Embedment Of Montgomery Algorithm On Elliptic Curve Cryptography Over RSA Public Key Cryptography

被引:1
作者
Thomas, Aswathi [1 ]
Manuel, Ebin M. [1 ]
机构
[1] Govt Coll Engn, Dept ECE, Idukki, Kerala, India
来源
INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015) | 2016年 / 24卷
关键词
cryptosystem; RSA; ECC; modular multiplication; Montgomery multiplication;
D O I
10.1016/j.protcy.2016.05.179
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Elliptic Curve cryptosystem has replaced the prevailing first generation public key algorithms - RSA and Diffie - Hellman due its shorter key size requirement. This paper presents a modified Elliptic Curve and RSA cryptosystem by incorporating a newly designed Montgomery multiplier algorithm for better efficiency. The inherent disadvantage of delay due to the large number of computations in Elliptic Curve cryptography is improved substantially by the implantation of the modified Montgomery algorithm in it. The simulation results show significant improvement in terms of speed and power. (C) 2016 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:911 / 917
页数:7
相关论文
共 50 条
  • [41] Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography
    Jiang, Kun
    Zhao, Bing
    Shan, Weijun
    Wang, Lihui
    Liu, Jing
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 233 - 236
  • [42] Effective Implementations of Scalar Multiplications in Elliptic Curve Cryptography
    Menandas, Josepha J.
    Christo, Mary Subaja
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [43] Hardware architectures for public key cryptography
    Batina, L
    Örs, SB
    Preneel, B
    Vandewalle, J
    INTEGRATION-THE VLSI JOURNAL, 2003, 34 (1-2) : 1 - 64
  • [44] Ephemeral Encoding Message in the Elliptic Curve Cryptography for IoT
    Baccouri, Sondes
    Fatrhat, Hassene
    Gharbi, Nadia
    Tahar, Rafaa
    Azzabi, Tarek
    Attia, Pr. Rabah
    PROCEEDINGS OF THE 2022 5TH INTERNATIONAL CONFERENCE ON ADVANCED SYSTEMS AND EMERGENT TECHNOLOGIES IC_ASET'2022), 2022, : 172 - 177
  • [45] Research Issues on Elliptic Curve Cryptography and Its applications
    Shanmugalakshmi, R.
    Prabu, M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (06): : 19 - 22
  • [46] Elliptic Curve Cryptography: Current Status and Research Challenges
    Kalra, Sheetal
    Sood, Sandeep K.
    HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 455 - +
  • [47] Error analysis and detection procedures for elliptic curve cryptography
    Saudy, Naglaa F.
    Ali, Ihab A.
    Al Barkouky, Reda
    AIN SHAMS ENGINEERING JOURNAL, 2019, 10 (03) : 587 - 597
  • [48] Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
    Abdaoui, Abderrazak
    Erbad, Aiman
    Al-Ali, Abdulla Khalid
    Mohamed, Amr
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9987 - 9998
  • [49] An enhancement of EAACK using P2P ACK and RSA public key cryptography
    Thiyagarajan, R.
    Priya, B. Meenakshi
    MEASUREMENT, 2019, 136 : 116 - 121
  • [50] Demystifying elliptic curve cryptography : Curve selection, implementation and countermeasures to attacks
    Dhanda, Sumit Singh
    Singh, Brahmjit
    Jindal, Poonam
    JOURNAL OF INTERDISCIPLINARY MATHEMATICS, 2020, 23 (02) : 463 - 470