Plain Text Encryption and Decryption Time Comparison Using ECC

O. srinivasa Rao, A. Charan, Sumit Rauniyar, Pujitha Sannapareddy, Indhira Mudrageda

Abstract


The increased use of computer communication systems has increased risk of data theft. Cryptography is the most important aspect of communication, security and becoming an important building block for computer security. Elliptic curve cryptography is one of the most widely used public key algorithms for secure exchange of information. In this paper, the authors present time comparison of encryption and decryption using ECC for text messages.

Keywords


Cryptography, elliptic curve cryptography (ECC), encryption, decryption

Full Text:

PDF

References


Koblitz Neal. Elliptic curve cryptosystem. Journal of Mathematics Computation. Jan 1987; 48(177): 203–9p.

Miller V. Uses of elliptic curves in cryptography. Advances in Cryptology-Crypto ’85, Lecture Notes in Computer Science. 218

Certicom Corp. An Introduction to Information Security. March 1997; 1.

ANSI X9.63. Public Key Cryptography for the Financial Services Industry: Elliptic Curve Key Agreement and Key Transport Protocols. Ballot Version. May 2001.

Internet Engineering Task Force. The OAKLEY Key Determination Protocol, IETF RFC 2412. November 1998.

ISO/IEC 15946–3. Information Technology–Security Techniques–Cryptographic Techniques Based on Elliptic Curves, Part 3. Final Draft International Standard (FDIS). February 2001

National Institute of Standards and Technology. Digital Signature Standard, FIPS Publication. 2000; 186–2.

Jacobson M, Koblitz N, Silverman J, et al. Analysis of the xedni calculus attack. Designs, Codes and Cryptography. 20 (2000), 41–64 (1986), Springer-Verlag; 417–426p.

Standards for Efficient Cryptography Group, SEC 1: Elliptic Curve Cryptography, version 1.0. 2000. Available at http://www.secg.org

Rivest RL, Shamir A, Adleman LM. Method for Obtaining Digital Signatures and Public–key Cryptosystems. Communications of the ACM. February 1978; 21: 120–6p.

Arita S. Weil descent of elliptic curves over finite fields of characteristic three. Advances in Cryptology–Asiacrypt 2000. Lecture Notes in Computer Science. Springer-Verlag; 1976 (2000); 248–59p.

Fernandes A. Elliptic Curve Cryptography. Dr. Dobb’s Journal. December 1999.

Srinivasa Rao O, Pallam Setty S. Efficient mapping methods of elliptic curve crypto

systems. International Journal of Engineering Science and Technology. 2010; 2(8):3651–6p.

Vigila S, Muneeswaran K. Implementation of text based cryptosystem using elliptic curve cryptography. Advanced Computing, 2009. ICAC 2009. First International Conference. 13–15 Dec. 2009; 82–5p.

Gupta K, Silakari S, Gupta R, et al. An ethical way of image encryption using ECC. Computational Intelligence, Communication Systems and Networks, 2009. CICSYN ‘09. First International Conference. 23–25 July 2009; 342–5p.

Rajaram Ramasamy R, Amutha Prabakar M, Indra Devi M, et al. Knapsack based ECC encryption and decryption. International Journal of Network Security. Nov. 2009; 9(3): 218–26p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/