Elliptic Curve Cryptosystem Essay

1624 Words7 Pages

Elliptic Curve Cryptosystem (ECC)
Dr. Jyotsna Kumar Mandal1*, Dr. Arindam Sarkar2, Mr. Avijit Bose3, Sharmistha Halder4
*1Dr. Jyotsna Kumar Mandal
Department of Computer Science and Engineering
University of Kalyani, Kalyani, Nadia
Pin-741235, West Bengal, India
Jkm.cse@gmail.com
2Dr. Arindam Sarkar
Department of Computer Science and Electronics
Ramakrishna Mission Vidyamandira, Belur Math, Howrah
Pin-711202, West Bengal, India arindam.vb@gmail.com 3Mr. Avijit Bose
Department of Computer Science and Engineering
MCKV Institute of Engineering, Liluah, Howrah
Pin-711204, West Bengal, India avi_bose@yahoo.com
4Sharmistha Halder
Department of Computer Science and Engineering
MCKV Institute of Engineering, Liluah, Howrah
Pin-711204, West Bengal, …show more content…

Thus get 16 numbers of 6 bit values (0 to 63), to select 16 bytes from the 64 bytes digest formed in Step 1 where each 6 bit value points one byte from 64 bytes digest. ( Here are allowing same byte to be selected multiple times).
• Step-4: 16 bytes selected from 64 bytes digest forms the session key 1 and next this key is used for AES algorithm applied on the plain-text to form the intermediate cipher.

In Elliptic Curve Cryptosystem, if the session key is generated using the above algorithm, then it will be perform better than other cryptosystem. The session key size may be generated by 10cycles of repetition for 128 bit key size or 12cycles of repetition for 192 bit key size. The session key is changed frequently throughout each session and it will enhance the good security. The session key generation will be integrated into the ECC based system to increase the randomness and robustness of the security.
6. RESULT OF ANALYSIS Figure 6.1 Analysis of Entropy of Proposed ECC …show more content…

[2] Anna M. Johnston, Peter S. Gemmell, “Authentication key exchange provably secure against the man-in-middle attack”, Journal of cryptology (2002) vol. Number 2 pages 139-148.
[3] Antoines Joux, “Aone round protocol for Tripartite Diffie-Hellman”, Journal of cryptology,2004, volume 17, number 4, pages 263-276.
[4] A Srjen K.Lenstra and Eric R. Verheul, “Selecting Cryptographic key size”, Journal of cryptology 2001, volume-14, Number 4. Pages 255-293.
[5] A. Chandrasekhar et.al. “ Some Algebraic Curves in public key cryptosystems” International Journal of Ultra Scientists and physical sciences,2007.
[6] Gura N., Shantz S., Eberle H., et al “ An End-to-end Systems Approach to Elliptic curve cryptography” Sun Microsystems Laboratories, 2002, Retrieved May, 10. http:// research.sun.com / projects/crypto.
[7] Darrel Hankerson, Alfred Menezes, scott Vanstone, “ A Guide to Elliptic Curve cryptography”, Springer, 2004.
[8] Rosing M. “Implementation ECC” Greenwich, CT: manning publications,1999.
[9] Ch. Suneetha, D. Sravana Kumar and A. Chandrasekhar, “Secure key transport in symmetric cryptographic protocols using Elliptic curves over finite fields” International Journal of Computer Applications, vol.36, No.1 November

More about Elliptic Curve Cryptosystem Essay

Open Document