Skip to main content

ECC Based Encryption Algorithm for Lightweight Cryptography

  • Conference paper
  • First Online:
Intelligent Systems Design and Applications (ISDA 2018 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 940))

Abstract

Cryptography can be considered as toolbox, where potential attackers have access to different computing resources and techniques to try and calculate key values. In a modern cryptography the strength of the cryptographic algorithm is nothing but the key size. So, our objective is to generate strong key value having minimum length of bits which will be useful in lightweight cryptography. Using Elliptic Curve Cryptography (ECC) with algebraic graph we are finding secret key value. ECC is itself a strong algorithm which generates pair of public and private We are generating secret key value with the help of above pair of key. Secret key parameters not shared in network so it will defense against man-in-middle attack. In this paper we are performing encryption and decryption process with mid-point of graph. This algorithm may be applicable for Smart card, Sensors and wireless network security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  Google Scholar 

  2. Miller, V.S.: Use of elliptic curves in cryptograph. In: Advances in Cryptology—CRYPTO 1985 Proceedings (1985)

    Google Scholar 

  3. Brown, M., et al.: Software implementation of the NIST elliptic curves over prime fields. Springer, Berlin (2001)

    Google Scholar 

  4. Kumar, R., Shiv, Y., Kumar, V., Wairiya, M.: An authentication technique in mobile Ad hoc network using elliptic curve cryptography. In: 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2018)

    Google Scholar 

  5. Shiv, Y., Kumar, R., Kumar, V., Wairiya, M.: A lightweight authentication cheme for wearable medical sensors. In: 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, pp. 366–370 (2018). https://doi.org/10.1109/CONFLUENCE.2018.8442960

  6. Doerner, J., Kondi, Y., Lee, E., Shelat, A.: Secure two-party threshold ECDSA from ECDSA assumptions. In: 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, pp. 980–997 (2018). https://doi.org/10.1109/SP.2018.00036, https://medium.com/coinmonks/elliptic-curve-cryptography-6de8fc748b8b

  7. Koko, S.O.A.L.F.M., Nabi Mustafa, A.B.A.: Comparison of various encryption algorithms and techniques for improving secured data communication. IOSR J. Comput. Eng. (IOSR-JCE) 17(1), 62–69 (2015). e-ISSN 2278-0661, p-ISSN 2278-8727, www.iosrjournals.org

  8. Fathima, H.: Comparative study of symmetric key algorithms-des, AES and Blowfish. Published by Global Journals Inc. (USA) Double Blind Peer Reviewed International Research Journal 17(2) Version 1.0 (2017). Online ISSN 0975-4172 & Print ISSN 0975-4350

    Google Scholar 

  9. Suresh, M., Neema, M.: Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Things. Procedia Technol. 25, 248–255 (2016). https://doi.org/10.1016/j.protcy.2016.08.104. ISSN 2212-0173

    Article  Google Scholar 

  10. Alvarez, R., Caballero-Gil, C., Santonja, J., Zamora, A.: Algorithms for lightweight key exchange. Sensors 17(7), 1517 (2017)

    Article  Google Scholar 

  11. Forouzan, B., Mukhopadhyay, D.: Cryptography and Network Security, 3rd edn, pp. 283–290. McGraw-Hill, New York (2015)

    Google Scholar 

  12. Mahto, D., Yadav, D.K.: RSA and ECC: a comparative analysis. Int. J. Appl. Eng. Res. 12(19), 9053–9061 (2017). ISSN 0973-4562, http://www.ripublication.com

  13. Bafandehkar, M., Yasin, S., Mahmod, R., Hanapi, Z.M.: Comparison of ECC and RSA algorithm in resource constrained devices. In: 2013 International Conference on IT Convergence and Security, ICITCS 2013, pp. 1–3 (2013). https://doi.org/10.1109/ICITCS.2013.6717816

  14. Bhardwaj, I., Kumar, A., Bansal, M.: A review on lightweight cryptography algorithms for data security and authentication in IoTs (2017). https://doi.org/10.1109/ISPCC.2017.8269731

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anita Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Banerjee, S., Patil, A. (2020). ECC Based Encryption Algorithm for Lightweight Cryptography. In: Abraham, A., Cherukuri, A.K., Melin, P., Gandhi, N. (eds) Intelligent Systems Design and Applications. ISDA 2018 2018. Advances in Intelligent Systems and Computing, vol 940. Springer, Cham. https://doi.org/10.1007/978-3-030-16657-1_56

Download citation

Publish with us

Policies and ethics