Embedment Of Montgomery Algorithm On Elliptic Curve Cryptography Over RSA Public Key Cryptography

被引:1
|
作者
Thomas, Aswathi [1 ]
Manuel, Ebin M. [1 ]
机构
[1] Govt Coll Engn, Dept ECE, Idukki, Kerala, India
来源
INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015) | 2016年 / 24卷
关键词
cryptosystem; RSA; ECC; modular multiplication; Montgomery multiplication;
D O I
10.1016/j.protcy.2016.05.179
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Elliptic Curve cryptosystem has replaced the prevailing first generation public key algorithms - RSA and Diffie - Hellman due its shorter key size requirement. This paper presents a modified Elliptic Curve and RSA cryptosystem by incorporating a newly designed Montgomery multiplier algorithm for better efficiency. The inherent disadvantage of delay due to the large number of computations in Elliptic Curve cryptography is improved substantially by the implantation of the modified Montgomery algorithm in it. The simulation results show significant improvement in terms of speed and power. (C) 2016 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:911 / 917
页数:7
相关论文
共 50 条
  • [21] Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography
    Vasyltsov, Ihor
    Saldamli, Gokay
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 256 - 267
  • [22] A Novel Fast η-Adapt Slide Window Elliptic Curve Cryptography Algorithm
    Shi, Hongxia
    Ouyang, Yi
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 56 - +
  • [23] A Comparative and Overview Analysis of Elliptic Curve Cryptography Over Finite Fields
    Prabu, M.
    Shanmugalakshmi, R.
    2009 INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY, PROCEEDINGS, 2009, : 495 - +
  • [24] Design and Implementation of Unreliable CFDP Protocol over Elliptic Curve Cryptography
    Aswatha, A. R.
    Sasi, Smitha
    Santhosh, B.
    Mehta, Deval
    Babuprasad, Shweta
    SMART INTELLIGENT COMPUTING AND APPLICATIONS, VOL 2, 2020, 160 : 627 - 638
  • [25] A Lightweight Key Establishment in Wireless Sensor Network Based on Elliptic Curve Cryptography
    Ju, Song
    2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 138 - 141
  • [26] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [27] Generalized Fibonacci Sequences for Elliptic Curve Cryptography
    Cheddour, Zakariae
    Chillali, Abdelhakim
    Mouhib, Ali
    MATHEMATICS, 2023, 11 (22)
  • [28] Review of Elliptic Curve Cryptography processor designs
    Marzouqi, Hamad
    Al-Qutayri, Mahmoud
    Salah, Khaled
    MICROPROCESSORS AND MICROSYSTEMS, 2015, 39 (02) : 97 - 112
  • [29] Efficient Elliptic Curve Cryptography for Embedded Devices
    Liu, Zhe
    Weng, Jian
    Hu, Zhi
    Seo, Hwajeong
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [30] A Study of Elliptic Curve Cryptography and Its Applications
    Nikhil, U. Vijay
    Stamenkovic, Z.
    Raja, S. P.
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2024,