Implementation of Symmetric Stream Cipher for Text Encryption Using Key Sequence of Cyclic Elliptical Curve Points Based on PRNG
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 3
Abstract
In this paper, cyclic elliptic curves of the form y2 = x 3 + ax + b mod p € E(Fp) with order N is considered in the design of a symmetric key text Encryption Scheme with Key Sequence derived from random sequence of cyclic elliptic Curve points. P with co-ordinates (xP ; yP ) which satisfy the elliptic curve equation is called a point on elliptic curve. Random sequence {ki} of integers is generated using Linear Feedback Shift Register (LFSR) and cubic equation. Every element in key– sequence and character is mapped to {kip} and {AiP}which is a point on cyclic elliptic Curve with co-ordinates say (xi; yi).These sequence find application in Stream cipher system. The encryption procedure and results of this algorithm has been discussed in this paper.
Authors and Affiliations
Karthik G, Rakesh B N, Ganesh Aithal
Data Identity Provable For Multi Clouds With Freezing Safeguards
A standout amongst the most critical current examinations in the Cloud Computing provisioning is the Service Level Agreement and its application in guaranteeing the supplied distributed computing administrations. The...
Minimizing Packet Delay Rate in Tree based wireless sensor networks
In this advanced and fast world people do not want to wait much for collecting information. Hence now a day’s collecting information in a faster way became a challenge for the researchers. Faster data collection in W...
Traffic Protection against Link and Node Failures Using Fast Re-Route for MPLS Networks
The increase of data transfer over the Internet is complexity process for providing internet services as badly affected the quality of service and the dataflow. To reduce this problem, in this paper I am introducing a...
A Scheme for Authentication with Multiple Levels of Anonymity in Vehicular Communication
Vehicular ad hoc networks (VANETs) have become the area of keen interest for many researchers over the last few years. As vanet have potential technology to enhance active and preventive safety on the road, as well a...
A Survey of Signcryption Its Type and Techniques
Signcryption is a combinational method of performing signatures of the encrypted data so that the data can be made secure and authenticated during the access of the data. Since there are various techniques are implem...