Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract : Public key cryptography is typically used in the field of mathematical, which consist of factors decomposition problem of huge numbers and discrete logarithm problem in finite field. For huge numbers in public key cryptography, factors decomposition problems RSA cryptography is generally used, but in the field of hardware and high-performance computing technology RSA has encountered some difficulties. To overcome such type of difficulties the elliptic curve discrete logarithm is introduced, which provides advantages, whose public key is short, network bandwidth is small and ability to defend against to attack is strong. This paper presents the design principles of elliptic curve public key cryptography, Authentication, Encryption and Decryption with shorter key of RSA.

Authors and Affiliations

Shabnoor Qureshi , Prof. Somesh Dewangan

Keywords

Related Articles

 Implementation of Web Based Manufacturing Process Planning Workflow in a Pressure Die Casting Industry

 Abstract : Today’s manufacturing industry requires product data management system (PDM) for efficient product development and production. Manufacturing industries must deal with competition, time to market, reducti...

 A Comparison Based Study on Biometrics for Human  Recognition

 A biometric system provides automatic recognition of an individual based on a unique feature or characteristic possessed by the individual. These biometric characteristic may physiological or behavioral.  Un...

 Survey on Intrusion Detection System in Heterogeneous WSN Using Multipath Routing

[i]In this paper, we propose an survey on heterogeneous wireless sensor network (HWSN) and how the efficiency and redundancy management is exploit in the various methods .Here timeliness and security are main concern to...

 Performance Evaluation of Ipv4, Ipv6 Migration Techniques

 Abstract: The Internet Protocol Version 6 (IPv6) has gained popularity with companies,organizations andInternet service providers (ISPs) due to its enhancements over IPv4 such as (IPv6 128bit compared to ofipv4(32...

 Spam Detection using Natural Language Processing

 Abstract: Spam mails can be referred as unsolicited bulk email. These messages are used to advertise products and services for phishing purposes or to lead recipients to malicious sites with unethical intentions. A...

Download PDF file
  • EP ID EP157837
  • DOI 10.9790/0661-16383135
  • Views 112
  • Downloads 0

How To Cite

Shabnoor Qureshi, Prof. Somesh Dewangan (2014).  Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 31-35. https://europub.co.uk/articles/-A-157837