0% found this document useful (0 votes)
106 views6 pages

Elliptic Curve Cryptography An Enhanced Security

This document presents a project that enhances security for real-time communication using ElGamal elliptic curve cryptography. The project is guided by Mr. Balasubramaniam and has three team members: Ashicka S, Sathya R, and SenthilKumar S. It discusses cryptography, the abstract, existing systems, the proposed system, and references. The proposed system modifies the ElGamal Elliptic Curve Cryptosystem to encrypt and decrypt messages by converting characters to hexadecimal ASCII values and transforming them into affine points on an elliptic curve.

Uploaded by

sathya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views6 pages

Elliptic Curve Cryptography An Enhanced Security

This document presents a project that enhances security for real-time communication using ElGamal elliptic curve cryptography. The project is guided by Mr. Balasubramaniam and has three team members: Ashicka S, Sathya R, and SenthilKumar S. It discusses cryptography, the abstract, existing systems, the proposed system, and references. The proposed system modifies the ElGamal Elliptic Curve Cryptosystem to encrypt and decrypt messages by converting characters to hexadecimal ASCII values and transforming them into affine points on an elliptic curve.

Uploaded by

sathya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Enhanced security for real time communication using ElGamal elliptic

curve cryptography

Project Guide

Team members

Mr. Balasubramaniam M.E CSE

Ashicka S

(711612104005)

Assistant Professor

Sathya R

(711612104040)

Department of CSE

SenthilKumar S (711612104041)

CRYPTOGRAPHY

Cryptography is a method of storing and transmitting data in a particular form so


that only those for whom it is intended can read and process it.
Modern cryptography is heavily based on mathematical theory and computer science
practice; Algorithms are hard to break in practice by any adversary.
Asymmetric cryptography or public-key cryptography is cryptography in which a
pair of keys is used to encrypt and decrypt a message so that it arrives securely.
Elliptic curve cryptography (ECC) is an approach to public-key cryptography
based on the algebraic structure of elliptic curves over finite fields

ABSTRACT
Network security is the most prominent feature and it has become an
important need for real time communication
ElGamal elliptic curve cryptography provides to be efficient in terms of
resource-constrained devices
Secure and efficient key authentication is used to enhance authenticity,
integrity, confidentiality for real time communication

EXISTING SYSTEM
New Parallel Approaches for Scalar Multiplication in Elliptic Curve
over Fields of Small Characteristic
This Montgomery-halving can be run in parallel with the original
Montgomery-ladder in order to concurrently compute part of the scalar
multiplication
This project present two point thirding formulas in some subfamilies of
curves, these thirding formulas to implement scalar multiplication through
(Third, Double)-and-add and (Third, Triple)-and-add parallel approaches

PROPOSED SYSTEM
This project modification converts each character of the plaintext message to its
hexadecimal ASCII value of two digits, then separates the value into two values.
After that, the transformation is performed on each value into an affine point on the
Elliptic Curve E
This transformation is used to modify ElGamal Elliptic Curve Cryptosystem
(EGECC) to encrypt/decrypt the message
The reduction of this number is a key point in the transformation of each character
into an affine point on the EC

REFERENCE

Group Key Establishment for Enabling Secure,Multicast Communication


in Wireless Sensor,Networks Deployed for IoT applicationspawani
porambage1, an braeken2, corinna schmitt3,andrei gurtov4, (senior member,
ieee), mika ylianttila1, (senior member, ieee), and burkhard stiller3

An Analysis of RFID Authentication Schemes for Internet of Things in


HealthcareEnvironment Using Elliptic Curve Cryptography,Debiao He and
Sherali Zeadally

Parallel and High-Speed Computations of Elliptic Curve Cryptography


Using Hybrid-Double Multipliers,Reza Azarderakhsh, Member, IEEE, and
Arash Reyhani-Masoleh, Member, IEEE

Modified ElGamal Elliptic Curve Cryptosystem using Hexadecimal


RepresentationSchool of Computer and Communication Engineering, UniMAP
University, Malaysia; [email protected] 2Information System Department,
University of Anbar, Anbar, Iraq

You might also like