An implemented of hybrid cryptography using elliptic curve cryptosystem (ECC) and MD5
暂无分享,去创建一个
In this paper, using ECC encryption-decryption methodology and the MD5 hash generation algorithm. To develop a more efficient and more secure cryptographic algorithms. It is suitable for all devices due to their confines in memory capacity, computing power, cryptographic support and key sizes. It is lighter and secure encryption system for the secure file transferring system. This paper presents the implementation of Algorithm, where the key stream is generated based on the properties of Elliptic Curve Cryptography. In this paper, we illustrate the process of encryption/decryption of any information. This paper also discusses the Result after Encryption/decryption that result is represented in tables and Graph.
[1] S. Prasanna Ganesan. An asymmetric authentication protocol for mobile devices using elliptic curve cryptography , 2010 .
[2] S. Han,et al. A new encryption algorithm over elliptic curve , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[3] Chien-Ming Wu,et al. Concurrent algorithm for high-speed point multiplication in elliptic curve cryptography , 2005, 2005 IEEE International Symposium on Circuits and Systems.