SlideShare une entreprise Scribd logo
1  sur  6
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol.3, No.2, 2013- National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
53
ECC Cipher Processor Based On Knapsack Algorithm
Jitendra Sharma and Prashant Shukla (Corresponding author)
Department of Electronics & Communication Engineering, G.L.A. University, Mathura, U.P., India-
281406
E-mail: jitendrasharma_786@yahoo.com
Abstract
Elliptical Curve Cryptography (ECC) provides a secure means of exchanging keys among communicating hosts
using the Diffie Hellmen Key Exchange algorithm. This paper presents the implementation of ECC by first
transforming the message into an affine point on the elliptical curve (EC), and then applying the knapsack
algorithm on ECC encrypted message over the finite field gF(p). In ECC we normally start with an affine point
called Pm(x,y). This point lies on the elliptic curve. In this paper we have illustrated encryption/decryption
involving the ASCII value of the characters constituting the message, and then subjecting it to the knapsack
algorithm. Thus the modified plain text has been encrypted by application of the ECC method. The modification
of the plain text in conjunction with Pm and application of Knapsack algorithm is the new innovation of this
paper. The security of ECC relies on the difficulty of solving the Elliptic Curve Discrete Logarithm Problem
(ECDLP), i.e. finding k, given P and Q = kP. The problem is computationally intractable for large values of k.
Keywords: Discrete logarithm, elliptic curve cryptography (ECC), knapsack algorithm, public key cryptography,
RSA algorithm
1. Introduction
In 1976, Whitfield Diffie and Martin Hellman introduced the concept of Public Key Cryptography (PKC). Since
then, many implementations of it have been proposed, and many of these cryptographic applications are based
on their security on the intractability of hard mathematical problems, namely the Integer Factorization Problem
(IFP) and the finite field Discrete Logarithm Problem (DLP). Over the years, sub-exponential time algorithms
were developed to solve these problems. As a result, key sizes grew to more than 1000 bits, so as to attain a
reasonable level of security. In constrained environments where computing power, storage and bandwidth are
limited, carrying out thousand-bit operations becomes an impractical approach to providing adequate security. In
order to protect or exchange confidential data, the cryptography plays an important role in the security of the
information. Therefore, it is necessary to implement efficient cryptosystems, which can support applications
economically feasible. In this context, public key cryptography based on elliptic curves is widely used because it
presents higher security per key bit, and their main application is the private key exchange. Additionally, the
Elliptic Curve Cryptosystems (ECC) can be used in applications where the computation resources are limited
such as smart cards and cellular telephones. The ECC systems are included in the NIST (National Institute of
Standards and Technologies) and ANSI (American National Standard Institute) standards, and the principle
advantage over other systems of public key like RSA is the size of the parameters, which are very small,
however the ECC systems provide the same level of computational security. Some recent works on application
of ECC are cited here. Aydos et al. [1] Discusses the results of implementation of ECC over the field GF(p) on
an 80 MHz, 32 bit RAM microprocessor. Kristin et al. [8] provides an overview of ECC for wireless security. It
focuses on the performance advantages in the wireless environment by using ECC instead of the traditional RSA
cryptosystem. Ray et al. [3] explains the design of a generator, which automatically produces a customized ECC
hardware that meets user-defined requirements. Cilardo et al. [4] explains the engineering of ECC as a complex
interdisciplinary research field encompassing such fields as mathematics, computer science and electrical
engineering. McIvor et al. [7] introduces a novel hardware architecture for ECC over GF(p). Chen et al. [2]
presents a high performance EC cryptographic process for general curves over GF(p). The standard
specifications for public key cryptography are defined in [10]. The idea for extending knapsack algorithm to
encryption/decryption was derived by Diffie [5]. The ECC concept is very well documented and illustrated by
Williams Stallings [11]. In [12], Access control in sensor networks is used to authorize and grant users the right
to access the network and data collected by sensors. This paper describes a public key implementation of access
control in a sensor network. The paper, Moon [8] proposed a more efficient and novel approach of a scalar point
multiplication method than existing double and add by applying redundant recoding, which originates from
radix-4 Booths algorithm. Shi et al. [9], investigates whether some architectural parameters such as word size
may affect the choice of algorithms when implementing ECC with software.
2. Method Used:
ECC Encryption:
The Weiestrass equation defining an elliptic curve over GF(p), for q > 3, is as follows:
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol.3, No.2, 2013- National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
54
---------- (1)
Where, x, y are elements of GF(p), and a, b are integer modulo p, satisfying
) ----------- (2)
Here p is known as modular prime integer. An elliptic curve E over GF(p) consist of the solutions (x, y) defined
by Equations (1) and (2), along with an additional element called O, which is the point of EC at infinity. The set
of points (x, y) are said to be affine coordinate point representation.The basic Elliptic curve operations are point
addition and point doubling. Elliptic curve cryptographic primitives require scalar point multiplication. Say,
given a point P(x, y) on an EC, one needs to compute kP, where k is a positive integer. This is achieved by a
series of doubling and addition of P.
Algorithm1: General Key Flow (UAlice, UBob, Pm )
1: Begin
2: Initiate the connection with UAlice and UBob
3: if (U Alice and UBob is legitimate user) then
4: UBob = {P Bob, n Bob}//Key pair for UBob
5:UAlice = {P Alice, n Alice}//Key pair forUAlice
6:UBob = Send (PBob, UAlice) ;//Send the Public key of UBob to UAlice
7: UAlice =Send (PAlice, UBob );//Send the Public key of UAlice to UBob
8: UBob = Send (UAlice, Public information);
9: UAlice = Send (UBob, Public information);
10: endif
Algorithm 2: Encryption
1: //Encryption– Alice encrypts the message and sends it to Bob
2: if (Encryption=TRUE) then
3: Calculate the Pm ’: Pm’ = G.Pm, where Pm is the ASCII value of Plain Text and G is the base point of EC
4: Calculate the kPBob value
5: Calculate the Pm’ + kPBob = (x2, y2)
6: Calculate the kG = (x1, y1)
Hence the entire encrypted version for purposes of storing or transmission consists of two sets of coordinates as
follows:
Thus the modified plain text has been encrypted by application of the ECC method. The modification of the
plain text in conjunction with Pm and application of Knapsack algorithm is the new innovation of this paper.
We start with P(xP, yP ). To determine 2P, P is doubled. This should be an affine point on EC. Using the
following equation, which is a tangent to the curve at point P.
For the encryption process, a number of additions are required to take place. The formulae used to calculate the
value of the coordinates xR and yR are given as
Now to determine 3P, we use addition of points P and 2P, treating 2P=Q here P has coordinates (xP, yP) and
Q = 2P has coordinates (xQ,yQ).
In these two formulas of point addition and point doubling a variable S is calculated which is used for
computing the values of xR and yR for both point addition and point doubling calculation.
Therefore we apply doubling and addition depending on a sequence of operations determined for k.
Every point xR, yR evaluated by doubling or addition is an affine point.
For example a series of additions and doubling of P
P 2P 3P 6P 12P 24P 48P 96P
- Doubling Addition Doubling Doubling Doubling Doubling Doubling
Once the ECC encrypted version of the text message is obtained, the knapsack encryption is forced over
it. This is done to further secure the message from the hackers.
The most famous of the fallen algorithms is Ralph Merkle’s Knapsack problem.
Algorithm 3: Knapsack Encryption
1: S[x1] = Knapsack value(x1);
2: S[y1] = Knapsack value(y1);
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol.3, No.2, 2013- National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
55
3: S[x2] = Knapsack value(x2);
4: S[y2 ]=Knapsack value(y2);
5: Send(UBob , Cm =((S[x1 ], S[y1 ]),(S[x2 ], S[y2 ])));
As per the knapsack algorithm we calculate a cumulative sum S[x1 ],
In the final encrypted version the co-ordinate x is replaced by its equivalent S[x1]. Similarly other coordinates
like y1, x2, y2 are transformed by the knapsack algorithm, so that the encrypted message is now represented as
Cm = ((S[x1 ],S[y1 ]),(S[x2 ],S[y2 ])).
Depending on the number of characters in the message, there will be as many such pairs of integers. This is
either stored in archival device like CD/DVD or transmitted to a beneficiary through the Net.
Algorithm 4: Knapsack Decryption
1: //Decryption– Bob decrypts the message received from Alice
2: if (Decryption=TRUE) then
3: x1= Inverse Knapsack value (S[x1]);
4: y1 = Inverse Knapsack value (S[y1]);
5: x2 = Inverse Knapsack value (S[x2]);
6: y2 = Inverse Knapsack value
7: endif
The recipient B has all relevant information for reversing the knapsack procedure and to recover bit pattern of
the coordinates. For example B knows the ai series, his own secret key n, the base point G, a, b, p values of the
EC. B receives the encrypted message.
The x1 value is recovered in an iterative fashion as follows:
S[x1 ]- nm
.
If this value is positive i.e., S[x1] - n m
> 0, then a binary bit1 is assigned at the (m) position. The current value is
S[x1] = S[x1] - nm
. If however, the value is negative, then a bit0 is assigned and the S[x1] remains unchanged.
Now subtract nm-1
from the current S[x1]. Depending upon whether it is +ve or –ve, assign 1 or 0 at the relevant
bit position. Continue this subtraction until the series is exhausted. This will recover the binary bit pattern of x1.
These procedures are repeated for y1, x2, and y2.
Algorithm 5: ECC decryption
1: kG = (x1, y1);
2: Pm’ + kPBob = (x2, y2);
3: Calculate nBob kG = nBob (x1, y1);
4: Calculate P m’ = Pm’ + kPBob –nBob kG;
5: Calculate the Pm value from Pm’ using discrete logarithm.
The decryption involves the following procedures:
kG is represented by x1, y1, and P’
m+ kPB is represented by x, y.
In order to pull out P’
m from P’
m +kPB , B applies his secret key nB and multiplies kG so that,
nB kG = kPB .
Subtracting this from P'
m + kPB , to get P’
m as follows:
P’
m = P’
m + kPB - nBkG
This subtraction is another ECC procedure involving doubling and addition. But, the only difference is that the
negative term will have its y coordinate preceded by a minus sign. With this subtle change in mind, the
expression of determining the slope, new values of xR, yR are the same. Wherever y figures, it is substituted as -y.
This will yield P’
m. Using the discrete logarithm concept the ASCII value of ‘S’ can be retrieved as follows, P'
m =
S Pm.
3. PERFORMANCE COMPARISON USING VARIOUS TARGET DEVICES
The synthesis for various bit orders was done using different target devices and results were obtained and the
corresponding graphs were plotted. It is found that the target device VIRTEX-4 is more efficient compared to
SPARTAN-3E and VIRTEX-2 as it consumes less time to encrypt and decrypt a given data. Given below are the
graphs, Fig.1 and Fig.2, comparing the efficiency performance of the various target devices- SPARTAN-3E,
VIRTEX-2 and VIRTEX-4.
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol.3, No.2, 2013- National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
56
Fig.1 bit order Vs time period (ns) for encryption
Fig.2 bit order Vs time period (ns) for decryption
4. APPLICATIONS OF ECC
Wireless communications, where there is a speed and memory tradeoff, ECC allows for smaller keys
and faster processing times. This significantly improves the protocol execution speeds, and reduces power
consumption. This is significant in portable communication devices such as cell-phones and pagers. An ECC
implemented in this environment would be beneficial in ATM Machine as it has the reduced key sizes and
computations should significantly reduce transaction times, making it more convenient for the user. Phone cards,
and more generally Smart Cards, in most instances, important data is stored on the card, such as the amount of
money available on it.
5. CONCLUSION
The realization of ECC based cipher processor has been attempted. Scalar multiplication is the main operation
used to convert the plain text to cipher text, performed using point addition and point doubling. Once the ECC
encryption is done, further complexity is added to the cipher text by using Knapsack Algorithm.
The operations of point addition and point doubling include full adder, adder, carry save adder, squarer and
divider modules. The language used to code these modules is VHDL and that of the test benches is Verilog. The
modules are integrated to obtain ECC Encryption, Knapsack encryption, knapsack decryption and ECC
decryption. The software used to simulate the modules is Modelsim 6.1c. For synthesis, XILINX software is
used. From the synthesis result, it is obtained that the optimum target device is VERTIX -4. The performance of
encryption/ decryption on the target device with respect to time is shown in Fig.11 and Fig.12. The efficiency
with respect to area is shown in Fig.13 and Fig.14.
Thus, after a four stage process of ECC encryption, knapsack encryption, knapsack decryption, ECC decryption,
the ciphered text from the sender is deciphered at the receiver.
References
1. M.Aydos,T.Yanik,and C.K.Kog,”High-speed implementation of an ECC-based wireless
authentication protocol on an ARM microprocessor,” IEEE Proceedings of
Communication,vol.148,no.5, pp273-279.Oct.2001.
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol.3, No.2, 2013- National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
57
2. G.Chen,G.Bai,and H.Chen,” A High-performance elliptic curve cryptographic procressor for general
curves over GF(p) based on a systolic arithmetic unit,” IEEE Transactions on Circuits System-
II:Express Briefs,vol.54,no.5,pp.412-416,May 2007
3. R.C.C.Cheng,N.J.Baptiste,W.Luk,and P.Y.K.Chenug,”Customzablei elliptic curve cryptosystms,” IEEE
Transactions on VLSI Systems,vol.13,no.9,pp. 1048-1059,Sep- 2005.
4. A.Cilardo,L.Coppolino,N.Mazzocca,and L.Romano,”Elliptic curve cryptography engineering,”
Proceedings of the IEEE, vol.94,no.2,pp.395-406,Feb 2006.
5. W.Diffie,”The first ten years of Public Key cryptography,” Proceedings of IEEE, vol.76, no.5, pp.560-
577, May 1998.
6. K.Lauter,”The advantage of elliptic curve cryptography for wireless security,” IEEE Wireless
Communications, pp.62-67, Feb 2006.
7. C.J.Mclvor, M.McLoone, and J.V.McCanny, “Hardware elliptic curve cryptographic processor over
GF(p),” IEEE Transactions on Circuits Syst. I: Reg. Papers, vol.53, no.9, pp.1946-1957, Sep 2006.
8. S.Moon,”A Binary Reduandant Scalar point multiplication in secure elliptic curve cryptosystems,”
International Journel of Network Security, vol.3, no.2, pp.132-137, Sep 2006.
9. Z.J.Shi, and H.Yan, “Software implementation of elliptic curve cryptography,” International Journel of
Network Security, vol.7, no.2, pp.157-166, Sep 2008.
10. Standard specifications for Public Key Cryptography, IEEE Standard p1363, 2000.
11. W.Stallings, Cryptography and Network Security, Prentice Hall, 4th
Edition,2006.
12. H.Wang, B.Sheng, and Q.Li,”Elliptic curve cryptography-based access control in sensor networks,”
International Journel of security and networks, vol.1, no.3/4, pp.127-137, 2006.
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/Journals/
The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Contenu connexe

Tendances

A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network codingArash Pourdamghani
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
 
A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)Alexander Decker
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageKevin Tong
 
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMAM Publications
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...zaidinvisible
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLidescitation
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...RSIS International
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
Template Protection with Homomorphic Encryption
Template Protection with Homomorphic EncryptionTemplate Protection with Homomorphic Encryption
Template Protection with Homomorphic EncryptionTolun Tosun
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...ijsrd.com
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Tendances (18)

Genetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher EncryptionGenetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher Encryption
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network coding
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)
 
A03530107
A03530107A03530107
A03530107
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud Storage
 
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
Template Protection with Homomorphic Encryption
Template Protection with Homomorphic EncryptionTemplate Protection with Homomorphic Encryption
Template Protection with Homomorphic Encryption
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
 
Introduction to Network Coding
Introduction to Network CodingIntroduction to Network Coding
Introduction to Network Coding
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A1802040111
A1802040111A1802040111
A1802040111
 

En vedette

Administrative Executive Assistant/ Community Manager
Administrative Executive Assistant/ Community  Manager Administrative Executive Assistant/ Community  Manager
Administrative Executive Assistant/ Community Manager Barbara Vermillion
 
Letters to the judges austin kent
Letters to the judges austin kentLetters to the judges austin kent
Letters to the judges austin kentaustinkent
 
Rucarlimpo,lda projecto lavagem de automóveis a seco
Rucarlimpo,lda   projecto lavagem de automóveis a secoRucarlimpo,lda   projecto lavagem de automóveis a seco
Rucarlimpo,lda projecto lavagem de automóveis a secoAlberto Arlindo
 
The salt on salt
The salt on saltThe salt on salt
The salt on saltRomaLouise
 
Commuter rail study indonesian 0
Commuter rail study   indonesian 0Commuter rail study   indonesian 0
Commuter rail study indonesian 0tedy2629
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Contoh soalan kata nama am dan khas
Contoh soalan kata nama am dan khasContoh soalan kata nama am dan khas
Contoh soalan kata nama am dan khasMohd Makhtar
 
CNIT 126 8: Debugging
CNIT 126 8: DebuggingCNIT 126 8: Debugging
CNIT 126 8: DebuggingSam Bowne
 
Digital Security
Digital SecurityDigital Security
Digital Securityaccenture
 
Versato Complexo Residencial e Comercial Ceilândia
Versato Complexo Residencial e Comercial Ceilândia Versato Complexo Residencial e Comercial Ceilândia
Versato Complexo Residencial e Comercial Ceilândia Geraldo Pereira dos Santos
 
Importer Security Filing: What You Need To Know
Importer Security Filing: What You Need To KnowImporter Security Filing: What You Need To Know
Importer Security Filing: What You Need To KnowAFC International
 

En vedette (19)

Administrative Executive Assistant/ Community Manager
Administrative Executive Assistant/ Community  Manager Administrative Executive Assistant/ Community  Manager
Administrative Executive Assistant/ Community Manager
 
Pp2 roles joselin peña
Pp2 roles joselin peñaPp2 roles joselin peña
Pp2 roles joselin peña
 
Mr JL Radebe
Mr JL RadebeMr JL Radebe
Mr JL Radebe
 
Proyecto de vida
Proyecto de vidaProyecto de vida
Proyecto de vida
 
Letters to the judges austin kent
Letters to the judges austin kentLetters to the judges austin kent
Letters to the judges austin kent
 
Cv-Alessandra-Delle-Fave-it
Cv-Alessandra-Delle-Fave-itCv-Alessandra-Delle-Fave-it
Cv-Alessandra-Delle-Fave-it
 
Rucarlimpo,lda projecto lavagem de automóveis a seco
Rucarlimpo,lda   projecto lavagem de automóveis a secoRucarlimpo,lda   projecto lavagem de automóveis a seco
Rucarlimpo,lda projecto lavagem de automóveis a seco
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Session 5A OT 425 2017
Session 5A OT 425 2017Session 5A OT 425 2017
Session 5A OT 425 2017
 
The salt on salt
The salt on saltThe salt on salt
The salt on salt
 
Commuter rail study indonesian 0
Commuter rail study   indonesian 0Commuter rail study   indonesian 0
Commuter rail study indonesian 0
 
ABCs for New Importers
ABCs for New ImportersABCs for New Importers
ABCs for New Importers
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Contoh soalan kata nama am dan khas
Contoh soalan kata nama am dan khasContoh soalan kata nama am dan khas
Contoh soalan kata nama am dan khas
 
CNIT 126 8: Debugging
CNIT 126 8: DebuggingCNIT 126 8: Debugging
CNIT 126 8: Debugging
 
Resumen "LA VACA" DE Dr. CAMILO CRUZ
Resumen  "LA VACA" DE Dr. CAMILO CRUZResumen  "LA VACA" DE Dr. CAMILO CRUZ
Resumen "LA VACA" DE Dr. CAMILO CRUZ
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
Versato Complexo Residencial e Comercial Ceilândia
Versato Complexo Residencial e Comercial Ceilândia Versato Complexo Residencial e Comercial Ceilândia
Versato Complexo Residencial e Comercial Ceilândia
 
Importer Security Filing: What You Need To Know
Importer Security Filing: What You Need To KnowImporter Security Filing: What You Need To Know
Importer Security Filing: What You Need To Know
 

Similaire à Ecc cipher processor based on knapsack algorithm

Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSORCOUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSORIJNSA Journal
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...CSITiaesprime
 
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...CSCJournals
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioIJECEIAES
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...IJECEIAES
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12IJASCSE
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYijujournal
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYijujournal
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Securityrahulmonikasharma
 

Similaire à Ecc cipher processor based on knapsack algorithm (20)

Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSORCOUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...
 
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
 
Analysis of a Modified RC4
Analysis of a Modified RC4 Analysis of a Modified RC4
Analysis of a Modified RC4
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
 

Plus de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Plus de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Ecc cipher processor based on knapsack algorithm

  • 1. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol.3, No.2, 2013- National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering 53 ECC Cipher Processor Based On Knapsack Algorithm Jitendra Sharma and Prashant Shukla (Corresponding author) Department of Electronics & Communication Engineering, G.L.A. University, Mathura, U.P., India- 281406 E-mail: jitendrasharma_786@yahoo.com Abstract Elliptical Curve Cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the Diffie Hellmen Key Exchange algorithm. This paper presents the implementation of ECC by first transforming the message into an affine point on the elliptical curve (EC), and then applying the knapsack algorithm on ECC encrypted message over the finite field gF(p). In ECC we normally start with an affine point called Pm(x,y). This point lies on the elliptic curve. In this paper we have illustrated encryption/decryption involving the ASCII value of the characters constituting the message, and then subjecting it to the knapsack algorithm. Thus the modified plain text has been encrypted by application of the ECC method. The modification of the plain text in conjunction with Pm and application of Knapsack algorithm is the new innovation of this paper. The security of ECC relies on the difficulty of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP), i.e. finding k, given P and Q = kP. The problem is computationally intractable for large values of k. Keywords: Discrete logarithm, elliptic curve cryptography (ECC), knapsack algorithm, public key cryptography, RSA algorithm 1. Introduction In 1976, Whitfield Diffie and Martin Hellman introduced the concept of Public Key Cryptography (PKC). Since then, many implementations of it have been proposed, and many of these cryptographic applications are based on their security on the intractability of hard mathematical problems, namely the Integer Factorization Problem (IFP) and the finite field Discrete Logarithm Problem (DLP). Over the years, sub-exponential time algorithms were developed to solve these problems. As a result, key sizes grew to more than 1000 bits, so as to attain a reasonable level of security. In constrained environments where computing power, storage and bandwidth are limited, carrying out thousand-bit operations becomes an impractical approach to providing adequate security. In order to protect or exchange confidential data, the cryptography plays an important role in the security of the information. Therefore, it is necessary to implement efficient cryptosystems, which can support applications economically feasible. In this context, public key cryptography based on elliptic curves is widely used because it presents higher security per key bit, and their main application is the private key exchange. Additionally, the Elliptic Curve Cryptosystems (ECC) can be used in applications where the computation resources are limited such as smart cards and cellular telephones. The ECC systems are included in the NIST (National Institute of Standards and Technologies) and ANSI (American National Standard Institute) standards, and the principle advantage over other systems of public key like RSA is the size of the parameters, which are very small, however the ECC systems provide the same level of computational security. Some recent works on application of ECC are cited here. Aydos et al. [1] Discusses the results of implementation of ECC over the field GF(p) on an 80 MHz, 32 bit RAM microprocessor. Kristin et al. [8] provides an overview of ECC for wireless security. It focuses on the performance advantages in the wireless environment by using ECC instead of the traditional RSA cryptosystem. Ray et al. [3] explains the design of a generator, which automatically produces a customized ECC hardware that meets user-defined requirements. Cilardo et al. [4] explains the engineering of ECC as a complex interdisciplinary research field encompassing such fields as mathematics, computer science and electrical engineering. McIvor et al. [7] introduces a novel hardware architecture for ECC over GF(p). Chen et al. [2] presents a high performance EC cryptographic process for general curves over GF(p). The standard specifications for public key cryptography are defined in [10]. The idea for extending knapsack algorithm to encryption/decryption was derived by Diffie [5]. The ECC concept is very well documented and illustrated by Williams Stallings [11]. In [12], Access control in sensor networks is used to authorize and grant users the right to access the network and data collected by sensors. This paper describes a public key implementation of access control in a sensor network. The paper, Moon [8] proposed a more efficient and novel approach of a scalar point multiplication method than existing double and add by applying redundant recoding, which originates from radix-4 Booths algorithm. Shi et al. [9], investigates whether some architectural parameters such as word size may affect the choice of algorithms when implementing ECC with software. 2. Method Used: ECC Encryption: The Weiestrass equation defining an elliptic curve over GF(p), for q > 3, is as follows:
  • 2. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol.3, No.2, 2013- National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering 54 ---------- (1) Where, x, y are elements of GF(p), and a, b are integer modulo p, satisfying ) ----------- (2) Here p is known as modular prime integer. An elliptic curve E over GF(p) consist of the solutions (x, y) defined by Equations (1) and (2), along with an additional element called O, which is the point of EC at infinity. The set of points (x, y) are said to be affine coordinate point representation.The basic Elliptic curve operations are point addition and point doubling. Elliptic curve cryptographic primitives require scalar point multiplication. Say, given a point P(x, y) on an EC, one needs to compute kP, where k is a positive integer. This is achieved by a series of doubling and addition of P. Algorithm1: General Key Flow (UAlice, UBob, Pm ) 1: Begin 2: Initiate the connection with UAlice and UBob 3: if (U Alice and UBob is legitimate user) then 4: UBob = {P Bob, n Bob}//Key pair for UBob 5:UAlice = {P Alice, n Alice}//Key pair forUAlice 6:UBob = Send (PBob, UAlice) ;//Send the Public key of UBob to UAlice 7: UAlice =Send (PAlice, UBob );//Send the Public key of UAlice to UBob 8: UBob = Send (UAlice, Public information); 9: UAlice = Send (UBob, Public information); 10: endif Algorithm 2: Encryption 1: //Encryption– Alice encrypts the message and sends it to Bob 2: if (Encryption=TRUE) then 3: Calculate the Pm ’: Pm’ = G.Pm, where Pm is the ASCII value of Plain Text and G is the base point of EC 4: Calculate the kPBob value 5: Calculate the Pm’ + kPBob = (x2, y2) 6: Calculate the kG = (x1, y1) Hence the entire encrypted version for purposes of storing or transmission consists of two sets of coordinates as follows: Thus the modified plain text has been encrypted by application of the ECC method. The modification of the plain text in conjunction with Pm and application of Knapsack algorithm is the new innovation of this paper. We start with P(xP, yP ). To determine 2P, P is doubled. This should be an affine point on EC. Using the following equation, which is a tangent to the curve at point P. For the encryption process, a number of additions are required to take place. The formulae used to calculate the value of the coordinates xR and yR are given as Now to determine 3P, we use addition of points P and 2P, treating 2P=Q here P has coordinates (xP, yP) and Q = 2P has coordinates (xQ,yQ). In these two formulas of point addition and point doubling a variable S is calculated which is used for computing the values of xR and yR for both point addition and point doubling calculation. Therefore we apply doubling and addition depending on a sequence of operations determined for k. Every point xR, yR evaluated by doubling or addition is an affine point. For example a series of additions and doubling of P P 2P 3P 6P 12P 24P 48P 96P - Doubling Addition Doubling Doubling Doubling Doubling Doubling Once the ECC encrypted version of the text message is obtained, the knapsack encryption is forced over it. This is done to further secure the message from the hackers. The most famous of the fallen algorithms is Ralph Merkle’s Knapsack problem. Algorithm 3: Knapsack Encryption 1: S[x1] = Knapsack value(x1); 2: S[y1] = Knapsack value(y1);
  • 3. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol.3, No.2, 2013- National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering 55 3: S[x2] = Knapsack value(x2); 4: S[y2 ]=Knapsack value(y2); 5: Send(UBob , Cm =((S[x1 ], S[y1 ]),(S[x2 ], S[y2 ]))); As per the knapsack algorithm we calculate a cumulative sum S[x1 ], In the final encrypted version the co-ordinate x is replaced by its equivalent S[x1]. Similarly other coordinates like y1, x2, y2 are transformed by the knapsack algorithm, so that the encrypted message is now represented as Cm = ((S[x1 ],S[y1 ]),(S[x2 ],S[y2 ])). Depending on the number of characters in the message, there will be as many such pairs of integers. This is either stored in archival device like CD/DVD or transmitted to a beneficiary through the Net. Algorithm 4: Knapsack Decryption 1: //Decryption– Bob decrypts the message received from Alice 2: if (Decryption=TRUE) then 3: x1= Inverse Knapsack value (S[x1]); 4: y1 = Inverse Knapsack value (S[y1]); 5: x2 = Inverse Knapsack value (S[x2]); 6: y2 = Inverse Knapsack value 7: endif The recipient B has all relevant information for reversing the knapsack procedure and to recover bit pattern of the coordinates. For example B knows the ai series, his own secret key n, the base point G, a, b, p values of the EC. B receives the encrypted message. The x1 value is recovered in an iterative fashion as follows: S[x1 ]- nm . If this value is positive i.e., S[x1] - n m > 0, then a binary bit1 is assigned at the (m) position. The current value is S[x1] = S[x1] - nm . If however, the value is negative, then a bit0 is assigned and the S[x1] remains unchanged. Now subtract nm-1 from the current S[x1]. Depending upon whether it is +ve or –ve, assign 1 or 0 at the relevant bit position. Continue this subtraction until the series is exhausted. This will recover the binary bit pattern of x1. These procedures are repeated for y1, x2, and y2. Algorithm 5: ECC decryption 1: kG = (x1, y1); 2: Pm’ + kPBob = (x2, y2); 3: Calculate nBob kG = nBob (x1, y1); 4: Calculate P m’ = Pm’ + kPBob –nBob kG; 5: Calculate the Pm value from Pm’ using discrete logarithm. The decryption involves the following procedures: kG is represented by x1, y1, and P’ m+ kPB is represented by x, y. In order to pull out P’ m from P’ m +kPB , B applies his secret key nB and multiplies kG so that, nB kG = kPB . Subtracting this from P' m + kPB , to get P’ m as follows: P’ m = P’ m + kPB - nBkG This subtraction is another ECC procedure involving doubling and addition. But, the only difference is that the negative term will have its y coordinate preceded by a minus sign. With this subtle change in mind, the expression of determining the slope, new values of xR, yR are the same. Wherever y figures, it is substituted as -y. This will yield P’ m. Using the discrete logarithm concept the ASCII value of ‘S’ can be retrieved as follows, P' m = S Pm. 3. PERFORMANCE COMPARISON USING VARIOUS TARGET DEVICES The synthesis for various bit orders was done using different target devices and results were obtained and the corresponding graphs were plotted. It is found that the target device VIRTEX-4 is more efficient compared to SPARTAN-3E and VIRTEX-2 as it consumes less time to encrypt and decrypt a given data. Given below are the graphs, Fig.1 and Fig.2, comparing the efficiency performance of the various target devices- SPARTAN-3E, VIRTEX-2 and VIRTEX-4.
  • 4. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol.3, No.2, 2013- National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering 56 Fig.1 bit order Vs time period (ns) for encryption Fig.2 bit order Vs time period (ns) for decryption 4. APPLICATIONS OF ECC Wireless communications, where there is a speed and memory tradeoff, ECC allows for smaller keys and faster processing times. This significantly improves the protocol execution speeds, and reduces power consumption. This is significant in portable communication devices such as cell-phones and pagers. An ECC implemented in this environment would be beneficial in ATM Machine as it has the reduced key sizes and computations should significantly reduce transaction times, making it more convenient for the user. Phone cards, and more generally Smart Cards, in most instances, important data is stored on the card, such as the amount of money available on it. 5. CONCLUSION The realization of ECC based cipher processor has been attempted. Scalar multiplication is the main operation used to convert the plain text to cipher text, performed using point addition and point doubling. Once the ECC encryption is done, further complexity is added to the cipher text by using Knapsack Algorithm. The operations of point addition and point doubling include full adder, adder, carry save adder, squarer and divider modules. The language used to code these modules is VHDL and that of the test benches is Verilog. The modules are integrated to obtain ECC Encryption, Knapsack encryption, knapsack decryption and ECC decryption. The software used to simulate the modules is Modelsim 6.1c. For synthesis, XILINX software is used. From the synthesis result, it is obtained that the optimum target device is VERTIX -4. The performance of encryption/ decryption on the target device with respect to time is shown in Fig.11 and Fig.12. The efficiency with respect to area is shown in Fig.13 and Fig.14. Thus, after a four stage process of ECC encryption, knapsack encryption, knapsack decryption, ECC decryption, the ciphered text from the sender is deciphered at the receiver. References 1. M.Aydos,T.Yanik,and C.K.Kog,”High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor,” IEEE Proceedings of Communication,vol.148,no.5, pp273-279.Oct.2001.
  • 5. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol.3, No.2, 2013- National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering 57 2. G.Chen,G.Bai,and H.Chen,” A High-performance elliptic curve cryptographic procressor for general curves over GF(p) based on a systolic arithmetic unit,” IEEE Transactions on Circuits System- II:Express Briefs,vol.54,no.5,pp.412-416,May 2007 3. R.C.C.Cheng,N.J.Baptiste,W.Luk,and P.Y.K.Chenug,”Customzablei elliptic curve cryptosystms,” IEEE Transactions on VLSI Systems,vol.13,no.9,pp. 1048-1059,Sep- 2005. 4. A.Cilardo,L.Coppolino,N.Mazzocca,and L.Romano,”Elliptic curve cryptography engineering,” Proceedings of the IEEE, vol.94,no.2,pp.395-406,Feb 2006. 5. W.Diffie,”The first ten years of Public Key cryptography,” Proceedings of IEEE, vol.76, no.5, pp.560- 577, May 1998. 6. K.Lauter,”The advantage of elliptic curve cryptography for wireless security,” IEEE Wireless Communications, pp.62-67, Feb 2006. 7. C.J.Mclvor, M.McLoone, and J.V.McCanny, “Hardware elliptic curve cryptographic processor over GF(p),” IEEE Transactions on Circuits Syst. I: Reg. Papers, vol.53, no.9, pp.1946-1957, Sep 2006. 8. S.Moon,”A Binary Reduandant Scalar point multiplication in secure elliptic curve cryptosystems,” International Journel of Network Security, vol.3, no.2, pp.132-137, Sep 2006. 9. Z.J.Shi, and H.Yan, “Software implementation of elliptic curve cryptography,” International Journel of Network Security, vol.7, no.2, pp.157-166, Sep 2008. 10. Standard specifications for Public Key Cryptography, IEEE Standard p1363, 2000. 11. W.Stallings, Cryptography and Network Security, Prentice Hall, 4th Edition,2006. 12. H.Wang, B.Sheng, and Q.Li,”Elliptic curve cryptography-based access control in sensor networks,” International Journel of security and networks, vol.1, no.3/4, pp.127-137, 2006.
  • 6. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar