Public key encryption technique with Scalar Point Operations in Elliptic curve cryptography (ECC) is often used as a
stepping stone in high-level security of information. Despite the wide variety of methods that have been proposed for enhancing the
security issues, none has been able to fully address the complex nature and issues of information security in real world tasks and
applications in compressed format. In this paper, we present a combination of Run Length Encoding (RLE) algorithm with ECC to
compress the data size and thereby reduce the space complexity. In addition to using RLE and ECC simultaneously we also use
permutation method to generate a different private key every time. It is found that these adjustments are based on the continuous
monitoring and enhancement of security in the model. This new approach enables us to reduce data storage problem and to increase the
data security using permutation method. The complete improvement and implementation is done on MATLAB R2013a version.
Published In:IJCSN Journal Volume 6, Issue 5
Date of Publication : October2017
Pages : 575-579
Figures :06
Tables : 01
Ayushi Mathur : is pursuing her M.Tech in
Computer Science. She has completed her B.Tech. In
Computer Science in 2013 from JNTU, Hyderabad. She has
published her paper in SCNDS in the field of grid computing.
Her research interests cover Cryptography, Database and
Programming Languages.
Dr. Varun Prakash Saxena : [BE(IT) ME(CSE)
PhD(CSE)]In 2012, He joined the Department of Computer
Engineering ,Government Women Engineering College Ajmer
(Rajasthan) India as an Assistant Professor . His current
research interests include Cryptography, Programming
Languages and Data Mining using Image Proceeding. He is
having more than 13 year experience in teaching and research
field and also associated with many National and International
associations like ISRD, IRED, IACSIT, and IAENG etc.
RLE, Hybrid approach, Space complexity
In this paper we have shown the implementation of our
proposed system. Our proposed work was on enhancing
the security of ECC and to reduce its data complexity
which we did efficiently by combining ECC with the
compression algorithm RLE and got fruitful results. We
have successfully reduced the number of bits and also
increased the security by applying permutation on the
private key. In every new process we get a different
private key which in turn provide us the better security of
data between the sender and the receiver.
[1] Abdelhamid Tadmori, Abdelhakim Chillali, M’hammed
Ziane, Cryptography over the elliptic curve (), Journal
of Taibah University for Science, Volume 9, Issue 3,
2015, Pages 326-331, ISSN 1658-3655,
http://dx.doi.org/10.1016/j.jtusci.2015.02.005.
[2] Hamad Marzouqi, Mahmoud Al-Qutayri, and Khaled
Salah. 2015. Review of Elliptic Curve Cryptography
processor designs. Microprocess. Microsyst. 39, 2
(March 2015),97-112.
DOI=http://dx.doi.org/10.1016/j.micpro.2015.02.003
[3] Khalid Javeed, Xiaojun Wang, Mike Scott, High
performance hardware support for elliptic curve
cryptography over general prime field, Microprocessors
and Microsystems, Volume 51, 2017, Pages 331-
342,ISSN0141,9331,http://dx.doi.org/10.1016/j.micpro.
2016.12.005.December 2016
[4] Lejla Batina, Siddika Berna Örs, Bart Preneel, and Joos
Vandewalle. 2003. Hardware architectures for public
key cryptography. Integr. VLSI J. 34, 1-2 (May
2003),164.DOI=http://dx.doi.org/10.1016/S0167-
9260(02)00053-6
[5] M. M. Panchbhai and U. S. Ghodeswar,
"Implementation of point addition & point doubling for
Elliptic Curve,"2015 International Conference on
Communications and Signal Processing (ICCSP),
Melmaruvathur, 2015, pp. 0746-0749.doi:
10.1109/ICCSP.2015.7322589”, IEEE, 2015
[6] Rahat Afreen et al, “A Review On Elliptic Curve
Cryptography For Embedded Systems”, International
Journal of Computer Science & Information
Technology, Vol. 3, No. 3, Pp. 84-103, June 2011. DOI:
10.5121/ijcsit.2011.3307
[7] Ruchika Markan et al, “Literature Survey on Elliptic
Curve Encryption Techniques”, International Journal of
Advanced Research in Computer Science and Software
Engineering, Vol. 3, No. 9, Pp. 906-909, September
2013
[8] SK Hafizul Islam, G.P. Biswas, Design of improved
password authentication and update scheme based on
elliptic curve cryptography, Mathematical and
Computer Modelling, Volume 57, Issue 11, 2013, Pages
2703-2717, ISSN 0895-7177,
http://dx.doi.org/10.1016/j.mcm.2011.07.001.
[9] Sonali Nimbhorkar, Latesh Malik, Comparative
Analysis of Authenticated Key Agreement Protocols
Based on Elliptic Curve Cryptography, Procedia
Computer Science, Volume 78, 2016, Pages 824-830,
ISSN18770509,http://dx.doi.org/10.1016/j.procs.2016.0
2.065., 2016
[10] Deepti Jyotiyana,Varun Prakash Saxena ,(ICT4SD 2016
GOA) “A Fault Attack for ScalarMultiplication in
Elliptic Curve Digital Signature Algorithm. In:
Vishwakarma H.,Akashe S.(eds) Computing and
Network Sustainability. Lecture Notes in Networks and
Systems, vol 12.Springer, Singapore,DOI:
https://doi.org/10.1007/978-981- 10-3935- 5_29.IEEE,
2013
[11] Deepti Jyotiyana,Varun Prakash Saxena (Dec 23-25
2016);Fault attack for scalar multiplication over finite
field (E(Fq)) on Elliptic Curve Digital Signature
Algorithm," 2016International Conference on
Recent Advances and Innovations in Engineering
(ICRAIE),
Jaipur,2016,pp.14.DOI10.1109/ICRAIE.2016.7939539.
[12] P. Nalwaya, V. P. Saxena and P. Nalwaya, A
Cryptographic Approach Based on Integrating Running
Key in Feedback Mode of ElGamal System,; 2014
International Conference on Computational Intelligence
and Communication Networks, Bhopal,
2014,pp.719724.doi:10.1109/CICN.2014.157.
[13] Anubhav Saxena, Varun Prakash Saxena Sandeep
Mal(April 2015) “Implementation of Fault Attacks on
Elliptic Curve Cryptosystems” International Journal of Research in Advent Technology (IJRAT),
Vol.3, No.4, April 2015 E-ISSN: 2321-, 9637.
[14] PriyaNalwaya, VarunPrakash Saxena(2014). “A Novel
Cryptographic Approach Based On Feedback Mode Of
Elgamal System”. International Journal of Advance
Research in Science & Engineering (IJARSE)-
ISSN – 23198354.
[15] A. Barenghi, G. Bertoni, A. Palomba and R. Susella,
"A novel fault attack against ECDSA," 2011 IEEE
International Symposium on Hardware-Oriented
Security and Trust, San DiegoCA,2011,pp.161-166.doi:
10.1109/HST.2011.5955015
[16] Hui Li, Ruixia Zhang, Junkai Yi, Hongqiang Lv,"A
Novel Algorithm for Scalar Multiplication in ECDSA",
2012 Fourth International Conference on
ComputationalandInformationSciences,vol.00,no.,pp.94
3946,2013,doi:10.1109/ICCIS.2013.254
[17] Ling, Jie & King, Brian. (2013). Smart card fault
attacks on elliptic curve cryptography. Midwest
Symposium on
CircuitsandSystems.12551258.10.1109/MWSCAS.2013
.6674882.
[18] Rashidi, Bahram & Sayedi, S.M. & Rezaeian Farashahi,
Reza. (2016). High-speed hardware architecture of
scalar multiplication for binary elliptic curve
cryptosystems. Microelectronics Journal. 52. 49-
65.10.1016/j.mejo.2016.03.006.
[19] Lavanya, M & Praveenkumar, G & Lena Murugan, N &
Vigneshwaran, M & Saravanan, S. (2016).
Authentication scheme for client and server using
elliptic curve cryptography. International Journal of
Pharmacy and Technology. 8. 25317- 25325.
[20] Mrabet, Amine & El-Mrabet, Nadia & Lashermes,
Ronan & Rigaud, Jean-Baptiste & Bouallegue,
Belgacem & Mesnager, Sihem & Machhout,
Mohsen. (2017). High-Performance Elliptic Curve
Cryptography by Using the CIOS Method for Modular
Multiplication. 185-198. 10.1007/978-3-319-54876-
0_15.
[21] Phalakarn, Kittiphop & Phalakarn, Kittiphon &
Suppakitpaisarn, Vorapong. (2016). Parallelized Side-
Channel Attack Resisted Scalar Multiplication Using
q-Based Addition-Subtraction k-Chains. 140-146.
10.1109/CANDAR.2016.0035.
[22] S. R. Singh, A. K. Khan and S. R. Singh, "Performance
evaluation of RSA and Elliptic Curve Cryptography,"
2016 2nd International Conference on Contemporary
Computing and Informatics (IC3I), IEEE
Noida,2016,pp.302306.doi:10.1109/IC3I.2016.7917979
[23] N. Alimi, Y. Lahbib, M. Machhout and R. Tourki, "On
Elliptic Curve Cryptography implementations and
evaluation," 2016 2nd International Conference on
Advanced Technologies for Signal and Image
Processing (ATSIP), IEEE, Monastir, 2016, pp.
3540.doi:10.1109/ATSIP.2016.
[24] M. M. Chauhan, "An implemented of hybrid
cryptography using elliptic curve cryptosystem (ECC)
and MD5," 2016 International Conference on
Inventive Computation Technologies (ICICT),
Coimbatore,2016,IEEE,pp.16.doi:10.1109/INVENTIV
E.2016.7830092U
[25] S. R. Singh, A. K. Khan and T. S. Singh, "A critical
review on Elliptic Curve Cryptography," 2016
International Conference on Automatic Control and
Dynamic Optimization Techniques (ICACDOT), Pune,
2016, pp. 13-18.
doi:10.1109/ICACDOT.2016.7877543URL:
http://ieeexplore.ieee.org/stamp/stamp.jsp?
tp=&arnumber=7877543&isnumber=7877540
[26] X. Fang and Y. Wu, "Investigation into the elliptic
curve cryptography," 2017 3rd International Conference
on Information Management (ICIM), Chengdu,
2017,pp.412415.doi:10.1109/INFOMAN.2017.7950418
URL:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&ar
number=7950418&isnumber=7950330
[27] M. Indaco, F. Lauri, A. Miele and P. Trotta, "An
efficient many-core architecture for Elliptic Curve
Cryptography security assessment," 2015 25th
International Conference on Field Programmable Logic
and Applications (FPL), London, 2015, pp. 1-6.doi:
10.1109/FPL.2015.7293950
URL:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&ar
number=7293950&isnumber=7293744
[28] Kamal Kamal, Radu Muresan, "Capacitive physically
unclonable function", Electrical and Computer
Engineering (CCECE) 2017 IEEE 30th Canadian
Conference on, pp. 1-6, 2017.