Title :
Implementation of text based cryptosystem using Elliptic Curve Cryptography
Author :
Vigila, S. Maria Celestin ; Muneeswaran, K.
Author_Institution :
Dept. of Inf. Technol., Noorul Islam Coll. of Eng., Kumaracoil, India
Abstract :
Data encryption is widely used to ensure security in open networks such as the internet. With the fast development of cryptography research and computer technology, the capabilities of cryptosystems such as of RSA and Diffie-Hellman are inadequate due the requirement of large number of bits. The cryptosystem based on elliptic curve cryptography (ECC) is becoming the recent trend of public key cryptography. This paper presents the implementation of ECC by first transforming the message into an affine point on the elliptic curve (EC), over the finite field GF(p). In ECC we normally start with an affine point called Pm(x,y) which lies on the elliptic curve. In this paper we illustrate the process of encryption/decryption of a text message . It is almost infeasible to attempt a brute force attack to break the cryptosystem using ECC.
Keywords :
public key cryptography; text analysis; brute force attack; data encryption; elliptic curve cryptography; finite field; public key cryptography; text based cryptosystem; Application software; Control systems; Elliptic curve cryptography; Energy consumption; Humanoid robots; Hydraulic actuators; Induction motors; Legged locomotion; Robot control; Testing; Elliptic Curve (EC); Elliptic Curve Cryptography (ECC); discrete logarithm; public key cryptography;
Conference_Titel :
Advanced Computing, 2009. ICAC 2009. First International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4244-4786-2
Electronic_ISBN :
978-1-4244-4787-9
DOI :
10.1109/ICADVC.2009.5378025