The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RSA and Elliptic Curve Cryptography (ECC) are the most common public cryptographic algorithms for encryption of symmetric keys which are used in https protocol and for digital signatures. The beauty of using ECC instead of using RSA is that machines which make use of ECC are likely to consume less system resources thereby ameliorating the performance of the machines. In this paper, we experimentally...
Elliptic curves in the geometric and algebraic parlances have been studied by computer scientists over the last few decades. Elliptic Curve Cryptography or Cryptosystem (ECC) is a public-key cryptosystem. The main advantage and benefit of using ECC instead of using RSA is that it gives equivalent security for a smaller key, thereby consuming less resource and ameliorating performance on the systems...
Elliptic curve cryptosystem has been heavily studied by computer scientists for many decades. This form of cryptosystem is based on elliptic curves over some Galois fields. Elliptic Curve Cryptography or Cryptosystem (ECC) is a public-key cryptosystem that makes use of public and private key pairs as a means of encrypting and decrypting information in the internet. The critical security of ECC relies...
As multimedia applications are used increasingly, security becomes an important issue of security of images. The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed...
Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller key size, thereby reducing processing overhead. There is no sub exponential time algorithm in solving the Elliptic curve discrete logarithm problem. ElGamal Elliptic Curve Cryptography is a public key cryptography analogue of the...
This paper proposes a new approach to encrypt data (message) with new modified version of Menezes Vanstone cryptosystem based on elliptic curve. This new version basically utilizes the original Menezes Vanstone cryptosystem but we added additional features to cryptosystem's encryption method. According to our encryption method, firstly the message is divided into blocks that contain only one character,...
Here we propose an algorithm to implement data security using encryption and decryption method based elliptic curve of Amazigh alphabet. The Unicode character is converted into point on elliptic curve, then by using Fibonacci numbers, which generates the data sequence of random point for each character. Further, the obtained points are encrypted using state finite machine. Here, the same symbol is...
The main role of encryption algorithms is to keep devises safe from attack. Using the best and more efficient algorithm for a device according to its storage and amount of data transfer is the most important part. This paper compares Elliptical Curve Cryptography algorithm (ECC) with RSA algorithm on a multipurpose smart card. There are three applications in our multipurpose smart card which is named...
In this paper, we propose an elliptic curve cryptographic (ECC) architecture for a lower hardware resource. In our work, the different paths of encryption and decryption could be chosen, and the elliptic curve (EC) is based on GF (2163). The EC scalar multiplication is a main operation module that includes add, Montgomery multiplier and inverse in ECC architecture. All modules are organized in a hierarchical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.