Preview

Data Encryption with Ecc

Better Essays
Open Document
Open Document
2392 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Encryption with Ecc
DATA ENCRYPTION AND DECRYPTION WITH ELLIPTIC CURVE CRYPTOGRAPHY
Ravi Kumar Kodali
Department of ECE National Institute of Technology Warangal,506004,INDIA

Abstract—Elliptic curve cryptography is the most popular cryptographic technique that provides higher security with a lesser key size.ECC Encryption and Decryption are implemented through Elliptic curve points operations like point addition,subtraction,doubling and scalar point multiplication.ECC cryptography technique is quite useful for WSN Applications.The security level increases with a larger keysize.The paper focuses on the implementation of ECC encryption and decryption with a key size of 163 bits.

proposed independently by Neal Koblitz and Victor Miller in 1985. They found the elliptic curve equation while for the arc length of an ellipse. Elliptic Curve is defined by the following Weierstrass Equation: y 2 + (a1 xy) + a3 y = x3 + a2 x2 + a4 x + a6 (1)

Keywords: ECC,Encryption,Decryption,Key size I. INTRODUCTION Cryptography is the science and study of secret writing. The Cryptography means scrambling or modifying the information in such a way that it is not understandable and hence information is hidden from an unauthorized person. The main objectives of cryptography are Confidentiality (the information cannot be understandable to anyone except to the intended person), Integrity (the information cannot be altered by third person between transmitter and sender), Non-repudiation (the creator/sender of the information cannot deny at a later stages), Authentication (the sender and receiver can verify each others identity). In todays world, right from the internet sites to banks need security. Hence the cryptography systems are playing a vital role. There are different types of cryptography methods that are available. The cryptography methods are mainly classified into two types. 1. Private Key cryptography: This is also known as symmetric key cryptography where both the sender and a receiver share a

You May Also Find These Documents Helpful

  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Data Encryption Standard (DES), ROT13, and Enigma are all examples of algorithm for the encryption of electronic data…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Best Essays

    E-Voting by Using Biometrics

    • 2584 Words
    • 11 Pages

    Bibliography: A.Forouzan, B., 2008. Cryptography & Network Security. new delhi: Tata Mc Graw. Hill campanies.…

    • 2584 Words
    • 11 Pages
    Best Essays
  • Better Essays

    Dept. of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China saul.perceive@gmail.com Abstract A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. Therefore, WSN is venerable to various attacks. Among these attacks, the id-based attack such as node replication attacks and Sybil attacks are the most threatening. Hence, the security in WSNs presents a critical challenge for identity and data authentication. Although there are some recent approaches, most are resources-costing or constrained to some specific systems. Thus, in this paper, we present a novel authentication scheme to prevent these attacks. This Id-based Multiple Authentication (IMA) scheme bases upon the joint identity authentication and steganography to present a secure mechanism for data aggregation in WSNs. Simulations against above-mentioned attacks applying this scheme is presented and consequently show that the scheme can successfully authenticate the sensory data with high confidentiality. Keywords: Id-based authentication scheme; Wireless sensor network; Security data authentication which protects the integrity and the freshness against replication attacks. Even though efforts have been put into enhancing the authentication scheme, they have some shortages or drawbacks dealing with the security or the efficiency. Data authentication based on message authentication code (MAC) is known as a conventional scheme. Generally, a sensor node will append a MAC to its sensory data or to an aggregate report as an endorsement. These MACs will then be checked by the intermediate nodes along the route to the sink. Although the simple MAC operation is suitable for the energy efficiency, the…

    • 2530 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    [3] K.S. Rawat, G.H. Massiha,"Secure Data Transmission Over Wireless Networks: Issues and Challenges”, University of Louisiana at Lafayette, USA, 2003 IEEE, pp-65 – 68…

    • 2104 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Accounting

    • 7868 Words
    • 32 Pages

    Encryption is the primary method of achieving confidentiality in e-commerce. Plain-text messages are rearranged by some mathematical process. The encrypted message cannot be read by anyone who does not know the process.…

    • 7868 Words
    • 32 Pages
    Good Essays
  • Good Essays

    online examination system

    • 314 Words
    • 2 Pages

    output feedback mode, choosing a cipher mode, block ciphers vs. stream ciphers, Choosing an Algorithm,…

    • 314 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In an age where data transmission over the network has become a vital aspect of communication and information sharing it is very essential to ensure robust data security. Keeping the above fact in mind, we aim to enhance the existing security standards by designing a more efficient Encryption Algorithm. In this paper we propose the idea of using a combination of AES-DES and incorporating it in the Feistal structure. Being a hybrid of two powerful encryption techniques, the algorithm would be an efficient and reliable encryption standard.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Czagan, D. (2013, October 23). Symmetric and Asymmetric Encryption - InfoSec Institute. Retrieved October 2, 2014, from http://resources.infosecinstitute.com/symmetric-asymmetric-encryption/…

    • 480 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Wireless Sensor Network

    • 15813 Words
    • 64 Pages

    The need for security in WSNs is unavoidable. Applications such as military, medical care, structural monitoring, and surveillance systems require information security in the network. As current security mechanisms for WSNs are not sufficient, development of new security schemes for WSNs is necessary. Nowadays research and applications of Wireless Sensor Network have attracted people’s attention. Since sensor nodes in WSN are resource-constrained, the security solutions for WSN become difficult. Cryptographic hash functions are a valuable tool in cryptography. They are applied in many areas of information security to provide protection of the authenticity of messages, data integrity verification which prevents modification of data from going undetected. Traditional security measures require heavy communication and computational resources and cryptographically complex security solutions for sensor networks are not suitable for WSN. In this paper, I have proposed an algorithm for node authentication by using cryptographic hash function and public key cryptography technique in Wireless Sensor Network .Which can fulfill confidential communication and mutual authentication between nodes, enhances scalability, node authentication security and prevents node impersonation.…

    • 15813 Words
    • 64 Pages
    Powerful Essays
  • Satisfactory Essays

    Conics Paper

    • 298 Words
    • 2 Pages

    For my role in researching the ellipse, I researched the history of the ellipse. I learned many things that helped me understand the ellipse more. I never knew that people studied ellipses as far back as 380 BC. I never studied any history over the ellipse until now, and it is very interesting to see that everyone just called ellipses circles because they were both round. After they circle was defined, the ellipse did not fit in the description, and scientists began to study them. It wasn’t until the early 1600s when the focus was discovered by Kepler. Scientists first started thinking about the ellipse while studying the orbit shape of the planets. After years of research, they decided to make a new conic shape instead of calling all of the ellipses circles. They knew the seasons which helped them consider that the earth is not revolving in a circle, but rather in an oval.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Engineer

    • 7636 Words
    • 31 Pages

    3. Yuan L. Lai, Jian H. Chen, and Jui P. Hung; Development of Machinable Ellipses by NURBS Curves, World Academy of Science, Engineering and Technology 14 2008.…

    • 7636 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    Report on Cryptography

    • 1445 Words
    • 6 Pages

    Bibliography: Coe, M. G. (2004, Jan 08). Modern Cryptography - Methods and Uses. (A. Cable, Ed.) Retrieved March 03, 2014, from H2G2: http://h2g2.com/edited_entry/A1315919…

    • 1445 Words
    • 6 Pages
    Powerful Essays