Secure Transmission of Data through Electronic Devices using ECC Algorithm

Authors

  • G. Banu Priya  Assistant Professor, Department of Computer Science, SNMV College of Arts and Science, Coimbatore, Tamil Nadu, India
  • K. Dharani  Assistant Professor, Department of Computer Science, SNMV College of Arts and Science, Coimbatore, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT195223

Keywords:

Cryptography, Encryption, Decryption, ECC Algorithm, Privacy, Integrity and Confidentiality.

Abstract

In recent days securing the data while transferring through electronic devices from one end to the other has became a challenging task to both sender and the receiver. During the transmission of private data over the electronic devices may be hacked some times by the hackers. The data can be secured by using the cryptographic concept. This paper is about how the data are protected while transferring the data from one electronics devices to another using the ECC algorithm. Cryptographic algorithms plays an important role in securing the data against malicious attacks. The main goal of cryptography is not only to secure data from being hacked or attacked also it can be used for authentication of users. There are two types of cryptographic algorithms namely Symmetric key cryptographic algorithms and Asymmetric key cryptographic algorithms. Symmetric key cryptographic algorithm uses the only one key for both encryption and decryption process, where as Asymmetric cryptographic algorithm uses two different keys for encrypting and decrypting the messages. The public key is made publicly available and can be used to encrypt messages. The private key is kept secret and can be used to decrypt the received messages. Nowadays, many electronic devices like electronic phones, tablets, personal computers are in the workplace for transferring the data. Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create privacy, integrity and confidentiality, faster, smaller, and more efficient cryptographic keys.

References

  1. Zhiyong Peng Xiaojuan Li, "The improvement and simulation of LEACHprotocolforWSNs,"Software Engineering and Service Sciences (ICSESS), 2010 IEEE International Conference on , vol., no., pp.500-503, 16-18 July2011.
  2. Bahadori, M.; Mali, M.R. Sarbishei, O.,Atarodi, M.;Sharifkhani, M. , "A novel approach for secure and fast generation of RSA public and privatekeysonSmartCard," NEWCAS Conference (NEWCAS), 2010 8th IEEE International , vol., no., pp.265-268, 20-23 June 2010.
  3. Massey, J.L, "An Introduction to Contemporary Cryptology", Proceedings of the IEEE, Special Section on Cryptography, 533-549, May 2011.
  4. Manikandan.G, Rajendiran.P, Chakarapani.K, Krishnan.G, Sundarganesh.G, “A Modified Crypto Scheme for Enhancing Data Security”, Journal of Theoretical and Advanced Information Technology, Jan 2012.
  5. Wang, X., “Cryptanalysis for Hash Functions and Some Potential Dangers,” RSA Conference 2010, Cryptographer’s Track, 2010.
  6. Dr. Sandeep Sharma and Rishabh Arora “Performance Analysis of Cryptography Algorithms” International Journal of Computer Applications (0975 – 8887) Volume 48– No.21, June 2012.
  7. A. Lazou., and G. R. Weir, “Perceived Risk and Sensitive Data on Mobile Devices”, UK. University of Strathclyde Publishing., pp. 183-196, 2011.
  8. William Stallings, “Cryptography and Network Security”, ISBN 81-7758-011-6, Pearson Education, Third Edition.
  9. Atul Kahate, “Computer and Network Security”, Third Edition,Tata McGraw Hill Publication Company Limited,2013
  10. Ambedkar, B. R., Gupta, A., Gautam, P., & Bedi, S. S. (2011, June). An Efficient Method to Factorize the RSA Public Key Encryption. In Communication Systems and Network Technologies (CSNT), 2011 International Conference on (pp. 108-111). IEEE.
  11. NeetuSettia. “Cryptanalysis of modern Cryptography Algorithms”. International Journal of Computer Science and Technology. December 2010.
  12. Nentawe Y.Goshwe(2013) Data Encryption and Decryption Using RSA Algorithm in a Network Environment. IJCSNS International Journal of Computer Science and Network Security, VOL.13No.7.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
G. Banu Priya, K. Dharani, " Secure Transmission of Data through Electronic Devices using ECC Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.130-135, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT195223