Transactions on Engineering Technologies 2015
DOI: 10.1007/978-94-017-9804-4_42
|View full text |Cite
|
Sign up to set email alerts
|

Using Elliptic Curve Encryption and Decryption for Securing Audio Messages

Abstract: The security of message transmission is usually a challenge for its participants. Many available programs that work with audio data claim to enable secured communication, but usually do not show the details of the methods used for data encryption. For end users to be confident, it is essential to be aware of the methods and techniques used for data encryption and decryption. Elliptic curve cryptography, an approach to public key cryptography, is now commonly used in cryptosystems. Hence, in this paper we prese… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Multiple encryptions were discussed, the computation overhead in the process was analyzed and the feasibility of the practical application studied. The process of multiple encryption increased security and the scheme is preferable when high security requirements are needed excluding the time constraints [6].…”
Section: Methodsmentioning
confidence: 99%
“…Multiple encryptions were discussed, the computation overhead in the process was analyzed and the feasibility of the practical application studied. The process of multiple encryption increased security and the scheme is preferable when high security requirements are needed excluding the time constraints [6].…”
Section: Methodsmentioning
confidence: 99%
“…4 depicts a curve line to represent the communication process. Comparatively the ECC implementation gives more secured and has light weight data carrying algorithm when compared with the standard encryption algorithm RSA [1], [3], [7]. The ECC is preferred in IoT application environment due to low bandwidth utilization and component specific too.…”
Section: Iot Based Hearing Aidsmentioning
confidence: 99%
“…The security for automated audiometry is performed efficiently with ECC [1]. The security is the challenge in many of the applications.…”
mentioning
confidence: 99%
“…Point Addition If two points on an elliptic curve were added to each other, the output result represents a third point that denotes the intersection of that curve. Graphically, drawing a straight line between any two points on a curve represents a tangent line and reflects a third point around the as denoted in (5). The formula represents the addition operation between points ( ) with ( ) to produce ( ) by applying (3) and (4) [1], [2].…”
Section: A Mathematics Of Ecc Over Finite Fieldmentioning
confidence: 99%
“…Artan Luma, et al [5] in 2015 presented the encryption and decryption for audio file transported through the networkbased on ECC. In this study, the scholars have been concluded that ECC is suitable for large amounts of data and also the ECC is preferred comparing with RSA since it provided the same security with small key size.…”
Section: Related Work IImentioning
confidence: 99%