Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract : Public key cryptography is typically used in the field of mathematical, which consist of factors decomposition problem of huge numbers and discrete logarithm problem in finite field. For huge numbers in public key cryptography, factors decomposition problems RSA cryptography is generally used, but in the field of hardware and high-performance computing technology RSA has encountered some difficulties. To overcome such type of difficulties the elliptic curve discrete logarithm is introduced, which provides advantages, whose public key is short, network bandwidth is small and ability to defend against to attack is strong. This paper presents the design principles of elliptic curve public key cryptography, Authentication, Encryption and Decryption with shorter key of RSA.
Authors and Affiliations
Shabnoor Qureshi , Prof. Somesh Dewangan
Implementation of Web Based Manufacturing Process Planning Workflow in a Pressure Die Casting Industry
Abstract : Today’s manufacturing industry requires product data management system (PDM) for efficient product development and production. Manufacturing industries must deal with competition, time to market, reducti...
A Comparison Based Study on Biometrics for Human Recognition
A biometric system provides automatic recognition of an individual based on a unique feature or characteristic possessed by the individual. These biometric characteristic may physiological or behavioral. Un...
Survey on Intrusion Detection System in Heterogeneous WSN Using Multipath Routing
[i]In this paper, we propose an survey on heterogeneous wireless sensor network (HWSN) and how the efficiency and redundancy management is exploit in the various methods .Here timeliness and security are main concern to...
Performance Evaluation of Ipv4, Ipv6 Migration Techniques
Abstract: The Internet Protocol Version 6 (IPv6) has gained popularity with companies,organizations andInternet service providers (ISPs) due to its enhancements over IPv4 such as (IPv6 128bit compared to ofipv4(32...
Spam Detection using Natural Language Processing
Abstract: Spam mails can be referred as unsolicited bulk email. These messages are used to advertise products and services for phishing purposes or to lead recipients to malicious sites with unethical intentions. A...