2018
DOI: 10.14569/ijacsa.2018.090516
|View full text |Cite
|
Sign up to set email alerts
|

Security Improvement in Elliptic Curve Cryptography

Abstract: This paper proposed different approaches to enhance the performance of the Elliptic Curve Cryptography (ECC) algorithm. ECC is vulnerable to attacks by exploiting the public parameters of ECC to solve Discrete Logarithm Problem (DLP). Therefore, these public parameters should be selected safely to obviate all recognized attacks. This paper presents a new generator function to produce the domain parameters for creating the elliptic curve; a secure mechanism is used in the proposed function to avoid all possible… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…The elliptic curve equation used was y 2 = x 3 + x + 1 mod 277. That is E 277 (1,1). Generated all the points of the elliptic curve using the conventional elliptic curve arithmetic, and created a mapping table for encryption/decryption operation.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The elliptic curve equation used was y 2 = x 3 + x + 1 mod 277. That is E 277 (1,1). Generated all the points of the elliptic curve using the conventional elliptic curve arithmetic, and created a mapping table for encryption/decryption operation.…”
Section: Methodsmentioning
confidence: 99%
“…Decryption is the opposite of encryption, which is the conversion of an encrypted file into its original format. Elliptic Curve Cryptography (ECC) is a public key cryptography that uses two set of keys for its operation, a private key and a public key [1]. The private key is usually an integer while the public key is usually a point on the elliptic curve.…”
Section: Introductionmentioning
confidence: 99%
“…Elliptic curves have been studied by a number theorists for about a century, not for applications in mathematics or computing science, but because of their intrinsic mathematical beauty and interest [12,13]. An elliptic curve over a prime field is defined by ( ) Where the elliptic curve group consists of all points that satisfy the elliptic curve [7].…”
Section: Elliptic Curves Cryptosystemmentioning
confidence: 99%
“…The crucial advantage associated with mapping points to an elliptic curve stems from an exploitation of the elliptic curve discrete logarithm problem (ECDLP) [17], which constitutes the base of ECC. However, if a message M, encrypted using ECC, did not map to an elliptic curve (i.e., the x value of M has no corresponding y), then it is necessary to increment x and recalculate until y is found [18][19][20]. However, the increment to x changes M, thereby resulting in the wrong decoding phase for the retrieval of M. Thus, to secure messages in the encoding and decoding phases, certain bits should be concatenated to mapping points to avoid changing the original message.…”
Section: Introductionmentioning
confidence: 99%