Design and Analysis of various computations using Elliptic Curve Cryptography (ECC) and Rivest Shamir Adleman (RSA)

Authors

  • Raman Kumar, Sandeep Thakur, Harpreet Kaur Bajaj

Keywords:

Information Security, ECC (Elliptic Curve Cryptography), Authentication and Authorization.

Abstract

Elliptic Curve Cryptography provides high level of security using the concept of number theory. It is specialized field of engineering which deals with the design and development of detailed engineering plan and design which is similar to the other engineering activities but the added advantage is to protect it from misuse. It is more secure as compared to RSA. Such new techniques avoid the various operations related to the sender and receiver. We have discussed Point Addition, Finite Field, Smooth Elliptic Curves are Groups and Trapdoor Function etc. The various notorious attacks are impractical for proposed hypothesis.

Downloads

Download data is not yet available.

References

Kumari, S., Karuppiah, M., Das, A.K. et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74, 6428–6453 (2018). https://doi.org/10.1007/s11227-017-2048-0

Reddy AG, Das AK, Odelu V, Yoo KY. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography. PLoS One. 2016 May 10;11(5):e0154308. doi: 10.1371/journal.pone.0154308. PMID: 27163786; PMCID: PMC4862638.

Chaudhry, S.A., Mahmood, K., Naqvi, H. et al. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography. J Med Syst 39, 175 (2015). https://doi.org/10.1007/s10916-015-0335-y

Chaudhry, S.A., Naqvi, H., Mahmood, K. et al. An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography. Wireless Pers Commun 96, 5355–5373 (2017). https://doi.org/10.1007/s11277-016-3745-3

Alowolodu O D, Alese B K, Adetunmbi A O, Adewale O S and Ogundele O S. Article: Elliptic Curve Cryptography for Securing Cloud Computing Applications. International Journal of Computer Applications 66(23):10-17, March 2013.

Lara-Nino, Carlos & Díaz-Pérez, Arturo & Morales-Sandoval, Miguel. (2018). Elliptic Curve Lightweight Cryptography: A Survey. IEEE Access. PP. 1-1. 10.1109/ACCESS.2018.2881444.

Dindayal Mahto and Dilip Kumar Yadav.International Journal of Network Security, Vol.20, No.4, PP.625-635, July 2018 (DOI: 10.6633/IJNS.201807 20(4).04).

Xueqin Zhang, Baoping Wang, Wenpeng Zhang. International Journal of Network Security, Vol.21, No.2, PP.191-198, Mar. 2019 (DOI: 10.6633/IJNS.201903 21(2).02)

Kumari, S., Karuppiah, M., Das, A.K. et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74, 6428–6453 (2018). https://doi.org/10.1007/s11227-017-2048-0.

Mo, J., Hu, Z. & Lin, Y. Remote user authentication and key agreement for mobile client–server environments on elliptic curve cryptography. J Supercomput 74, 5927–5943 (2018). https://doi.org/10.1007/s11227-018-2507-2.

Raman Kumar, “ANALYSIS AND DESIGN OF PROTOCOL FOR ENHANCED SELFISH ROUTING SCHEME”, Indian Journal of Computer Science and Engineering (IJCSE), ISSN: 0976-5166, Vol. 8, No. 3, pp. 192-200, Jun-Jul 2017. SCOPUS INDEXED: http://www.ijcse.com/docs/INDJCSE17-08-03-018.pdf

Raman Kumar, Gurpreet Singh, “Analysis and design of an optimized secure auditing protocol for storing data dynamically in cloud computing”, Elsevier Materials Today: Proceedings, Volume 5, Issue 1, Part 1, August 2018, Pages 1037-1047, ISSN 2214-7853, SCOPUS and SCI INDEXED. https://doi.org/10.1016/j.matpr.2017.11.180. https://www.sciencedirect.com/science/article/pii/S2214785317324446

Raman Kumar, “Cryptanalytic Performance Appraisal of Improved HLL, KUOCHEN, GENGVRF, FENGVRF Secure Signature with TKIP Digital Workspaces: For Financial Cryptography. Wireless Pers Commun 115, 1541–1563 (2020), ISSN: 0929-6212, SCI INDEXED. https://doi.org/10.1007/s11277-020-07642-2; https://link.springer.com/article/10.1007/s11277-020-07642-2

Amit Verma, Siddharth Dawar, Raman Kumar, Shamkant Navathe and Vikram Goyal, “High utility and diverse itemset mining”,Applied Intelligence, ISSN: 1573-7497, SCOPUS and SCI INDEXED, 10.1007/s10489-020-02063-x, Pages 1-15, 2020. doi:10.1007/s10489-020-02063-x (2021). https://link.springer.com/article/10.1007/s10489-020-02063-x

Madhu and Raman Kumar, “Edge-Based Convolutional Neural Network for Improving Breast Cancer Prediction Performance”, Mathematical Problems in Engineering, ISSN 1563-5147 (Online), Vol. 2021, Article ID 6613671, 15 pages, 2021. SCOPUS and SCI INDEXED https://www.hindawi.com/journals/mpe/2021/6613671/

P. R. Vig and R. Tandon, “Performance Analysis of Elliptic Curve Cryptography on Reconfigurable Hardware,” Lect. Notes Eng. Comput. Sci., vol. 2170, no. 1, pp. 261–264, 2008.

S. Di Matteo, L. Baldanzi, L. Crocetti, P. Nannipieri, L. Fanucci, and S. Saponara, “Secure elliptic curve crypto-processor for real-time iot applications,” Energies, vol. 14, no. 15, 2021, doi: 10.3390/en14154676.

K. Murugan and P. Suresh, “Performance Analysis of RSA and Elliptic Curve Cryptography,” Int. J. Netw. Secur., vol. 20, no. 4, p. 15, 2018, doi: 10.6633/IJNS.201807.

A. V. Lucca, G. A. M. Sborz, V. R. Q. Leithardt, M. Beko, C. A. Zeferino, and W. D. Parreira, “A review of techniques for implementing elliptic curve point multiplication on hardware,” J. Sens. Actuator Networks, vol. 10, no. 1, 2021, doi: 10.3390/jsan10010003.

A. Kardi, R. Zagrouba, and M. Alqahtani, “Performance Evaluation of RSA and Elliptic Curve Cryptography in Wireless Sensor Networks,” 21st Saudi Comput. Soc. Natl. Comput. Conf. NCC 2018, no. May 2020, 2018, doi: 10.1109/NCG.2018.8592963.

M. R. Khan et al., “Analysis of Elliptic Curve Cryptography & RSA,” J. ICT Stand., vol. 11, pp. 355–378, 2023, doi: 10.13052/jicts2245-800x.1142.

F. Maqsood, M. Ahmed, M. Mumtaz, and M. Ali, “Cryptography: A Comparative Analysis for Modern Techniques,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 6, pp. 442–448, 2017, doi: 10.14569/ijacsa.2017.080659.

L. D. Singh and K. M. Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography,” Procedia Comput. Sci., vol. 54, no. 1, pp. 73–82, 2015, doi: 10.1016/j.procs.2015.06.009.

A. M. Abdul-Hadi, Y. abdul-sahib Saif-aldeen, and F. G. Tawfeeq, “Performance Evaluation of Scalar Multiplication in Elliptic Curve Cryptography Implementation using Different Multipliers Over Binary Field GF (2233),” J. Eng., vol. 26, no. 9, pp. 45–64, 2020, doi: 10.31026/j.eng.2020.09.04.

I. Khalid, T. Shah, S. M. Eldin, D. Shah, M. Asif, and I. Saddique, “An Integrated Image Encryption Scheme Based on Elliptic Curve,” IEEE Access, vol. 11, no. December 2022, pp. 5483–5501, 2023, doi: 10.1109/ACCESS.2022.3230096.

K. M. Abirami, R. Srikanth, and R. Kavitha, “INTELLIGENT SYSTEMS AND APPLICATIONS IN Comparative Analysis of Elliptic Curve Cryptography Methods and Survey of Its Applications,” vol. 11, pp. 430–434, 2023.

N. Josias Gbètoho Saho et al., “Comparative Study on the Performance of Elliptic Curve Cryptography Algorithms with Cryptography through RSA Algorithm,” 2020, [Online]. Available: https://hal.science/hal-02926106.

Downloads

Published

12.06.2024

How to Cite

Raman Kumar. (2024). Design and Analysis of various computations using Elliptic Curve Cryptography (ECC) and Rivest Shamir Adleman (RSA). International Journal of Intelligent Systems and Applications in Engineering, 12(4), 2405 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/6648

Issue

Section

Research Article