Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4

Abstract

Abstract: - Elliptic curves were first proposed as a basis for public key cryptography in the mid-1980s independently by Koblitz and Miller. Elliptic curve cryptography (ECC) algorithm is practical than existing security algorithms. Because of this fact, it showed real attraction to portable devices (handheld devices) manufacturers and the security of their systems. In fact, through these devices, anyone can access either email, or do bank transaction or buy anything on internet using credit cards with high security standards. Elliptic curve algorithm is promising to be the best choice of these handhelds or similar devices because of low computing power and fast execution. ECC further gives very high security as compared to similar crypto systems with less size of key. For example, 160 bit ECC system is believed to provide same level of security as 1024 bit RSA [5, 6].The other two ECC scalar multiplication modular operations are inversion and multiplication. Inversion is known to be the complex and very expensive operation [7], its cost is reduced by converting the normal (x, y) affine coordinate system to projective coordinate system(X, Y, Z) which will add-up more modular multiplications to the process; i.e. it will increase the number of multiplications in both ECC point doubling and adding processes operations to reduce the inversion complexity

Authors and Affiliations

Keywords

Related Articles

Study of Corelation Between Ultrasonographically Observed Grade 3 Placenta at 36 Weeks Gestation and Fetal and Maternal Outcomes

Current ultrasound assessment of placental calcification relies on Grannum grading. The ultrasonographic appearance of grade III placental maturation, if it occurs before 36 weeks, may signify placental dysfunction and i...

Study and Analysis of Human Gait to Recognize the Person

Study and Analysis of Human Gait to Recognize the Person

Influence of Investment Groups on Creation of Small and Medium Size Enterprises in Nairobi County

This research project sought to establish the influence of investment groups on creation of small and medium size enterprises in Nairobi County. Investment groups are started by like-minded persons with a common vision g...

Low Power Area Efficient Parallel Counter Architecture

Counters are specialized registers and is considered as essential building blocks for a variety of circuit operations such as programmable frequency dividers, shifters, code generators, memory select management, and vari...

Theoretical Study of Drilling Process Materials By Laser Pulses (Micro, Nano and Picoseconds)

study of the interaction of laser radiations (Nd-YAG) laser at (1.0 6µm) wave length with pulse duration (100 µsec) on some solid material (Ag,Au,Sn,CO) by using three dimension function solutions that is laser beam tran...

Download PDF file
  • EP ID EP366393
  • DOI -
  • Views 140
  • Downloads 0

How To Cite

(2015). Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography. UNKNOWN, 4(4), -. https://europub.co.uk/articles/-A-366393