CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Analysis and Implementation of Combined Approach of RSA and ECC Algorithm for Enhanced Data Security

by Vaibhav Bhujade, Deepak Chaudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 15
Year of Publication: 2015
Authors: Vaibhav Bhujade, Deepak Chaudhary
10.5120/ijca2015907168

Vaibhav Bhujade, Deepak Chaudhary . Analysis and Implementation of Combined Approach of RSA and ECC Algorithm for Enhanced Data Security. International Journal of Computer Applications. 129, 15 ( November 2015), 37-42. DOI=10.5120/ijca2015907168

@article{ 10.5120/ijca2015907168,
author = { Vaibhav Bhujade, Deepak Chaudhary },
title = { Analysis and Implementation of Combined Approach of RSA and ECC Algorithm for Enhanced Data Security },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 15 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number15/23153-2015907168/ },
doi = { 10.5120/ijca2015907168 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:33.214089+05:30
%A Vaibhav Bhujade
%A Deepak Chaudhary
%T Analysis and Implementation of Combined Approach of RSA and ECC Algorithm for Enhanced Data Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 15
%P 37-42
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is one of the important and useful technique in which usually a particular file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data or file transmission between original sender and receiver. In this transmission file of unreadable format is send, after receiving this file receiver used the similar algorithm technique and private key for getting the original file data. In this procedure various algorithms are used as a processing function and depending on that algorithm, used the private key. The power or strength of any algorithm is depending on the secret key used in sender client and receiver side client. For this type of secure transmission we traditionally used RSA algorithm which is more secure for use so most of the system used the same type of algorithm for secure way of communication. Even most of the financial transaction is done by the use of this algorithm as it used the strong key while encryption and decryption. But In today’s new digital world there is a numerous growth in the use of the Internet service. Behind every software generator there is lots of hacker present. So, very little amount of time will be enough to explore the security. Hence we require more strong and complex algorithms, which provide the security the Internet work of transmitting and receiving. So this proposed system enhanced the security of existing RSA algorithm by using elliptical curve cryptography (ECC) algorithm. This system secures the important data of the administrator and safely sends to the registered user by text encryption and image encryption. Also proposed system provide good authentication for the user.

References
  1. Alfred J. Menezes and Paul C. van Oorschot and Scott A. Vanstone: “Handbook of Applied Cryptography”, pp. 1-2, August 1996
  2. Rafael pass and Abhi shelat: “A course in cryptography”, pp. 1-2, January 2010
  3. Darrel Hankerson, Alfred Menezes and Scott Vanstone: “Guide to Elliptic Curve
  4. William Stallings: ”Cryptography and Network Security Principles and Practice”, ISBN 13: 978-0-13-609704-4, 5th Edition, Pearson Publication, pp. 10-13, 2011
  5. Bart Preneel: “Analysis and Design of Cryptographic Hash Functions”, pp. 24-26, February 2003
  6. Paul Krzyzanowski: “Cryptographic communication and authentication”, Rutgers University – CS 417: Distributed Systems, pp. 1-2, 1997
  7. S. Maria Celestin Vigila and K. Muneeswaran: “Elliptic Curve based Key Generation for Symmetric Encryption”, International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), ISSN 978-1-61284-653-8, pp. 824-829,IEEE, 2011
  8. Victor S. Miller: “Use of Elliptic Curves in Cryptography”, H.C. Williams (Ed.): Advances in Cryptology - CRYPT0 85, LNCS 218, pp. 417-426, 1986
  9. Z. Guitouni, R.Chotin-Avot, M. Machhout, H. Mehrez and R. Tourki: “High Performances ASIC based Elliptic Curve Cryptographic Processor over GF (2m)”, IJCA Special Issue on Network Security and Cryptography, NSC, 2011
  10. CH. Suneetha, D. Sravana Kumar, A. Chandrasekhar and K. Vanitha: “Secure Key
  11. Muhammad Hammad Ahmed, Syed Wasi Alam, Nauman Qureshi and lrum Baig: “Security for WSN based on Elliptic Curve Cryptography”, ISSN 978-1-61284-941-6, pp. 75-79, IEEE, 2011
  12. R.L. Rivest, A. Shamir, and L. Adleman: “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems” ACM
  13. Anoop MS: “Elliptic Curve Cryptography an Implementation Guide”
  14. D. Sravana Kumar and CH. Suneetha A. Chandrasekhar: “Encryption of Data Using Elliptic Curve Over Finite Fields”, International Journal of Distributed and Parallel Systems (IJDPS), Vol. 3, No.1, pp. 301-308, January 2012
  15. Vassil Dimitrov, Laurent Imbert, and Pradeep Kumar Mishra : “Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains”, International Association for Cryptologic Research, B. Roy (Ed.): ASIA CRYPT 2005, LNCS 3788, pp. 59–78, 2005
  16. T. Abdurahmonov, Eng-Thiam Yeoh, and Helmi Mohamed Hussain: “A Proposed Implementation of Elliptic Curve Exponentiation over Prime Field in the Global Smart Cards”, International Journal of Information and Electronics Engineering (IJIEE), Vol. 3, No. 1, pp. 72-76, January 2013
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Authentication Plain Text cipher text RSA ECC