Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Data Compression and Security in Elliptic Curve Cryptography with Run Length Encoding  
  Authors : Ayushi Mathur; Dr. Varun Prakash Saxena
  Cite as:

 

Public key encryption technique with Scalar Point Operations in Elliptic curve cryptography (ECC) is often used as a stepping stone in high-level security of information. Despite the wide variety of methods that have been proposed for enhancing the security issues, none has been able to fully address the complex nature and issues of information security in real world tasks and applications in compressed format. In this paper, we present a combination of Run Length Encoding (RLE) algorithm with ECC to compress the data size and thereby reduce the space complexity. In addition to using RLE and ECC simultaneously we also use permutation method to generate a different private key every time. It is found that these adjustments are based on the continuous monitoring and enhancement of security in the model. This new approach enables us to reduce data storage problem and to increase the data security using permutation method. The complete improvement and implementation is done on MATLAB R2013a version.

 

Published In : IJCSN Journal Volume 6, Issue 5

Date of Publication : October2017

Pages : 575-579

Figures :06

Tables : 01

 

Ayushi Mathur : is pursuing her M.Tech in Computer Science. She has completed her B.Tech. In Computer Science in 2013 from JNTU, Hyderabad. She has published her paper in SCNDS in the field of grid computing. Her research interests cover Cryptography, Database and Programming Languages.

Dr. Varun Prakash Saxena : [BE(IT) ME(CSE) PhD(CSE)]In 2012, He joined the Department of Computer Engineering ,Government Women Engineering College Ajmer (Rajasthan) India as an Assistant Professor . His current research interests include Cryptography, Programming Languages and Data Mining using Image Proceeding. He is having more than 13 year experience in teaching and research field and also associated with many National and International associations like ISRD, IRED, IACSIT, and IAENG etc.

 

RLE, Hybrid approach, Space complexity

In this paper we have shown the implementation of our proposed system. Our proposed work was on enhancing the security of ECC and to reduce its data complexity which we did efficiently by combining ECC with the compression algorithm RLE and got fruitful results. We have successfully reduced the number of bits and also increased the security by applying permutation on the private key. In every new process we get a different private key which in turn provide us the better security of data between the sender and the receiver.

 

[1] Abdelhamid Tadmori, Abdelhakim Chillali, M’hammed Ziane, Cryptography over the elliptic curve (), Journal of Taibah University for Science, Volume 9, Issue 3, 2015, Pages 326-331, ISSN 1658-3655, http://dx.doi.org/10.1016/j.jtusci.2015.02.005. [2] Hamad Marzouqi, Mahmoud Al-Qutayri, and Khaled Salah. 2015. Review of Elliptic Curve Cryptography processor designs. Microprocess. Microsyst. 39, 2 (March 2015),97-112. DOI=http://dx.doi.org/10.1016/j.micpro.2015.02.003 [3] Khalid Javeed, Xiaojun Wang, Mike Scott, High performance hardware support for elliptic curve cryptography over general prime field, Microprocessors and Microsystems, Volume 51, 2017, Pages 331- 342,ISSN0141,9331,http://dx.doi.org/10.1016/j.micpro. 2016.12.005.December 2016 [4] Lejla Batina, Siddika Berna Örs, Bart Preneel, and Joos Vandewalle. 2003. Hardware architectures for public key cryptography. Integr. VLSI J. 34, 1-2 (May 2003),164.DOI=http://dx.doi.org/10.1016/S0167- 9260(02)00053-6 [5] M. M. Panchbhai and U. S. Ghodeswar, "Implementation of point addition & point doubling for Elliptic Curve,"2015 International Conference on Communications and Signal Processing (ICCSP), Melmaruvathur, 2015, pp. 0746-0749.doi: 10.1109/ICCSP.2015.7322589”, IEEE, 2015 [6] Rahat Afreen et al, “A Review On Elliptic Curve Cryptography For Embedded Systems”, International Journal of Computer Science & Information Technology, Vol. 3, No. 3, Pp. 84-103, June 2011. DOI: 10.5121/ijcsit.2011.3307 [7] Ruchika Markan et al, “Literature Survey on Elliptic Curve Encryption Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 9, Pp. 906-909, September 2013 [8] SK Hafizul Islam, G.P. Biswas, Design of improved password authentication and update scheme based on elliptic curve cryptography, Mathematical and Computer Modelling, Volume 57, Issue 11, 2013, Pages 2703-2717, ISSN 0895-7177, http://dx.doi.org/10.1016/j.mcm.2011.07.001. [9] Sonali Nimbhorkar, Latesh Malik, Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography, Procedia Computer Science, Volume 78, 2016, Pages 824-830, ISSN18770509,http://dx.doi.org/10.1016/j.procs.2016.0 2.065., 2016 [10] Deepti Jyotiyana,Varun Prakash Saxena ,(ICT4SD 2016 GOA) “A Fault Attack for ScalarMultiplication in Elliptic Curve Digital Signature Algorithm. In: Vishwakarma H.,Akashe S.(eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 12.Springer, Singapore,DOI: https://doi.org/10.1007/978-981- 10-3935- 5_29.IEEE, 2013 [11] Deepti Jyotiyana,Varun Prakash Saxena (Dec 23-25 2016);Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm," 2016International Conference on Recent Advances and Innovations in Engineering (ICRAIE), Jaipur,2016,pp.14.DOI10.1109/ICRAIE.2016.7939539. [12] P. Nalwaya, V. P. Saxena and P. Nalwaya, A Cryptographic Approach Based on Integrating Running Key in Feedback Mode of ElGamal System,; 2014 International Conference on Computational Intelligence and Communication Networks, Bhopal, 2014,pp.719724.doi:10.1109/CICN.2014.157. [13] Anubhav Saxena, Varun Prakash Saxena Sandeep Mal(April 2015) “Implementation of Fault Attacks on Elliptic Curve Cryptosystems” International Journal of Research in Advent Technology (IJRAT), Vol.3, No.4, April 2015 E-ISSN: 2321-, 9637. [14] PriyaNalwaya, VarunPrakash Saxena(2014). “A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System”. International Journal of Advance Research in Science & Engineering (IJARSE)- ISSN – 23198354. [15] A. Barenghi, G. Bertoni, A. Palomba and R. Susella, "A novel fault attack against ECDSA," 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, San DiegoCA,2011,pp.161-166.doi: 10.1109/HST.2011.5955015 [16] Hui Li, Ruixia Zhang, Junkai Yi, Hongqiang Lv,"A Novel Algorithm for Scalar Multiplication in ECDSA", 2012 Fourth International Conference on ComputationalandInformationSciences,vol.00,no.,pp.94 3946,2013,doi:10.1109/ICCIS.2013.254 [17] Ling, Jie & King, Brian. (2013). Smart card fault attacks on elliptic curve cryptography. Midwest Symposium on CircuitsandSystems.12551258.10.1109/MWSCAS.2013 .6674882. [18] Rashidi, Bahram & Sayedi, S.M. & Rezaeian Farashahi, Reza. (2016). High-speed hardware architecture of scalar multiplication for binary elliptic curve cryptosystems. Microelectronics Journal. 52. 49- 65.10.1016/j.mejo.2016.03.006. [19] Lavanya, M & Praveenkumar, G & Lena Murugan, N & Vigneshwaran, M & Saravanan, S. (2016). Authentication scheme for client and server using elliptic curve cryptography. International Journal of Pharmacy and Technology. 8. 25317- 25325. [20] Mrabet, Amine & El-Mrabet, Nadia & Lashermes, Ronan & Rigaud, Jean-Baptiste & Bouallegue, Belgacem & Mesnager, Sihem & Machhout, Mohsen. (2017). High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication. 185-198. 10.1007/978-3-319-54876- 0_15. [21] Phalakarn, Kittiphop & Phalakarn, Kittiphon & Suppakitpaisarn, Vorapong. (2016). Parallelized Side- Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-Chains. 140-146. 10.1109/CANDAR.2016.0035. [22] S. R. Singh, A. K. Khan and S. R. Singh, "Performance evaluation of RSA and Elliptic Curve Cryptography," 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), IEEE Noida,2016,pp.302306.doi:10.1109/IC3I.2016.7917979 [23] N. Alimi, Y. Lahbib, M. Machhout and R. Tourki, "On Elliptic Curve Cryptography implementations and evaluation," 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), IEEE, Monastir, 2016, pp. 3540.doi:10.1109/ATSIP.2016. [24] M. M. Chauhan, "An implemented of hybrid cryptography using elliptic curve cryptosystem (ECC) and MD5," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore,2016,IEEE,pp.16.doi:10.1109/INVENTIV E.2016.7830092U [25] S. R. Singh, A. K. Khan and T. S. Singh, "A critical review on Elliptic Curve Cryptography," 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, 2016, pp. 13-18. doi:10.1109/ICACDOT.2016.7877543URL: http://ieeexplore.ieee.org/stamp/stamp.jsp? tp=&arnumber=7877543&isnumber=7877540 [26] X. Fang and Y. Wu, "Investigation into the elliptic curve cryptography," 2017 3rd International Conference on Information Management (ICIM), Chengdu, 2017,pp.412415.doi:10.1109/INFOMAN.2017.7950418 URL:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&ar number=7950418&isnumber=7950330 [27] M. Indaco, F. Lauri, A. Miele and P. Trotta, "An efficient many-core architecture for Elliptic Curve Cryptography security assessment," 2015 25th International Conference on Field Programmable Logic and Applications (FPL), London, 2015, pp. 1-6.doi: 10.1109/FPL.2015.7293950 URL:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&ar number=7293950&isnumber=7293744 [28] Kamal Kamal, Radu Muresan, "Capacitive physically unclonable function", Electrical and Computer Engineering (CCECE) 2017 IEEE 30th Canadian Conference on, pp. 1-6, 2017.