Time stamp based ECC encryption and decryption

Elliptic Curve Cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the diffie hellman key exchange algorithm. Encryption and decryption of texts and messages have also been attempted. In the paper on Knapsack over ECC algorithm, the authors presented the implementation of ECC by first transforming the message into an affine point on the EC, and then applying the knapsack algorithm on ECC encrypted message over the finite field GF(p). The knap sack problem is not secure in the present standards and more over in the work the authors in their decryption process used elliptic curve discrete logarithm to get back the plain text. This may form a computationally infeasible problem if the values are large enough in generating the plain text. In the present work a new mathematical model is used, which considers the output of ECC algorithm, a variable nonce value and a dynamic time stamp to generate the cipher text. Thus, by having key lengths of even less than 160 bits, the present algorithm provides sufficient strength against crypto analysis and whose performance can be compared with standard algorithms like RSA.

[1]  A. Vinaya Babu,et al.  A New Non Linear, Time Stamped & Feed Back Model Based Encryption Mechanism with Acknowledgement Support , 2010, ArXiv.

[2]  Çetin Kaya Koç,et al.  High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor , 2001 .

[3]  A. Vinaya Babu,et al.  A New Model Based Encryption Mechanism With Time Stamp, Acknowledgement Support , 2010, Int. J. Netw. Secur..

[4]  Wen Gao,et al.  Elliptic Curve Cryptography Based Wireless Authentication Protocol , 2007, Int. J. Netw. Secur..

[5]  K. Lauter,et al.  The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.

[6]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[7]  Alfred Menezes,et al.  Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.

[8]  Barry E. Mullins,et al.  Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks , 2007, Int. J. Secur. Networks.

[9]  William Stallings,et al.  Cryptography and network security , 1998 .

[10]  Whitfield Diffie The first ten years of public-key cryptography , 1988 .

[11]  Wayne Luk,et al.  Customizable elliptic curve cryptosystems , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[12]  Hyunsoo Yoon,et al.  Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field , 2007, Int. J. Netw. Secur..

[13]  Gang Chen,et al.  A High-Performance Elliptic Curve Cryptographic Processor for General Curves Over ${\rm GF}(p)$ Based on a Systolic Arithmetic Unit , 2007, IEEE Transactions on Circuits and Systems II: Express Briefs.

[14]  M. Indra Devi,et al.  Knapsack Based ECC Encryption and Decryption , 2009, Int. J. Netw. Secur..

[15]  Sangook Moon,et al.  A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems , 2006, Int. J. Netw. Secur..