SlideShare a Scribd company logo
© 2016, IJCERT All Rights Reserved Page |222
International Journal of Computer Engineering In Research Trends
Volume 3, Issue 5, May-2016, pp. 222-225 ISSN (O): 2349-7084
Data Security Using Elliptic Curve
Cryptography
Karishma Bhirud, Dipashree Kulkarni, Renuka Pawar, Prachi Patil.
Abstract:- Cryptography technique is used to provide data security. In existing cryptography technique the key
generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then
security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a
algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The
ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place
through curve. In the proposed system the encryption and key generation process takes place rapidly.
Keywords – Curve Cryptography, shared key, encryption, decryption.
——————————  ——————————
1. INTRODUCTION
The Cryptography is a technique which provides
security to data. In cryptography all the data is
presented in the encrypted form and only authorized
user can decrypt information.The main goals of
cryptography are to maintain data confidentiality,
integrity, availability, centralized data collection to
provide data authenticity in the digital world that
provide high security to database. Plaintext is a term
used in cryptography that refers to a message before
encryption or after decryption. That is, it is a dispatch
in a form that is easily readable by humans. Cipher text
is also known as encrypted or encoded data because it
contains a form of the unique plaintext that is
unreadable by a human or computer without the
proper cipher to decrypt it. A cryptographic key is a
string of bits used by a cryptographic algorithm to
transform plain text into cipher text or vice versa.
In cryptography Elliptic Curve Cryptography
(ECC) is one of the effective cryptography algorithm
which was discovered in 1985 by Neil Koblitz and
Victor Miller. Elliptic Curve Cryptographic (ECC) are
Public-key mechanisms that provide the same
functionality as Rivest-Shamir-Adlemon algorithm.
Most of the standards that use public-key
cryptography for encryption based on RSA algorithm.
Their security is based on the hardness of a different
problems. The competing algorithm to RSA [1] is
elliptic curve cryptography over finite fields.
2. RELATED WORK
In last twenty years, elliptic curve cryptography has
been thoroughly researched. The actual application of
elliptic curve cryptography and the practical execution
of cryptosystem primitives in the real world constitute
interdisciplinary research in computer science as well
as in electrical engineering. Elliptic curve
cryptography has moved to a cutting edge technology
adopted by an increasing number of organizations.
There are two reasons for this new development. One
is that ECC has survived a generation of attacks.
Second, in the growing industries, its advantages over
RSA have made it an attractive security alternative.
Elliptic curve cryptography is not only emerged as an
attractive public key cryptosystem for mobile or
wireless environments but also provides bandwidth
savings. ECC has a high level of security which can be
achieved with high considerably shorter keys than
other conventional public key cryptography. ECC has
a advantage that it helps to establish equivalent
security with lower calculating power and battery
resource usage for mobile applications. The strength of
encryption depends on its key and the alphabetical
table. As much as the key size is affecting the execution
time, it should be preserved to be as short as possible
Available online at: www.ijcert.org
Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 5, 2016, pp. 222-225
© 2016, IJCERT All Rights Reserved Page |223
for an acceptable security requirement. There will be
no impact on strength and runtime performance. ECC
provides an excellent solution of data and secure
transfer of keys between two communicating parties
[2]. An elliptic curve cryptography based
communication system, where the various characters
can be symbolized as the co-ordinates of the elliptic
curves, can also be generated [3]. ECC structure is a
group structure based on non-singular curve having
finite number of integer points with each of this point
having a finite order. A novel idea of ECC encryption
and decryption based on Knapsack also shows on how
the elliptic curves technology can be used for
encryption and decryption [4].
Fig.6 System architecture
3. PROPOSED SYSTEM
A general Elliptic Curve equation takes the general
form:
y² = x³+ ax + b…………………… (1)
(x, y) = co-ordinates on the Elliptic curve
a, b = coefficients.
Though ,for fixed fields a improved equation is used
[5]:
y² mod q = (x³ +ax + b) mod q……….. (2)
Where q = prime number for which the Elliptic curve
be defined a, b satisfy the equation [2]
(4a³ + 27b³ ) mod q ≠ 0 mod q……….. (3)
An elliptic curve E over GF (q) consist of the answers
(x, y) distinct by (1) and (2), along with an
supplementary element called 0, which is the point of
EC at perpetuity. The set of points (x, y) are said to be
affine synchronize point demonstration. The basic
actions on elliptic curves are calculation and
replication. A scalar reproduction with a point can be
denoted as a combination of calculation operations.
Say, given a point P ( x, y) is to be multiplied k times,
say k = 37.
Thus we have to compute 37P.
In terms of addition it can be represented as
37P = P + P + P +… + P (37 times)
For addition of two points P(x1, y1) & Q(x2,
y2) where P≠Q.
3.1. SYSTEM ARCHITECTURE
Fig 1 shows the architecture of the system. System
architecture describes the various modules present in
paper which are interrelated to each other. The
previously implemented some algorithm like RSA,
Diffie Hellman has drawbacks which could slow down
the key generation and encryption process. So elliptic
curve cryptography algorithm is effective to increase
the speed of key generation and encryption process.
Encryption is done by the administrator by using
public key of user. Then decryption takes place by user
by using private key. As each user has its separate
private key so no other user can access the information.
If Administrator and user want to encrypt and decrypt
the messages then they agree upon to use an elliptic
curve Ep (a,b) where p is a prime number and a
random point C on the elliptic curve. User selects a
random number and a point A on the elliptic curve.
User computes A1 = a (C +A) and A2 = a A. User keeps
the random number a and the point A as her private
keys and distributes A1 and A 2 as her general public
keys.
Following keys are required for ECC:
Step 1.
User’s private key 1 = a, a random number less
than the order of the generator.
Step 2.
Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 5, 2016, pp. 222-225
© 2016, IJCERT All Rights Reserved Page |224
User’s private key 2 = a point A on the elliptic
curve Ep (a,b).
Step 3.
User’s general public key 1 = a point A1 on the
elliptic curve Ep (a,b).
Step 4.
User’s general public key 2 = a point A2 on the
elliptic curve Ep (a,b).
Step 5.
User’s specific public key for administrator = a
point AB on the elliptic curve Ep(a,b).
If administrator wants to encrypt the message M
then all the characters of the dispatch are coded to
the points on the elliptic curve using the code table
which is agreed upon by the administrator and
student. Then each message point is encrypted to a
pair of cipher points E1,E2 .[6]
Administrator uses a random
number r.
E1 = r C
E2 = M + (b + r) A 1 – r A 2 + AB
After encrypting all the characters of the message
administrator converts the pair of points of each
message point into the text characters using the
code table. Then administrator encrypts the plain
text.
After encrypting the cipher text, User
converts the cipher text into the points on the
elliptic curve and identifies the points E1 and E2 of
each character. Then decrypts the message as
follows.
M = E2 – ( a E1 + a B 1 + B A)
Hence, User can view this decrypted data as he wants.
3.2. ALGORITHM OF ECC:
1. Start
2: user perform the registration
3. User enter private key1 and private
key2(x,y).
4. User calculate the public key,
Calculates s
s=(3(x)^2+a)/2y x2=s^2-2x y2=s(x-x2)-y
5. User broadcast public key
(X2,Y2)
6. Admin performs encryption
6.1. Calculate 1G to 5G for each character
6.2. Retrieve matched G from generated
table
6.3. Calculate G of that character which
admin wants to encrypt and store cipher
text.
7. User performs decryption
7.1. Calculate 1G to 5G of each character.
7.2. Retrieve matched G from generated
table and stores the plain text.
8. Stop.
4. RESULT:
RSA key generation is expressively slower than ECC
key generation for RSA key of sizes 1024 bits which is
greater than key size of ECC. RSA has more
computational overheads than ECC because in RSA
algorithm, users have to choose particular prime
number for calculation of key generation. As the key
size of ECC is smaller than the key size of RSA so,
encryption of Elliptic curve cryptography is much
faster than RSA. ECC is more efficient for small
devices. If ECC algorithm is used for communication
purpose then it offers good bandwidth than RSA.
Table 1. Comparison of ECC and RSA
Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 5, 2016, pp. 222-225
© 2016, IJCERT All Rights Reserved Page |225
Parameters ECC RSA
Computational Roughly 10 More than
overheads times than that ECC.
of RSA can be
Saved.
Key sizes System System
parameters and parameters and
key pairs are key pairs are
shorter for the longer for the
ECC RSA
Key generation Faster Slower
Encryption Much faster Have good
Than RSA. speed but
slower than
ECC.
Small devices Much more Less efficient
efficiency Efficient. Than ECC.
5. CONCLUSION
In this paper, Data security is important issue in day
to day life. The elliptic curve cryptography is one of
the useful techniques to hide the data or information
so that data must be access by authorized user. In this
technique all the calculations are takes place by
considering the points on the elliptic curve. The
encryption and key generation process is faster.
Wireless devices are speedily becoming more reliant
on safety features such as the ability to do secure
email, confident Web browsing, and cybernetic
private networking to commercial networks and ECC
allows more efficient implementation of all of these
features. ECC make available better security and
more efficient performance than the first generation
public key techniques.
REFERENCES
[1]. J.Edge, An introduction to elliptic curve
cryptography, http://lwn.net/Articles/174127/,
2006.
[2]. Ch. Suneetha, D. Sravana Kumar and A.
Chandrasekhar, “Secure key transport in symmetric
cryptographic protocols using elliptic curves over finite
fields”, International Journal of Computer.
[3]. R. Rajaram Ramasamy, M. Amutha Prabakar, M.
Indra Devi and M.Suguna, ―Knapsack based ECC
encryption and decryption‖, International Journal of
Network Security, Vol. 9, No. 3, PP. 218-226,Nov.
2009.
[4]. D.Sravana Kumar, CH. Suneetha and A.
Chandrasekhar, Encryption of data using Elliptic
Curve over Finite Fieldǁ, IJDPS, Vol. 3, No. 1, 2012.
[5]. Nautiyal et al., International Journal of Advanced
Research in Computer Science and Software
Engineering 4(1), January - 2014, pp. 620-625
[6]. Alfred J. Menezes and Scott A. Vanstone, “Elliptic
Curve Cryptosystems and their implementations”,
Journal of Cryptology, 1993, Volume-6, Number-4,
pages 209-224.
[7]. Krithika K Annapoorna Shetty, Shravya Shetty K.
A review on asymmetric cryptography RSA and
elgamal algorithm. International Journal of
Innovative Research in Computer and
Communication Engineering, 2014.
[8]. Richard Helm Erich Gamma. Design patterns:
Elements of reusable object oriented software.
communication Engineering, 2015.
[9]. James Rumbaugh Grady Booch, Ivar Jacobson.
Eleptic curve cryptography,2nd edition. Computer
Engineering, 2004.
[10]. Kistin Lauter. The advantage of eleptic curve
cryptography for wireless security. IEEE wireless
Communication, 2004

More Related Content

PPTX
Improved security system using steganography and elliptic curve crypto...
PDF
Elliptic Curve Cryptography
PPT
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
PDF
Elliptic curve cryptography
PPT
1524 elliptic curve cryptography
PDF
Elliptic Curve Cryptography and Zero Knowledge Proof
PPTX
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Improved security system using steganography and elliptic curve crypto...
Elliptic Curve Cryptography
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curve cryptography
1524 elliptic curve cryptography
Elliptic Curve Cryptography and Zero Knowledge Proof
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems

What's hot (19)

PDF
Low Power FPGA Based Elliptical Curve Cryptography
PDF
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
PDF
IntrRSCode
DOC
Rsa Algorithm
PPTX
The RSA Algorithm
PPTX
RSA-W7(rsa) d1-d2
PDF
An Introduction to ECDSA and it's use in Bitcoin (1)
PDF
Error control coding bch, reed-solomon etc..
PDF
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
PDF
Ntewrok secuirty cs7
DOCX
Number Theory In Cryptography
PPT
Signyourd digital signature certificate provider
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
PDF
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
PPTX
Al-Gamal-W6(al gamal)-d1-d2
PDF
Elliptic curve scalar multiplier using karatsuba
PDF
Network Security CS3-4
PDF
Digi qestions
Low Power FPGA Based Elliptical Curve Cryptography
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
IntrRSCode
Rsa Algorithm
The RSA Algorithm
RSA-W7(rsa) d1-d2
An Introduction to ECDSA and it's use in Bitcoin (1)
Error control coding bch, reed-solomon etc..
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ntewrok secuirty cs7
Number Theory In Cryptography
Signyourd digital signature certificate provider
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Al-Gamal-W6(al gamal)-d1-d2
Elliptic curve scalar multiplier using karatsuba
Network Security CS3-4
Digi qestions
Ad

Viewers also liked (20)

PDF
Elliptic Curves and Elliptic Curve Cryptography
ODP
JBUG Netherlands Openshift Primer
PDF
Internet de las cosas y protección de los consumidores orientada a procesos M2M
PDF
Sử dụng windows XP
PDF
Curso Preparación Física Pádel
PDF
Emmies 2013 - GroupM Monthly Digital Challenge
PPTX
Jocīgās dzejas dienas jeb kā Filips Sestais kļuva par lasītāju
PDF
Myanmar Business Today - Vol 2, Issue 16
PDF
Matriculacions i transferències 1r trimestre 2012. GREMI DEL MOTOR
PPTX
How to create and copy a email list in general selection
PDF
RDFS with Attribute Equations via SPARQL Rewriting
PDF
M.G.Goman, A.V.Khramtsovsky (1993) - KRIT User Guide
PPT
BDO ITSMF 2007
PPSX
TIC para Estudiantes con Necesidades Especiales.
PPT
Renacimientoquattrocenttoarquitectura
PPT
Surfdog Action Sports
PDF
MailUp - Sistema Professionale di Email Marketing via web
PPTX
La Biblioteca se abre a la sociedad
PDF
Bodas de sangre_primer_y_segundo_curso_de_la_e.s.o
PDF
La importancia de fomentar Resiliencia
Elliptic Curves and Elliptic Curve Cryptography
JBUG Netherlands Openshift Primer
Internet de las cosas y protección de los consumidores orientada a procesos M2M
Sử dụng windows XP
Curso Preparación Física Pádel
Emmies 2013 - GroupM Monthly Digital Challenge
Jocīgās dzejas dienas jeb kā Filips Sestais kļuva par lasītāju
Myanmar Business Today - Vol 2, Issue 16
Matriculacions i transferències 1r trimestre 2012. GREMI DEL MOTOR
How to create and copy a email list in general selection
RDFS with Attribute Equations via SPARQL Rewriting
M.G.Goman, A.V.Khramtsovsky (1993) - KRIT User Guide
BDO ITSMF 2007
TIC para Estudiantes con Necesidades Especiales.
Renacimientoquattrocenttoarquitectura
Surfdog Action Sports
MailUp - Sistema Professionale di Email Marketing via web
La Biblioteca se abre a la sociedad
Bodas de sangre_primer_y_segundo_curso_de_la_e.s.o
La importancia de fomentar Resiliencia
Ad

Similar to Data Security Using Elliptic Curve Cryptography (20)

PDF
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
PDF
C0281010016
PDF
Implementation Secure Authentication Using Elliptic Curve Cryptography
PDF
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
PDF
Multiple Encryption using ECC and Its Time Complexity Analysis
PDF
Secure Data Storage on Cloud System for Privacy Preserving
PDF
Improved authenticated elliptic curve cryptography scheme for resource starve...
PDF
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
PDF
Implementation of ECC and ECDSA for Image Security
PDF
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
PDF
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
PDF
Efficient ECC encryption for WSN’s
PDF
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
PDF
G05124550
PDF
Ecc cipher processor based on knapsack algorithm
PDF
New Technique Using Multiple Symmetric keys for Multilevel Encryption
PDF
D018141922
PDF
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
PDF
Biomedical image transmission based on Modified feistal algorithm
PPT
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
C0281010016
Implementation Secure Authentication Using Elliptic Curve Cryptography
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Multiple Encryption using ECC and Its Time Complexity Analysis
Secure Data Storage on Cloud System for Privacy Preserving
Improved authenticated elliptic curve cryptography scheme for resource starve...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
Implementation of ECC and ECDSA for Image Security
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
Efficient ECC encryption for WSN’s
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
G05124550
Ecc cipher processor based on knapsack algorithm
New Technique Using Multiple Symmetric keys for Multilevel Encryption
D018141922
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Biomedical image transmission based on Modified feistal algorithm
Improved authentication & key agreement protocol using elliptic curve cryptog...
 

More from IJCERT (20)

PDF
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
PDF
Robust Resource Allocation in Relay Node Networks for Optimization Process
PDF
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
PDF
A Survey on: Sound Source Separation Methods
PDF
An Image representation using Compressive Sensing and Arithmetic Coding
PDF
Hard starting every initial stage: Study on Less Engine Pulling Power
PDF
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
PDF
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
PDF
GSM Based Device Controlling and Fault Detection
PDF
Efficient Multi Server Authentication and Hybrid Authentication Method
PDF
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
PDF
Online Payment System using Steganography and Visual Cryptography
PDF
Prevention of Packet Hiding Methods In Selective Jamming Attack
PDF
AUTOMATIC SPEECH RECOGNITION- A SURVEY
PDF
Implementation of Motion Model Using Vanet
PDF
Intelligent Device TO Device Communication Using IoT
PDF
Secure Routing for MANET in Adversarial Environment
PDF
Real Time Detection System of Driver Fatigue
PDF
A Survey on Web Page Recommendation and Data Preprocessing
PDF
IJCERT JOURNAL PUBLICATIONS HOUSE
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Robust Resource Allocation in Relay Node Networks for Optimization Process
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
A Survey on: Sound Source Separation Methods
An Image representation using Compressive Sensing and Arithmetic Coding
Hard starting every initial stage: Study on Less Engine Pulling Power
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
GSM Based Device Controlling and Fault Detection
Efficient Multi Server Authentication and Hybrid Authentication Method
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Online Payment System using Steganography and Visual Cryptography
Prevention of Packet Hiding Methods In Selective Jamming Attack
AUTOMATIC SPEECH RECOGNITION- A SURVEY
Implementation of Motion Model Using Vanet
Intelligent Device TO Device Communication Using IoT
Secure Routing for MANET in Adversarial Environment
Real Time Detection System of Driver Fatigue
A Survey on Web Page Recommendation and Data Preprocessing
IJCERT JOURNAL PUBLICATIONS HOUSE

Recently uploaded (20)

PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
Geodesy 1.pptx...............................................
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Sustainable Sites - Green Building Construction
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
composite construction of structures.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Current and future trends in Computer Vision.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
PPT on Performance Review to get promotions
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
Embodied AI: Ushering in the Next Era of Intelligent Systems
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Geodesy 1.pptx...............................................
Internet of Things (IOT) - A guide to understanding
bas. eng. economics group 4 presentation 1.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Sustainable Sites - Green Building Construction
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
composite construction of structures.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Current and future trends in Computer Vision.pptx
R24 SURVEYING LAB MANUAL for civil enggi
PPT on Performance Review to get promotions
additive manufacturing of ss316l using mig welding
Safety Seminar civil to be ensured for safe working.
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
CYBER-CRIMES AND SECURITY A guide to understanding

Data Security Using Elliptic Curve Cryptography

  • 1. © 2016, IJCERT All Rights Reserved Page |222 International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, May-2016, pp. 222-225 ISSN (O): 2349-7084 Data Security Using Elliptic Curve Cryptography Karishma Bhirud, Dipashree Kulkarni, Renuka Pawar, Prachi Patil. Abstract:- Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly. Keywords – Curve Cryptography, shared key, encryption, decryption. ——————————  —————————— 1. INTRODUCTION The Cryptography is a technique which provides security to data. In cryptography all the data is presented in the encrypted form and only authorized user can decrypt information.The main goals of cryptography are to maintain data confidentiality, integrity, availability, centralized data collection to provide data authenticity in the digital world that provide high security to database. Plaintext is a term used in cryptography that refers to a message before encryption or after decryption. That is, it is a dispatch in a form that is easily readable by humans. Cipher text is also known as encrypted or encoded data because it contains a form of the unique plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. A cryptographic key is a string of bits used by a cryptographic algorithm to transform plain text into cipher text or vice versa. In cryptography Elliptic Curve Cryptography (ECC) is one of the effective cryptography algorithm which was discovered in 1985 by Neil Koblitz and Victor Miller. Elliptic Curve Cryptographic (ECC) are Public-key mechanisms that provide the same functionality as Rivest-Shamir-Adlemon algorithm. Most of the standards that use public-key cryptography for encryption based on RSA algorithm. Their security is based on the hardness of a different problems. The competing algorithm to RSA [1] is elliptic curve cryptography over finite fields. 2. RELATED WORK In last twenty years, elliptic curve cryptography has been thoroughly researched. The actual application of elliptic curve cryptography and the practical execution of cryptosystem primitives in the real world constitute interdisciplinary research in computer science as well as in electrical engineering. Elliptic curve cryptography has moved to a cutting edge technology adopted by an increasing number of organizations. There are two reasons for this new development. One is that ECC has survived a generation of attacks. Second, in the growing industries, its advantages over RSA have made it an attractive security alternative. Elliptic curve cryptography is not only emerged as an attractive public key cryptosystem for mobile or wireless environments but also provides bandwidth savings. ECC has a high level of security which can be achieved with high considerably shorter keys than other conventional public key cryptography. ECC has a advantage that it helps to establish equivalent security with lower calculating power and battery resource usage for mobile applications. The strength of encryption depends on its key and the alphabetical table. As much as the key size is affecting the execution time, it should be preserved to be as short as possible Available online at: www.ijcert.org
  • 2. Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, 2016, pp. 222-225 © 2016, IJCERT All Rights Reserved Page |223 for an acceptable security requirement. There will be no impact on strength and runtime performance. ECC provides an excellent solution of data and secure transfer of keys between two communicating parties [2]. An elliptic curve cryptography based communication system, where the various characters can be symbolized as the co-ordinates of the elliptic curves, can also be generated [3]. ECC structure is a group structure based on non-singular curve having finite number of integer points with each of this point having a finite order. A novel idea of ECC encryption and decryption based on Knapsack also shows on how the elliptic curves technology can be used for encryption and decryption [4]. Fig.6 System architecture 3. PROPOSED SYSTEM A general Elliptic Curve equation takes the general form: y² = x³+ ax + b…………………… (1) (x, y) = co-ordinates on the Elliptic curve a, b = coefficients. Though ,for fixed fields a improved equation is used [5]: y² mod q = (x³ +ax + b) mod q……….. (2) Where q = prime number for which the Elliptic curve be defined a, b satisfy the equation [2] (4a³ + 27b³ ) mod q ≠ 0 mod q……….. (3) An elliptic curve E over GF (q) consist of the answers (x, y) distinct by (1) and (2), along with an supplementary element called 0, which is the point of EC at perpetuity. The set of points (x, y) are said to be affine synchronize point demonstration. The basic actions on elliptic curves are calculation and replication. A scalar reproduction with a point can be denoted as a combination of calculation operations. Say, given a point P ( x, y) is to be multiplied k times, say k = 37. Thus we have to compute 37P. In terms of addition it can be represented as 37P = P + P + P +… + P (37 times) For addition of two points P(x1, y1) & Q(x2, y2) where P≠Q. 3.1. SYSTEM ARCHITECTURE Fig 1 shows the architecture of the system. System architecture describes the various modules present in paper which are interrelated to each other. The previously implemented some algorithm like RSA, Diffie Hellman has drawbacks which could slow down the key generation and encryption process. So elliptic curve cryptography algorithm is effective to increase the speed of key generation and encryption process. Encryption is done by the administrator by using public key of user. Then decryption takes place by user by using private key. As each user has its separate private key so no other user can access the information. If Administrator and user want to encrypt and decrypt the messages then they agree upon to use an elliptic curve Ep (a,b) where p is a prime number and a random point C on the elliptic curve. User selects a random number and a point A on the elliptic curve. User computes A1 = a (C +A) and A2 = a A. User keeps the random number a and the point A as her private keys and distributes A1 and A 2 as her general public keys. Following keys are required for ECC: Step 1. User’s private key 1 = a, a random number less than the order of the generator. Step 2.
  • 3. Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, 2016, pp. 222-225 © 2016, IJCERT All Rights Reserved Page |224 User’s private key 2 = a point A on the elliptic curve Ep (a,b). Step 3. User’s general public key 1 = a point A1 on the elliptic curve Ep (a,b). Step 4. User’s general public key 2 = a point A2 on the elliptic curve Ep (a,b). Step 5. User’s specific public key for administrator = a point AB on the elliptic curve Ep(a,b). If administrator wants to encrypt the message M then all the characters of the dispatch are coded to the points on the elliptic curve using the code table which is agreed upon by the administrator and student. Then each message point is encrypted to a pair of cipher points E1,E2 .[6] Administrator uses a random number r. E1 = r C E2 = M + (b + r) A 1 – r A 2 + AB After encrypting all the characters of the message administrator converts the pair of points of each message point into the text characters using the code table. Then administrator encrypts the plain text. After encrypting the cipher text, User converts the cipher text into the points on the elliptic curve and identifies the points E1 and E2 of each character. Then decrypts the message as follows. M = E2 – ( a E1 + a B 1 + B A) Hence, User can view this decrypted data as he wants. 3.2. ALGORITHM OF ECC: 1. Start 2: user perform the registration 3. User enter private key1 and private key2(x,y). 4. User calculate the public key, Calculates s s=(3(x)^2+a)/2y x2=s^2-2x y2=s(x-x2)-y 5. User broadcast public key (X2,Y2) 6. Admin performs encryption 6.1. Calculate 1G to 5G for each character 6.2. Retrieve matched G from generated table 6.3. Calculate G of that character which admin wants to encrypt and store cipher text. 7. User performs decryption 7.1. Calculate 1G to 5G of each character. 7.2. Retrieve matched G from generated table and stores the plain text. 8. Stop. 4. RESULT: RSA key generation is expressively slower than ECC key generation for RSA key of sizes 1024 bits which is greater than key size of ECC. RSA has more computational overheads than ECC because in RSA algorithm, users have to choose particular prime number for calculation of key generation. As the key size of ECC is smaller than the key size of RSA so, encryption of Elliptic curve cryptography is much faster than RSA. ECC is more efficient for small devices. If ECC algorithm is used for communication purpose then it offers good bandwidth than RSA. Table 1. Comparison of ECC and RSA
  • 4. Karishma Bhirud et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 5, 2016, pp. 222-225 © 2016, IJCERT All Rights Reserved Page |225 Parameters ECC RSA Computational Roughly 10 More than overheads times than that ECC. of RSA can be Saved. Key sizes System System parameters and parameters and key pairs are key pairs are shorter for the longer for the ECC RSA Key generation Faster Slower Encryption Much faster Have good Than RSA. speed but slower than ECC. Small devices Much more Less efficient efficiency Efficient. Than ECC. 5. CONCLUSION In this paper, Data security is important issue in day to day life. The elliptic curve cryptography is one of the useful techniques to hide the data or information so that data must be access by authorized user. In this technique all the calculations are takes place by considering the points on the elliptic curve. The encryption and key generation process is faster. Wireless devices are speedily becoming more reliant on safety features such as the ability to do secure email, confident Web browsing, and cybernetic private networking to commercial networks and ECC allows more efficient implementation of all of these features. ECC make available better security and more efficient performance than the first generation public key techniques. REFERENCES [1]. J.Edge, An introduction to elliptic curve cryptography, http://lwn.net/Articles/174127/, 2006. [2]. Ch. Suneetha, D. Sravana Kumar and A. Chandrasekhar, “Secure key transport in symmetric cryptographic protocols using elliptic curves over finite fields”, International Journal of Computer. [3]. R. Rajaram Ramasamy, M. Amutha Prabakar, M. Indra Devi and M.Suguna, ―Knapsack based ECC encryption and decryption‖, International Journal of Network Security, Vol. 9, No. 3, PP. 218-226,Nov. 2009. [4]. D.Sravana Kumar, CH. Suneetha and A. Chandrasekhar, Encryption of data using Elliptic Curve over Finite Fieldǁ, IJDPS, Vol. 3, No. 1, 2012. [5]. Nautiyal et al., International Journal of Advanced Research in Computer Science and Software Engineering 4(1), January - 2014, pp. 620-625 [6]. Alfred J. Menezes and Scott A. Vanstone, “Elliptic Curve Cryptosystems and their implementations”, Journal of Cryptology, 1993, Volume-6, Number-4, pages 209-224. [7]. Krithika K Annapoorna Shetty, Shravya Shetty K. A review on asymmetric cryptography RSA and elgamal algorithm. International Journal of Innovative Research in Computer and Communication Engineering, 2014. [8]. Richard Helm Erich Gamma. Design patterns: Elements of reusable object oriented software. communication Engineering, 2015. [9]. James Rumbaugh Grady Booch, Ivar Jacobson. Eleptic curve cryptography,2nd edition. Computer Engineering, 2004. [10]. Kistin Lauter. The advantage of eleptic curve cryptography for wireless security. IEEE wireless Communication, 2004