Comparative Analysis of Elliptic Curve Cryptography Methods and Survey of Its Applications

Authors

  • KM Abirami Ph.D Student, SASTRA Deemed University, Thanjavur – 613401, India
  • R. Srikanth Professor, SASTRA Deemed University, Thanjavur – 613401, India
  • R. Kavitha Department of Mathematics, Assistant Professor* SASTRA Deemed University, Thanjavur – 613401, India

Keywords:

ECC, Hyperelliptic curve, Encryption, Decryption, Application analysis

Abstract

Cyber security is a key priority in today's highly technological generation; by employing modern technologies, many security ways have been produced as of now; nevertheless, the gap to breach that security is also expanding, thus there is a need for improved security techniques. Elliptic Curve Cryptography (ECC) is the finest among all other earlier technologies by its uniquenature of untrace ability, compressibility and most importantly for its finite condition.This research looks into ECC and its improved variant, Hyperelliptic Curve Cryptography (HECC), as well as a survey of real-world applications of ECC and HECC are also detailed.

Downloads

Download data is not yet available.

References

Koblitz, Neal. "Elliptic curve cryptosystems." Mathematics of computation. 48.177 (1987):203-209.

Koblitz, Neal. "Hyperelliptic cryptosystems." Journal of cryptology 1.3 (1989): 139-150.

Cantor, David G. "Computing in the Jacobian of a hyperelliptic curve."Mathematics ofcomputation 48.177 (1987): 95-101.

Pelzl, Jan, et al. "Hyperelliptic curve cryptosystems: Closing the performance gap to ellipticcurves." Cryptographic Hardware and Embedded Systems-CHES 2003. Springer BerlinHeidelberg, 2003. 351-365.

Diffie, Whitfield, and Martin E. Hellman. "New directions in cryptography."InformationTheory, IEEE Transactions on 22.6 (1976): 644-654.

Merkle, Ralph C. "Secure communications over insecure channels."Communications of theACM 21.4 (1978): 294-299.

Rivest, Ronald L., Adi Shamir, and Len Adleman. "A method for obtaining digitalsignatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126.

Paar, Christof, and Jan Pelzl. Understanding cryptography: a textbook for students andpractitioners. Springer Science & Business Media, 2009.

ElGamal, Taher. "A public key cryptosystem and a signature scheme based on discretelogarithms." Advances in cryptology. Springer Berlin Heidelberg, 1984.

Harley, R. "Fast arithmetic on genus two curves; 2000."

Lange, Tanja. "Efficient arithmetic on hyperelliptic curves." IACR Cryptology ePrintArchive 2002 (2002): 107.

Matsuo, Kazuto, Jinhui Chao, and Shigeo Tsujii. "Fast genus two hyperelliptic curvecryptosystems." Technical Report ISEC2001-23, IEICE, (2001): 89-96.

Miyamoto, Yosuke, et al. "A fast addition algorithm of genus two hyperelliptic curve." The2002 Symposium on Cryptography and Information Security—SCIS 2002, IEICE Japan.2002.

Takahashi, Masashi. "Improving Harley algorithms for Jacobians of genus 2 hyperellipticcurves." SCIS, IEICE Japan (2002).

Dr. A. Pasumpon Pandian. “Development of Secure Cloud Based Storage Using the Elgamal HyperElliptic Curve Cryptography with Fuzzy Logic Based Integer Selection”. Journal of Soft Computing Paradigm(JSCP), (2020):2(1)24-35. DOI: https://doi.org/10.36548/jscp.2020.1.003

Shamsher Ullah and Nizamud Din. “Blind signcryption scheme based on hyper elliptic curvescryptosystem”. Peer-to-Peer Networking and Applications, (2021): 14:917–932, https://doi.org/10.1007/s12083-020-01044-8

B. Prasanalakshmi, et al. “Improved authentication and computation of medical datatransmission in the secure IoT using hyperelliptic curvecryptography”. The Journal of Supercomputing (2022): 78, 361–378. https://doi.org/10.1007/s11227-021-03861-x

AymenDiaEddineBerini et al. “HCALA: Hyperelliptic curve-based anonymous lightweightauthentication scheme for Internet of Drones”. Pervasive and Mobile Computing 92 (2023): 101798. https://doi.org/10.1016/j.pmcj.2023.101798

Naveed Ahmed Azam et al. “A novel image encryption scheme basedon elliptic curves and coupled map lattices”. Optik, 274 (2023): 17051. https://doi.org/10.1016/j.ijleo.2023.170517

Khalid Javeed et al. “EC-Crypto: Highly Efficient Area-Delay Optimized Elliptic Curve Cryptography Processor”. IEEEAccess. 11, (2023):56649-56662.

GolnazSahebi et al. “SEECC: A Secure and Efficient Elliptic Curve Cryptosystem for E-health Applications”. In 2016 International Conference on High Performance Computing & Simulation (HPCS). IEEE, Innsbruck, 492-500. DOI: https://doi.org/10.1109/HPCSim.2016.7568375

Sasank Venkata Vishnubhatla. “An Elliptic Curve Algorithm for IrisPattern Recognition”. In 2015 Annual Global Online Conference on Informationand Computer Technology (GOCICT). IEEE, Louisville, KY, 51-59. DOI:https://doi.org/10.1109/GOCICT.2015.19

Amit Dua et al. “Secure Message Communication Among Vehicles Using Elliptic CurveCryptography in Smart Cities”. In 2016 International Conference on Computer,Information and Telecommunication Systems (CITS). IEEE, Kunming, 1-6. DOI:https://doi.org/10.1109/CITS.2016.7546385

S. P. Ganesan. “An authentication Protocol For Mobile Devices using Hyper Elliptic Curve Cryptography”.In the ACEEE proceeding of International Journal of Recent Trends in Engineering and Technology, 3.2 (2010).

A. Klimm. “A Flexible Integrated Crypto processor for Authentication Protocols based on HyperellipticCurve Cryptography”.In the IEEE proceeding of International Symposium on System on Chip (SoC), 1(2010), 35-42.

D. Jian-zhi, C. Xiao-hui and G. Qiong, “Design of Hyper Elliptic Curve Digital Signature”.In the IEEEproceeding of International Conference on Information Technology and Computer Science, 2(2009):45-47.

Revathy, S. ., & Priya, S. S. . (2023). Enhancing the Efficiency of Attack Detection System Using Feature selection and Feature Discretization Methods. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 156–160. https://doi.org/10.17762/ijritcc.v11i4s.6322

Mark White, Thomas Wood, Carlos Rodríguez, Pekka Koskinen, Jónsson Ólafur. Machine Learning for Adaptive Assessment and Feedback. Kuwait Journal of Machine Learning, 2(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/169

Downloads

Published

30.08.2023

How to Cite

Abirami, K. ., Srikanth , R. ., & Kavitha, R. . (2023). Comparative Analysis of Elliptic Curve Cryptography Methods and Survey of Its Applications. International Journal of Intelligent Systems and Applications in Engineering, 11(11s), 430–434. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3509

Issue

Section

Research Article