Comparative Analysis of Elliptic Curve Cryptography Methods and Survey of Its Applications
Keywords:
ECC, Hyperelliptic curve, Encryption, Decryption, Application analysisAbstract
Cyber security is a key priority in today's highly technological generation; by employing modern technologies, many security ways have been produced as of now; nevertheless, the gap to breach that security is also expanding, thus there is a need for improved security techniques. Elliptic Curve Cryptography (ECC) is the finest among all other earlier technologies by its uniquenature of untrace ability, compressibility and most importantly for its finite condition.This research looks into ECC and its improved variant, Hyperelliptic Curve Cryptography (HECC), as well as a survey of real-world applications of ECC and HECC are also detailed.
Downloads
References
Koblitz, Neal. "Elliptic curve cryptosystems." Mathematics of computation. 48.177 (1987):203-209.
Koblitz, Neal. "Hyperelliptic cryptosystems." Journal of cryptology 1.3 (1989): 139-150.
Cantor, David G. "Computing in the Jacobian of a hyperelliptic curve."Mathematics ofcomputation 48.177 (1987): 95-101.
Pelzl, Jan, et al. "Hyperelliptic curve cryptosystems: Closing the performance gap to ellipticcurves." Cryptographic Hardware and Embedded Systems-CHES 2003. Springer BerlinHeidelberg, 2003. 351-365.
Diffie, Whitfield, and Martin E. Hellman. "New directions in cryptography."InformationTheory, IEEE Transactions on 22.6 (1976): 644-654.
Merkle, Ralph C. "Secure communications over insecure channels."Communications of theACM 21.4 (1978): 294-299.
Rivest, Ronald L., Adi Shamir, and Len Adleman. "A method for obtaining digitalsignatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126.
Paar, Christof, and Jan Pelzl. Understanding cryptography: a textbook for students andpractitioners. Springer Science & Business Media, 2009.
ElGamal, Taher. "A public key cryptosystem and a signature scheme based on discretelogarithms." Advances in cryptology. Springer Berlin Heidelberg, 1984.
Harley, R. "Fast arithmetic on genus two curves; 2000."
Lange, Tanja. "Efficient arithmetic on hyperelliptic curves." IACR Cryptology ePrintArchive 2002 (2002): 107.
Matsuo, Kazuto, Jinhui Chao, and Shigeo Tsujii. "Fast genus two hyperelliptic curvecryptosystems." Technical Report ISEC2001-23, IEICE, (2001): 89-96.
Miyamoto, Yosuke, et al. "A fast addition algorithm of genus two hyperelliptic curve." The2002 Symposium on Cryptography and Information Security—SCIS 2002, IEICE Japan.2002.
Takahashi, Masashi. "Improving Harley algorithms for Jacobians of genus 2 hyperellipticcurves." SCIS, IEICE Japan (2002).
Dr. A. Pasumpon Pandian. “Development of Secure Cloud Based Storage Using the Elgamal HyperElliptic Curve Cryptography with Fuzzy Logic Based Integer Selection”. Journal of Soft Computing Paradigm(JSCP), (2020):2(1)24-35. DOI: https://doi.org/10.36548/jscp.2020.1.003
Shamsher Ullah and Nizamud Din. “Blind signcryption scheme based on hyper elliptic curvescryptosystem”. Peer-to-Peer Networking and Applications, (2021): 14:917–932, https://doi.org/10.1007/s12083-020-01044-8
B. Prasanalakshmi, et al. “Improved authentication and computation of medical datatransmission in the secure IoT using hyperelliptic curvecryptography”. The Journal of Supercomputing (2022): 78, 361–378. https://doi.org/10.1007/s11227-021-03861-x
AymenDiaEddineBerini et al. “HCALA: Hyperelliptic curve-based anonymous lightweightauthentication scheme for Internet of Drones”. Pervasive and Mobile Computing 92 (2023): 101798. https://doi.org/10.1016/j.pmcj.2023.101798
Naveed Ahmed Azam et al. “A novel image encryption scheme basedon elliptic curves and coupled map lattices”. Optik, 274 (2023): 17051. https://doi.org/10.1016/j.ijleo.2023.170517
Khalid Javeed et al. “EC-Crypto: Highly Efficient Area-Delay Optimized Elliptic Curve Cryptography Processor”. IEEEAccess. 11, (2023):56649-56662.
GolnazSahebi et al. “SEECC: A Secure and Efficient Elliptic Curve Cryptosystem for E-health Applications”. In 2016 International Conference on High Performance Computing & Simulation (HPCS). IEEE, Innsbruck, 492-500. DOI: https://doi.org/10.1109/HPCSim.2016.7568375
Sasank Venkata Vishnubhatla. “An Elliptic Curve Algorithm for IrisPattern Recognition”. In 2015 Annual Global Online Conference on Informationand Computer Technology (GOCICT). IEEE, Louisville, KY, 51-59. DOI:https://doi.org/10.1109/GOCICT.2015.19
Amit Dua et al. “Secure Message Communication Among Vehicles Using Elliptic CurveCryptography in Smart Cities”. In 2016 International Conference on Computer,Information and Telecommunication Systems (CITS). IEEE, Kunming, 1-6. DOI:https://doi.org/10.1109/CITS.2016.7546385
S. P. Ganesan. “An authentication Protocol For Mobile Devices using Hyper Elliptic Curve Cryptography”.In the ACEEE proceeding of International Journal of Recent Trends in Engineering and Technology, 3.2 (2010).
A. Klimm. “A Flexible Integrated Crypto processor for Authentication Protocols based on HyperellipticCurve Cryptography”.In the IEEE proceeding of International Symposium on System on Chip (SoC), 1(2010), 35-42.
D. Jian-zhi, C. Xiao-hui and G. Qiong, “Design of Hyper Elliptic Curve Digital Signature”.In the IEEEproceeding of International Conference on Information Technology and Computer Science, 2(2009):45-47.
Revathy, S. ., & Priya, S. S. . (2023). Enhancing the Efficiency of Attack Detection System Using Feature selection and Feature Discretization Methods. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 156–160. https://doi.org/10.17762/ijritcc.v11i4s.6322
Mark White, Thomas Wood, Carlos Rodríguez, Pekka Koskinen, Jónsson Ólafur. Machine Learning for Adaptive Assessment and Feedback. Kuwait Journal of Machine Learning, 2(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/169
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.