A Review on Elliptical Curve Crypto Graphing
DOI:
https://doi.org/10.61841/j8tay264Keywords:
Education, infrastructure and parental occupation.Abstract
The elliptical crypto graphing curve (ECC) plays a significant position in today's major public safety net. ECC is a faster and safer form of cryptography, like other common Cryptographic algorithms. The reliability advantages of ECC in the wireless Internet are addressed in this report. First of all, this paper introduces and evaluates the algorithm for various inputs for bit lengths. To further boost the safety level, a big question of maximal authentication is created and carried out based on the ECC algorithm. This paper doesn’t only rely on a single person, but on many people in our cryptographic threshold to decrypt our text. This network is safeguarded by Threshold Cryptography (TC). In this paper the ECC methodology is found to be more fitting than RSA. In the implementation of elliptic curve cryptography threshold cryptography (ECC-TC), this paper has explored and tested the three most efficient EC cryptographic algorithms and have developed the ability to use ECC-TC algorithms in different scenario of MANET. They equate both ECC-TC analysis and suggest an application appropriate for MANET. Finally, this paper has suggested a new approach for classified communication which reduces overhead communications to multiple documents at the same time.
Downloads
References
[1] L. Ertaul and N. J. Chavan, “Elliptic Curve Cryptography based Threshold Cryptography (ECC-TC)
Implementation for MANETs,” 2007.
[2] H. Gharib and K. Belloulata, “AUTHENTICATION ARCHITECTURE USING THRESHOLD
CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS,” Adv. Sci. Technol. Res. J.,
vol. 8, no. 22, pp. 12–18, 2014.
[3] M. Nawari, H. Ahmed, A. Hamid, and M. Elkhidir, “FPGA based implementation of elliptic curve
cryptography,” in 2015 World Symposium on Computer Networks and Information Security, WSCNIS
2015, 2015.
[4] H. Lv, H. Li, J. Yi, and H. Lu, “Optimal implementation of elliptic curve cryptography,” in Proceedings of
2013 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2013,
2013, pp. 35–39.
[5] B. MuthuKumar and S. Jeevananthan, “High speed hardware implementation of an elliptic curve cryptography
(ECC) co-processor,” in Proceedings of the 2nd International Conference on Trendz in Information Sciences
and Computing, TISC-2010, 2010, pp. 176–180.
[6] A. P. Z. A. P. Wadhe, “Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography,” Int. J. Sci.
Res., vol. 4, no. 4, pp. 2086–2089, 2015.
[7] J. W. Bos, J. A. Halderman, N. Heninger, J. Moore, M. Naehrig, and E. Wustrow, “Elliptic curve cryptography
in practice,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics), 2014.
[8] N. P. Smart, “Elliptic curves,” in Information Security and Cryptography, 2016.
[9] A. H. Koblitz, N. Koblitz, and A. Menezes, “Elliptic curve cryptography: The serpentine course of a paradigm
shift,” J. Number Theory, 2011.
[10] S. Dietrich and R. Dhamija, “Erratum to: Financial Cryptography and Data Security,” 2017.
[11] L. D. Singh and K. M. Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography,” in
Procedia Computer Science, 2015.
[12] V. Gayoso Martínez, L. González-Manzano, and A. Martín Muñoz, “Secure elliptic curves in cryptography,”
in Computer and Network Security Essentials, 2017.
[13] E. Käsper, “Fast elliptic curve cryptography in OpenSSL,” in Lecture Notes in Computer Science (including
subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.