Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Using Elliptic Curve Cryptography (ECC)

Cryptography is a growing science of data security. The integrity of a data is an important thing to keep the secrets contained in the data. In this research will be visualized the efficient quantities that use elliptic curves and do not use them. The hope is that by using elliptic curves the timing of the encryption and decryption process can run faster and help the Central Processing Unit (CPU) in the computation of ElGamal Method.

[1]  Hung-I Hsiao,et al.  Fingerprint image cryptography based on multiple chaotic systems , 2015, Signal Process..

[2]  Himanshu Gupta,et al.  Anti-Phishing Techniques in Cryptography , 2015 .

[3]  L. Malik,et al.  Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography , 2016 .

[4]  Sirapat Boonkrong,et al.  Finding the Optimal Value for Threshold Cryptography on Cloud Computing , 2016 .

[5]  Lidia Ogiela,et al.  Cryptographic techniques of strategic data splitting and secure information management , 2016, Pervasive Mob. Comput..

[6]  A. Rama Krishna,et al.  A Hybrid Cryptographic System for Secured Device to Device Communication , 2016 .

[7]  Altaf O. Mulani,et al.  Watermarking and Cryptography Based Image Authentication on Reconfigurable Platform , 2017 .

[8]  V. R. Josna,et al.  CASH on Modified Elgamal: A Preventive Technique for False Channel Condition Reporting Attackin Ad-hoc Network , 2016 .

[9]  Kalinka Regina Lucas Jaquie Castelo Branco,et al.  Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general purpose computer , 2016, J. Netw. Comput. Appl..

[10]  Henry Dalziel Chapter 9 – Cryptography , 2015 .

[11]  Arslan Munir,et al.  Evolving side-channel resistant reconfigurable hardware for elliptic curve cryptography , 2017, 2017 IEEE Congress on Evolutionary Computation (CEC).

[12]  G. Sridevi,et al.  Hybrid Cryptography for Random-key Generation based on ECC Algorithm , 2017 .

[13]  Siddhartha Bhattacharyya,et al.  Content Based Double Encryption Algorithm Using Symmetric Key Cryptography , 2015 .

[14]  Khumanthem Manglem Singh,et al.  Implementation of Text Encryption using Elliptic Curve Cryptography , 2015 .

[16]  Manish Ranjan,et al.  A Cloud Based Secure Voting System using Homomorphic Encryption for Android Platform , 2016 .

[17]  刘雪梅,et al.  Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging , 2015 .

[18]  Musheer Ahmad,et al.  Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos , 2017, ArXiv.

[19]  Xiaofeng Liao,et al.  Color image encryption based on chaotic systems and elliptic curve ElGamal scheme , 2017, Signal Process..

[20]  Priyadarshini Patila,et al.  A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .

[21]  Mike Scott,et al.  High performance hardware support for elliptic curve cryptography over general prime field , 2017, Microprocess. Microsystems.

[22]  S. Gajbhiye,et al.  A Survey Report On Elliptic Curve Cryptography , 2011 .