CFP last date
20 May 2024
Reseach Article

Software Implementation of Cyclic Abelian Elliptic Curve using Matlab

by Dipti Aglawe, Samta Gajbhiye
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 6
Year of Publication: 2012
Authors: Dipti Aglawe, Samta Gajbhiye
10.5120/5701-7754

Dipti Aglawe, Samta Gajbhiye . Software Implementation of Cyclic Abelian Elliptic Curve using Matlab. International Journal of Computer Applications. 42, 6 ( March 2012), 43-48. DOI=10.5120/5701-7754

@article{ 10.5120/5701-7754,
author = { Dipti Aglawe, Samta Gajbhiye },
title = { Software Implementation of Cyclic Abelian Elliptic Curve using Matlab },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 6 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 43-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number6/5701-7754/ },
doi = { 10.5120/5701-7754 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:44.464498+05:30
%A Dipti Aglawe
%A Samta Gajbhiye
%T Software Implementation of Cyclic Abelian Elliptic Curve using Matlab
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 6
%P 43-48
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Majority of products and standards that use public-key cryptography for encryption and digital signature use RSA. The key length for secure RSA has increased over recent years ,and this has put heavier processing load on applications using RSA. Recently, a competing system has begun to challenge RSA: Elliptic curve cryptography (ECC). The principle attraction of ECC, compared to RSA, is that it appears to offer equal security for a far smaller key size, thereby reducing processor overhead. Cryptographers are interested only in elliptic curve that belongs to cyclic abelian group. This paper implements cyclic abelian elliptic curve in MATLAB. The properties of abelian group is proved over the coordinates satisfying the curve. Base points of elliptic curve are generated to prove that the elliptic curve belongs to cyclic abelian group.

References
  1. Williams Stallings, Cryptography and Network Security, Prentice Hall, 4th Edition, 2006
  2. Dr H. K Pathak, " Discrete mathematical structure"
  3. Stephen J. Chapman, "MATLAB programming for Engineers".
  4. Guicheng shen, Xuefeng zheng, "Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce", 978-0-7695-3258-5/08 $25. 00 © 2008 IEEE
  5. J. Nafeesa Begum,K. Kumar and Dr. V. Sumathy," Multilevel Access Control in Defense Messaging System Using Elliptic Curve Cryptography, Second International conference on Computing, Communication and Networking Technologies,2010
  6. Bin Yu
  7. , "Method to Generate Elliptic Curves Based on CM Algorithm", 978-1-4244-6943-7/10/$26. 00 IEEE,2010
  8. N. Koblitz," Elliptic curve cryptosystem," matematics of computer, vol. 48, pp. 203-209, 1987.
  9. V. Miller," Uses of elliptic curves in cryptography," Advance in Cryptology (CRYPTO), LNCS vol. 218, pp. 417–428, 1985.
  10. N. A. Saqib, F. Rodriguez-Henriquez and A. Diaz-perez, " A parallel architecture for fast computation of elliptic curve scalar multiplicationover GF(2m)", proceeding in the 18th international parallel and distributed processing symposium, USA, , vol. 4, pp. 144a, April 2004.
  11. Abdalhossein Rezai and Parviz Keshavarzi,"High-performance implementation approach of elliptic curve cryptosystem for wireless network applications", 978-1-61284-459-6/11/$26. 00 IEEE,2011
  12. P. G. Shah, X. Huang and D. Sharma, "Sliding window method with flexible window size for scalar multiplication on wireless sensor network nodes," proceeding in international conference on wireless communication and sensor computing, pp. 1-6, January 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic Curve Cryptography (ecc) Cyclic Abelian Group Public Key Cryptography