An Hyper-Elliptic Curve Cryptosystem Scheme Using 3bc Algorithm
نویسندگان
چکیده
This paper studies a public key generation in an enhanced ECC (Elliptic Curve Cryptosystem) using FPGA’s at the hardware implementation. To improve the strength of encryption and the speed of processing, the public key and the private key of EC(Elliptic curve) over GF(2n ) are used to form a shared private key (X,Y). And then the X is used with an initial point on HEC(Hyper-Elliptic Curve) over GF(2n ) to generate session keys, which are used with 3BC (Block Byte Bit Cipher) (see [1], [6], [13]) algorithm for the data encryption. We are investigating a novel approach of software/ hardware code sign implemented in Verilog Hardware Description Language (VHDL), which produces hardware algorithm components to place onto the FPGAs, thereby creating adaptive software overlays differentiated by use of a Universal Unique Identifier (UUID) as a functional operand to a custom Arithmetic Logic Unit (ALU).
منابع مشابه
Key Generation in Elliptic Curve Cryptosystems over GF ( 2 n )
This paper proposes a public key generation for an ECC (Elliptic Curve Cryptosystem) using FPGA’s. To improve the strength of encryption and the speed of processing, the public key and the private key of EC(Elliptic curve) over GF(2) are used to form a shared private key (X,Y). And then the X is used with an initial point on HEC(Hyper-Elliptic Curve) over GF(2) to generate session keys, which a...
متن کاملAn ASEP (Advanced Secure Electronic Payment) Protocol Design Using 3BC and ECC (F^2) Algorithm
Unlike SET (Secure Electronic Transaction) protocol. This paper proposes an ASEP (Advanced Secure Electronic Payment) protocol, which uses ECC (Elliptic Curve Cryptosystem with F2 m not Fp) [1, 2, 3], SHA (Secure Hash Algorithm) and 3BC (Block Byte Bit Cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC are...
متن کاملA New Secure and Efficient Elliptic Curve Cryptosystem
The design of new elliptic curve cryptosystem is still an interest to community of cryptographers. In this article, we propose a new secure and efficient elliptic curve cryptosystem. The scheme requires a single public and private keys and needs 59 and 30 for encryption and decryption algorithm respectively. The communication costs is given by 2| |. The estimated computational speed for the enc...
متن کاملElliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant
Since quantum computers came on the scene, the world has changed greatly, especially related to cryptography. Public key cryptosystem, particularly RSA cryptosystem cant resist the quantum computers attack, so some quantum-resistant schemes have been proposed mainly based on quantum key distribution (QKD) method or new resistance to quantum algorithms. However, to the best of our knowledge, no ...
متن کاملPairing Based Elliptic Curve Cryptosystem for Message Authentication
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. Because ECC helps to establish equivalent sec...
متن کامل