A Review on Elliptical Curve Crypto Graphing

Authors

  • Santosh Behera Department of Computer Science and Engineering, Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar, Author
  • Sanjay Behera Department of Computer Science and Engineering, Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar, Author

DOI:

https://doi.org/10.61841/j8tay264

Keywords:

Education, infrastructure and parental occupation.

Abstract

 The elliptical crypto graphing curve (ECC) plays a significant position in today's major public safety net. ECC is a faster and safer form of cryptography, like other common Cryptographic algorithms. The reliability advantages of ECC in the wireless Internet are addressed in this report. First of all, this paper introduces and evaluates the algorithm for various inputs for bit lengths. To further boost the safety level, a big question of maximal authentication is created and carried out based on the ECC algorithm. This paper doesn’t only rely on a single person, but on many people in our cryptographic threshold to decrypt our text. This network is safeguarded by Threshold Cryptography (TC). In this paper the ECC methodology is found to be more fitting than RSA. In the implementation of elliptic curve cryptography threshold cryptography (ECC-TC), this paper has explored and tested the three most efficient EC cryptographic algorithms and have developed the ability to use ECC-TC algorithms in different scenario of MANET. They equate both ECC-TC analysis and suggest an application appropriate for MANET. Finally, this paper has suggested a new approach for classified communication which reduces overhead communications to multiple documents at the same time. 

Downloads

Download data is not yet available.

References

[1] L. Ertaul and N. J. Chavan, “Elliptic Curve Cryptography based Threshold Cryptography (ECC-TC)

Implementation for MANETs,” 2007.

[2] H. Gharib and K. Belloulata, “AUTHENTICATION ARCHITECTURE USING THRESHOLD

CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS,” Adv. Sci. Technol. Res. J.,

vol. 8, no. 22, pp. 12–18, 2014.

[3] M. Nawari, H. Ahmed, A. Hamid, and M. Elkhidir, “FPGA based implementation of elliptic curve

cryptography,” in 2015 World Symposium on Computer Networks and Information Security, WSCNIS

2015, 2015.

[4] H. Lv, H. Li, J. Yi, and H. Lu, “Optimal implementation of elliptic curve cryptography,” in Proceedings of

2013 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2013,

2013, pp. 35–39.

[5] B. MuthuKumar and S. Jeevananthan, “High speed hardware implementation of an elliptic curve cryptography

(ECC) co-processor,” in Proceedings of the 2nd International Conference on Trendz in Information Sciences

and Computing, TISC-2010, 2010, pp. 176–180.

[6] A. P. Z. A. P. Wadhe, “Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography,” Int. J. Sci.

Res., vol. 4, no. 4, pp. 2086–2089, 2015.

[7] J. W. Bos, J. A. Halderman, N. Heninger, J. Moore, M. Naehrig, and E. Wustrow, “Elliptic curve cryptography

in practice,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial

Intelligence and Lecture Notes in Bioinformatics), 2014.

[8] N. P. Smart, “Elliptic curves,” in Information Security and Cryptography, 2016.

[9] A. H. Koblitz, N. Koblitz, and A. Menezes, “Elliptic curve cryptography: The serpentine course of a paradigm

shift,” J. Number Theory, 2011.

[10] S. Dietrich and R. Dhamija, “Erratum to: Financial Cryptography and Data Security,” 2017.

[11] L. D. Singh and K. M. Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography,” in

Procedia Computer Science, 2015.

[12] V. Gayoso Martínez, L. González-Manzano, and A. Martín Muñoz, “Secure elliptic curves in cryptography,”

in Computer and Network Security Essentials, 2017.

[13] E. Käsper, “Fast elliptic curve cryptography in OpenSSL,” in Lecture Notes in Computer Science (including

subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012.

Downloads

Published

02.04.2025

How to Cite

A Review on Elliptical Curve Crypto Graphing. (2025). International Journal of Psychosocial Rehabilitation, 23(5), 22-26. https://doi.org/10.61841/j8tay264