Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4

Abstract

Abstract: - Elliptic curves were first proposed as a basis for public key cryptography in the mid-1980s independently by Koblitz and Miller. Elliptic curve cryptography (ECC) algorithm is practical than existing security algorithms. Because of this fact, it showed real attraction to portable devices (handheld devices) manufacturers and the security of their systems. In fact, through these devices, anyone can access either email, or do bank transaction or buy anything on internet using credit cards with high security standards. Elliptic curve algorithm is promising to be the best choice of these handhelds or similar devices because of low computing power and fast execution. ECC further gives very high security as compared to similar crypto systems with less size of key. For example, 160 bit ECC system is believed to provide same level of security as 1024 bit RSA [5, 6].The other two ECC scalar multiplication modular operations are inversion and multiplication. Inversion is known to be the complex and very expensive operation [7], its cost is reduced by converting the normal (x, y) affine coordinate system to projective coordinate system(X, Y, Z) which will add-up more modular multiplications to the process; i.e. it will increase the number of multiplications in both ECC point doubling and adding processes operations to reduce the inversion complexity

Authors and Affiliations

Keywords

Related Articles

Off-Design of a Steam Condenser in a Mathematical Model

Off-Design of a Steam Condenser in a Mathematical Model

The Exquisite Integer Additive Set-Labeling of Graphs

Let N_0 denote the set of all non-negative integers and P(N_0) be its power set. An integer additive set-indexer (IASI) of a graph G is an injective function f:V(G)-P(N_0) such that the induced function f^+:E(G)-P(N_0) d...

A Mathematical Model of Cervical Cancer in Kenya

"Background In this paper dynamic models for cervical cancer among women with diagnosed and undiagnosed cervical cancer have been constructed. Methods Differential equations for the population of women in each stage o...

Performance of Microimmunofluorescence Test in Detection of anti-ChlamydiaTrachomatis Immunog-lobulinsin Iraqi Infertile Males with Special Refer to Age Group Distribution

"Background: The incidence of anti-chlamydia trachomatis immunoglobulins in serninal plasma and serum of infertile men was detected by microimmunofluorscence (MIF) test .The main objective was to determine and compare...

A Comparison of Spatial & Frequency Domain Fusion Methods

The main application of image fusion is merging the gray level high resolution image and results in a new image that retains the most desirable information and characteristics of each source image. Since the idea of imag...

Download PDF file
  • EP ID EP366393
  • DOI -
  • Views 94
  • Downloads 0

How To Cite

(2015). Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography. International Journal of Science and Research (IJSR), 4(4), -. https://europub.co.uk/articles/-A-366393