An Hyper-Elliptic Curve Cryptosystem Scheme Using 3bc Algorithm

نویسندگان

  • Md. Hussain Ansari
  • Deepak Kumar
  • Khustar Ansari
چکیده

This paper studies a public key generation in an enhanced ECC (Elliptic Curve Cryptosystem) using FPGA’s at the hardware implementation. To improve the strength of encryption and the speed of processing, the public key and the private key of EC(Elliptic curve) over GF(2n ) are used to form a shared private key (X,Y). And then the X is used with an initial point on HEC(Hyper-Elliptic Curve) over GF(2n ) to generate session keys, which are used with 3BC (Block Byte Bit Cipher) (see [1], [6], [13]) algorithm for the data encryption. We are investigating a novel approach of software/ hardware code sign implemented in Verilog Hardware Description Language (VHDL), which produces hardware algorithm components to place onto the FPGAs, thereby creating adaptive software overlays differentiated by use of a Universal Unique Identifier (UUID) as a functional operand to a custom Arithmetic Logic Unit (ALU).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Generation in Elliptic Curve Cryptosystems over GF ( 2 n )

This paper proposes a public key generation for an ECC (Elliptic Curve Cryptosystem) using FPGA’s. To improve the strength of encryption and the speed of processing, the public key and the private key of EC(Elliptic curve) over GF(2) are used to form a shared private key (X,Y). And then the X is used with an initial point on HEC(Hyper-Elliptic Curve) over GF(2) to generate session keys, which a...

متن کامل

An ASEP (Advanced Secure Electronic Payment) Protocol Design Using 3BC and ECC (F^2) Algorithm

Unlike SET (Secure Electronic Transaction) protocol. This paper proposes an ASEP (Advanced Secure Electronic Payment) protocol, which uses ECC (Elliptic Curve Cryptosystem with F2 m not Fp) [1, 2, 3], SHA (Secure Hash Algorithm) and 3BC (Block Byte Bit Cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC are...

متن کامل

A New Secure and Efficient Elliptic Curve Cryptosystem

The design of new elliptic curve cryptosystem is still an interest to community of cryptographers. In this article, we propose a new secure and efficient elliptic curve cryptosystem. The scheme requires a single public and private keys and needs 59 and 30 for encryption and decryption algorithm respectively. The communication costs is given by 2| |. The estimated computational speed for the enc...

متن کامل

Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant

Since quantum computers came on the scene, the world has changed greatly, especially related to cryptography. Public key cryptosystem, particularly RSA cryptosystem cant resist the quantum computers attack, so some quantum-resistant schemes have been proposed mainly based on quantum key distribution (QKD) method or new resistance to quantum algorithms. However, to the best of our knowledge, no ...

متن کامل

Pairing Based Elliptic Curve Cryptosystem for Message Authentication

Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. Because ECC helps to establish equivalent sec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016