Implementation of Symmetric Stream Cipher for Text Encryption Using Key Sequence of Cyclic Elliptical Curve Points Based on PRNG
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 3
Abstract
In this paper, cyclic elliptic curves of the form y2 = x 3 + ax + b mod p € E(Fp) with order N is considered in the design of a symmetric key text Encryption Scheme with Key Sequence derived from random sequence of cyclic elliptic Curve points. P with co-ordinates (xP ; yP ) which satisfy the elliptic curve equation is called a point on elliptic curve. Random sequence {ki} of integers is generated using Linear Feedback Shift Register (LFSR) and cubic equation. Every element in key– sequence and character is mapped to {kip} and {AiP}which is a point on cyclic elliptic Curve with co-ordinates say (xi; yi).These sequence find application in Stream cipher system. The encryption procedure and results of this algorithm has been discussed in this paper.
Authors and Affiliations
Karthik G, Rakesh B N, Ganesh Aithal
Content Based Image Retrieval based on Dual Tree Discrete Wavelet Transform
Today in various fields like space research, medicine, cartography and oncology large number of images are available. Searching a relevant image from these database is becoming a tedious process. Content Based Image...
Improving QOS Using Virtual Topology Design for OBS Switching Network
In WDM Networks, OPS and OBS provides efficient communications for many internet applications such as high performance scientific computations, video conferencing by combining hundreds of high speed wavelength channe...
Review on Algorithms and Techniques of Reversible Data Hiding
Nowadays, with the rapid development of information technology more and more images and data are available on the internet..So there is a need to provide some kind of authentication to such important data. With the i...
A Trusted Identity Acknowledgement Protocol for Security Enhancement in MANET
Identifying trusted node for secure communication is a very important point in mobile adhoc network. It makes a node to compromise for a service and causes uncertainty of node behaviour. Computing a node trust and ma...
Survey on Different Data Hiding Techniques
Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important...