Implementation of Text Encryption using Elliptic Curve Cryptography

Abstract Elliptic Curve Cryptography has been a recent research area in the field of Cryptography. It provides higher level of security with lesser key size compared to other Cryptographic techniques. A new technique has been proposed in this paper where the classic technique of mapping the characters to affine points in the elliptic curve has been removed. The corresponding ASCII values of the plain text are paired up. The paired values serve as input for the Elliptic curve cryptography. This new technique avoids the costly operation of mapping and the need to share the common lookup table between the sender and the receiver. The algorithm is designed in such a way that it can be used to encrypt or decrypt any type of script with defined ASCII values.

[1]  Scott A. Vanstone,et al.  Elliptic curve cryptosystem - The answer to strong, fast public-key cryptography for securing constrained environments , 1997, Inf. Secur. Tech. Rep..

[2]  L. Washington Elliptic Curves: Number Theory and Cryptography , 2003 .

[3]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[4]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[5]  Moad Yassin Mowafi,et al.  Use of elliptic curve cryptography for multimedia encryption , 2013, IET Inf. Secur..

[6]  K. Muneeswaran,et al.  Implementation of text based cryptosystem using Elliptic Curve Cryptography , 2009, 2009 First International Conference on Advanced Computing.

[7]  A. Chandrasekhar,et al.  Encryption of Data using Elliptic Curve over Finite fields , 2012, ArXiv.

[8]  Navi Mumbai,et al.  IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY ON TEXT AND IMAGE , 2011 .

[9]  Moncef Amara,et al.  Elliptic Curve Cryptography and its applications , 2011, International Workshop on Systems, Signal Processing and their Applications, WOSSPA.

[10]  Kimmo Järvinen,et al.  On Parallelization of High-Speed Processors for Elliptic Curve Cryptography , 2008, IEEE Trans. Very Large Scale Integr. Syst..

[11]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[12]  S. Tamilselvan,et al.  Enhancing security in text messages using matrix based mapping and ElGamal method in elliptic curve cryptography , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[13]  William Stallings,et al.  Cryptography and network security , 1998 .