Volume : IV, Issue : III, March - 2014

Elliptic Curve Cryptosystems

S. Vasundhara

Abstract :

This paper deals with an implementation of Elliptic Curve Cryptosystem. Cryptography (or cryptology) from Greek word kryptos, "hidden, secret"; and graph, "writing" is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, RFID and electronic commerce. Cryptology is prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. The secret key cryptography and public key cryptography are the two main types of cryptography. RSA is the most prominent algorithm used in public key cryptography techniques for encryption and digital signatures. Over the years, the key lengths for RSA have been increasing. This puts considerable burden on RSA. Another public key cryptography technique is gaining popularity in the last few years. It is called as Elliptic Curve Cryptography (ECC). The main difference between RSA and Elliptic Curve Cryptography is that unlike RSA, Elliptic Curve Cryptography offers the same level of security for smaller key sizes. Elliptic Curve Cryptography is highly mathematical in nature. While conventional public–key cryptosystems (RSA, Diffie – Hellman and DSA) operate directly on large integers, an Elliptic Curve Cryptography operates over points on an elliptic curve.

Keywords :

Article: Download PDF   DOI : 10.36106/ijar  

Cite This Article:

S.Vasundhara Elliptic Curve Cryptosystems Indian Journal of Applied Research, Vol.IV, Issue. III


Number of Downloads : 715


References :