By Topic

Elliptic curve based key generation for symmetric encryption

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Vigila, S.M.C. ; Dept. of Inf. Technol., Noorul Islam Univ., Kumaracoil, India ; Muneeswaran, K.

With the explosion of networks and the huge amount of data transmitted along, securing data content is becoming more and more important. Data encryption is widely used to ensure security in open networks such as the internet. This paper presents the implementation of stream cipher, where the key stream is generated based on the properties of Linear Feedback Shift Register and cyclic Elliptic Curve over a finite prime field. In this paper we illustrate the process of encryption/decryption of an image in spatial domain and also encrypt key file parameters needed for generating the key stream to other parties using Elliptic Curve Cryptography. Therefore the encrypted key file parameters are only transmitted and not the entire full length key. Since Elliptic Curve Cryptography is replacing RSA for key exchange and Elliptic Curve based stream cipher offers a good choice for encryption in real time application. The strength of the proposed cipher lies in the generation of random sequence using Linear Feedback Shift Register over GF(p), difficulty of Elliptic Curve Discrete Logarithmic Problem and the entire key need not be transmitted in the encryption process. This paper also discusses the security aspects of the proposed cipher which is secure against all kinds of attacks.

Published in:

Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011 International Conference on

Date of Conference:

21-22 July 2011