Design and Analysis of various computations using Elliptic Curve Cryptography (ECC) and Rivest Shamir Adleman (RSA)
Keywords:
Information Security, ECC (Elliptic Curve Cryptography), Authentication and Authorization.Abstract
Elliptic Curve Cryptography provides high level of security using the concept of number theory. It is specialized field of engineering which deals with the design and development of detailed engineering plan and design which is similar to the other engineering activities but the added advantage is to protect it from misuse. It is more secure as compared to RSA. Such new techniques avoid the various operations related to the sender and receiver. We have discussed Point Addition, Finite Field, Smooth Elliptic Curves are Groups and Trapdoor Function etc. The various notorious attacks are impractical for proposed hypothesis.
Downloads
References
Kumari, S., Karuppiah, M., Das, A.K. et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74, 6428–6453 (2018). https://doi.org/10.1007/s11227-017-2048-0
Reddy AG, Das AK, Odelu V, Yoo KY. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography. PLoS One. 2016 May 10;11(5):e0154308. doi: 10.1371/journal.pone.0154308. PMID: 27163786; PMCID: PMC4862638.
Chaudhry, S.A., Mahmood, K., Naqvi, H. et al. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography. J Med Syst 39, 175 (2015). https://doi.org/10.1007/s10916-015-0335-y
Chaudhry, S.A., Naqvi, H., Mahmood, K. et al. An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography. Wireless Pers Commun 96, 5355–5373 (2017). https://doi.org/10.1007/s11277-016-3745-3
Alowolodu O D, Alese B K, Adetunmbi A O, Adewale O S and Ogundele O S. Article: Elliptic Curve Cryptography for Securing Cloud Computing Applications. International Journal of Computer Applications 66(23):10-17, March 2013.
Lara-Nino, Carlos & Díaz-Pérez, Arturo & Morales-Sandoval, Miguel. (2018). Elliptic Curve Lightweight Cryptography: A Survey. IEEE Access. PP. 1-1. 10.1109/ACCESS.2018.2881444.
Dindayal Mahto and Dilip Kumar Yadav.International Journal of Network Security, Vol.20, No.4, PP.625-635, July 2018 (DOI: 10.6633/IJNS.201807 20(4).04).
Xueqin Zhang, Baoping Wang, Wenpeng Zhang. International Journal of Network Security, Vol.21, No.2, PP.191-198, Mar. 2019 (DOI: 10.6633/IJNS.201903 21(2).02)
Kumari, S., Karuppiah, M., Das, A.K. et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74, 6428–6453 (2018). https://doi.org/10.1007/s11227-017-2048-0.
Mo, J., Hu, Z. & Lin, Y. Remote user authentication and key agreement for mobile client–server environments on elliptic curve cryptography. J Supercomput 74, 5927–5943 (2018). https://doi.org/10.1007/s11227-018-2507-2.
Raman Kumar, “ANALYSIS AND DESIGN OF PROTOCOL FOR ENHANCED SELFISH ROUTING SCHEME”, Indian Journal of Computer Science and Engineering (IJCSE), ISSN: 0976-5166, Vol. 8, No. 3, pp. 192-200, Jun-Jul 2017. SCOPUS INDEXED: http://www.ijcse.com/docs/INDJCSE17-08-03-018.pdf
Raman Kumar, Gurpreet Singh, “Analysis and design of an optimized secure auditing protocol for storing data dynamically in cloud computing”, Elsevier Materials Today: Proceedings, Volume 5, Issue 1, Part 1, August 2018, Pages 1037-1047, ISSN 2214-7853, SCOPUS and SCI INDEXED. https://doi.org/10.1016/j.matpr.2017.11.180. https://www.sciencedirect.com/science/article/pii/S2214785317324446
Raman Kumar, “Cryptanalytic Performance Appraisal of Improved HLL, KUOCHEN, GENGVRF, FENGVRF Secure Signature with TKIP Digital Workspaces: For Financial Cryptography. Wireless Pers Commun 115, 1541–1563 (2020), ISSN: 0929-6212, SCI INDEXED. https://doi.org/10.1007/s11277-020-07642-2; https://link.springer.com/article/10.1007/s11277-020-07642-2
Amit Verma, Siddharth Dawar, Raman Kumar, Shamkant Navathe and Vikram Goyal, “High utility and diverse itemset mining”,Applied Intelligence, ISSN: 1573-7497, SCOPUS and SCI INDEXED, 10.1007/s10489-020-02063-x, Pages 1-15, 2020. doi:10.1007/s10489-020-02063-x (2021). https://link.springer.com/article/10.1007/s10489-020-02063-x
Madhu and Raman Kumar, “Edge-Based Convolutional Neural Network for Improving Breast Cancer Prediction Performance”, Mathematical Problems in Engineering, ISSN 1563-5147 (Online), Vol. 2021, Article ID 6613671, 15 pages, 2021. SCOPUS and SCI INDEXED https://www.hindawi.com/journals/mpe/2021/6613671/
P. R. Vig and R. Tandon, “Performance Analysis of Elliptic Curve Cryptography on Reconfigurable Hardware,” Lect. Notes Eng. Comput. Sci., vol. 2170, no. 1, pp. 261–264, 2008.
S. Di Matteo, L. Baldanzi, L. Crocetti, P. Nannipieri, L. Fanucci, and S. Saponara, “Secure elliptic curve crypto-processor for real-time iot applications,” Energies, vol. 14, no. 15, 2021, doi: 10.3390/en14154676.
K. Murugan and P. Suresh, “Performance Analysis of RSA and Elliptic Curve Cryptography,” Int. J. Netw. Secur., vol. 20, no. 4, p. 15, 2018, doi: 10.6633/IJNS.201807.
A. V. Lucca, G. A. M. Sborz, V. R. Q. Leithardt, M. Beko, C. A. Zeferino, and W. D. Parreira, “A review of techniques for implementing elliptic curve point multiplication on hardware,” J. Sens. Actuator Networks, vol. 10, no. 1, 2021, doi: 10.3390/jsan10010003.
A. Kardi, R. Zagrouba, and M. Alqahtani, “Performance Evaluation of RSA and Elliptic Curve Cryptography in Wireless Sensor Networks,” 21st Saudi Comput. Soc. Natl. Comput. Conf. NCC 2018, no. May 2020, 2018, doi: 10.1109/NCG.2018.8592963.
M. R. Khan et al., “Analysis of Elliptic Curve Cryptography & RSA,” J. ICT Stand., vol. 11, pp. 355–378, 2023, doi: 10.13052/jicts2245-800x.1142.
F. Maqsood, M. Ahmed, M. Mumtaz, and M. Ali, “Cryptography: A Comparative Analysis for Modern Techniques,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 6, pp. 442–448, 2017, doi: 10.14569/ijacsa.2017.080659.
L. D. Singh and K. M. Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography,” Procedia Comput. Sci., vol. 54, no. 1, pp. 73–82, 2015, doi: 10.1016/j.procs.2015.06.009.
A. M. Abdul-Hadi, Y. abdul-sahib Saif-aldeen, and F. G. Tawfeeq, “Performance Evaluation of Scalar Multiplication in Elliptic Curve Cryptography Implementation using Different Multipliers Over Binary Field GF (2233),” J. Eng., vol. 26, no. 9, pp. 45–64, 2020, doi: 10.31026/j.eng.2020.09.04.
I. Khalid, T. Shah, S. M. Eldin, D. Shah, M. Asif, and I. Saddique, “An Integrated Image Encryption Scheme Based on Elliptic Curve,” IEEE Access, vol. 11, no. December 2022, pp. 5483–5501, 2023, doi: 10.1109/ACCESS.2022.3230096.
K. M. Abirami, R. Srikanth, and R. Kavitha, “INTELLIGENT SYSTEMS AND APPLICATIONS IN Comparative Analysis of Elliptic Curve Cryptography Methods and Survey of Its Applications,” vol. 11, pp. 430–434, 2023.
N. Josias Gbètoho Saho et al., “Comparative Study on the Performance of Elliptic Curve Cryptography Algorithms with Cryptography through RSA Algorithm,” 2020, [Online]. Available: https://hal.science/hal-02926106.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.