By Topic

Implementation of text based cryptosystem using Elliptic Curve Cryptography

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Vigila, S. ; Dept. of Inf. Technol., Noorul Islam Coll. of Eng., Kumaracoil, India ; Muneeswaran, K.

Data encryption is widely used to ensure security in open networks such as the internet. With the fast development of cryptography research and computer technology, the capabilities of cryptosystems such as of RSA and Diffie-Hellman are inadequate due the requirement of large number of bits. The cryptosystem based on elliptic curve cryptography (ECC) is becoming the recent trend of public key cryptography. This paper presents the implementation of ECC by first transforming the message into an affine point on the elliptic curve (EC), over the finite field GF(p). In ECC we normally start with an affine point called Pm(x,y) which lies on the elliptic curve. In this paper we illustrate the process of encryption/decryption of a text message . It is almost infeasible to attempt a brute force attack to break the cryptosystem using ECC.

Published in:

Advanced Computing, 2009. ICAC 2009. First International Conference on

Date of Conference:

13-15 Dec. 2009