADELAIDE School of Electrical and Electronics Engineering, The University of Adelaide Prof. Peter...

متن کامل

Formalized Elliptic Curve Cryptography

Formalizing a mathematical theory is a necessary first step to proving the correctness of programs that refer to that theory in their specification. This paper demonstrates how the mathematical theory of elliptic curves and their application to cryptography can be formalized in higher order logic. This formal development is mechanized using the HOL4 theorem prover, resulting in a collection of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of advances in mathematics and computer science

سال: 2023

ISSN: ['2456-9968']

DOI: https://doi.org/10.9734/jamcs/2023/v38i31749