CFP last date
22 April 2024
Reseach Article

A Survey of Different Encoding Schemes for Improving the Efficiency of Text based Cryptosystem using ECC

by Dhanashree Toradmalle, Saudamini B. Ingale, Miheeka G. Chaudhary, Aishvarya Akshaya V., Anjali R. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 153 - Number 9
Year of Publication: 2016
Authors: Dhanashree Toradmalle, Saudamini B. Ingale, Miheeka G. Chaudhary, Aishvarya Akshaya V., Anjali R. Patil
10.5120/ijca2016912155

Dhanashree Toradmalle, Saudamini B. Ingale, Miheeka G. Chaudhary, Aishvarya Akshaya V., Anjali R. Patil . A Survey of Different Encoding Schemes for Improving the Efficiency of Text based Cryptosystem using ECC. International Journal of Computer Applications. 153, 9 ( Nov 2016), 39-44. DOI=10.5120/ijca2016912155

@article{ 10.5120/ijca2016912155,
author = { Dhanashree Toradmalle, Saudamini B. Ingale, Miheeka G. Chaudhary, Aishvarya Akshaya V., Anjali R. Patil },
title = { A Survey of Different Encoding Schemes for Improving the Efficiency of Text based Cryptosystem using ECC },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 153 },
number = { 9 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 39-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume153/number9/26435-2016912155/ },
doi = { 10.5120/ijca2016912155 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:58:43.888204+05:30
%A Dhanashree Toradmalle
%A Saudamini B. Ingale
%A Miheeka G. Chaudhary
%A Aishvarya Akshaya V.
%A Anjali R. Patil
%T A Survey of Different Encoding Schemes for Improving the Efficiency of Text based Cryptosystem using ECC
%J International Journal of Computer Applications
%@ 0975-8887
%V 153
%N 9
%P 39-44
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Providing digital privacy from any kind of malicious activity is referred to as data security. It also includes protection of data from corruption, especially threatened by hackers and eavesdroppers. Various cryptographic systems help provide data security. Elliptic Curve Cryptography(ECC) is advantageous over many cryptographic schemes due to smaller keys and very fast key generation. Smaller key size leads to moderately fast encryption and takes less processing power since computation is less. This paper presents the areas of ECC which have been researched on in depth and a comparative study of various encoding techniques used in ECC implementation.

References
  1. Darrel Hankerson, Alfred Menezes, and Scott Vanstone, “Guide to Elliptic Curve Cryptography”, Springer: 2014, pp. 2-3.
  2. Samta Gajbhiye, Monisha Sharma, and Samir Dashputre, “A Survey Report on Elliptic Curve Cryptography”, International Journal of Electrical and Computer Engineering (IJECE): 2011, pp. 195.
  3. Phattarin Kitbumrung and Benchaphon Limthanmaphon, “ECC Dynamic Point Encoding on Mobile Device”, IEEE: 2011.
  4. “Recommended Elliptic Curves for Federal Government”, pp. 24-28.
  5. Elaine Baker, Don Johnson and Mikes Smid, “NIST Computer Security: Recommendation For Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography”, March 2011, pp. 29.
  6. Abhishek Roy and Sunil Karforma, “A survey on digital signatures and its applications”, J. of Comp. and I.T. Vol. 3(1&2): 2012, pp. 45-69.
  7. Greeshma Sarath, Devesh C Jinwala and Sankita Patel, “A Survey on Elliptic Curve Digital Signature Algorithm and Its Variants”, CS & IT-CSCP: 2014, pp. 121-136.
  8. Tao LONG and Xiaoxia LIU, “Two Improvements to Digital Signature Scheme Based on the Elliptic Curve Cryptosystem”, International Workshop on Information Security and Application (IWISA): 2009.
  9. S. Maria Celestin Vigila and K. Muneeswaran., “Implementation of Text based Cryptosystem using Elliptic Curve Cryptography”, ICAC: 2009.
  10. Jayabhaskar Muthukuru and Bachala Sathyanarayana, “Fixed and Variable Size Text Based Message Mapping Techniques Using ECC”, Global Journal of Computer Science and Technology, Volume 12, Issue 3, Version 1.0: February 2012.
  11. Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography”, IMCIP: 2015.
  12. Balamurugan.R, Kamalakannan.V, Rahul Ganth.D and Tamilselvan.S, “Enhancing Security in Text Messages Using Matrix based Mapping and ElGamal Method in Elliptic Curve Cryptography”, (IC3I) IEEE: 2014.
  13. V. Kamalakannan and S. Tamilselvan, “An Efficient Crystography Protocol Using Matrix Mapping Technique”, IEEE ICCSP: 2015.
  14. Richa Garg and Saurabh Mittal, “Optimization by Genetic Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering: April 2014, pp. 587-589.
Index Terms

Computer Science
Information Sciences

Keywords

ECC ECDSA ECC encryption encoding schemes ASCII matrix mapping.