Abstract
Cryptography can be considered as toolbox, where potential attackers have access to different computing resources and techniques to try and calculate key values. In a modern cryptography the strength of the cryptographic algorithm is nothing but the key size. So, our objective is to generate strong key value having minimum length of bits which will be useful in lightweight cryptography. Using Elliptic Curve Cryptography (ECC) with algebraic graph we are finding secret key value. ECC is itself a strong algorithm which generates pair of public and private We are generating secret key value with the help of above pair of key. Secret key parameters not shared in network so it will defense against man-in-middle attack. In this paper we are performing encryption and decryption process with mid-point of graph. This algorithm may be applicable for Smart card, Sensors and wireless network security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Miller, V.S.: Use of elliptic curves in cryptograph. In: Advances in Cryptology—CRYPTO 1985 Proceedings (1985)
Brown, M., et al.: Software implementation of the NIST elliptic curves over prime fields. Springer, Berlin (2001)
Kumar, R., Shiv, Y., Kumar, V., Wairiya, M.: An authentication technique in mobile Ad hoc network using elliptic curve cryptography. In: 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2018)
Shiv, Y., Kumar, R., Kumar, V., Wairiya, M.: A lightweight authentication cheme for wearable medical sensors. In: 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, pp. 366–370 (2018). https://doi.org/10.1109/CONFLUENCE.2018.8442960
Doerner, J., Kondi, Y., Lee, E., Shelat, A.: Secure two-party threshold ECDSA from ECDSA assumptions. In: 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, pp. 980–997 (2018). https://doi.org/10.1109/SP.2018.00036, https://medium.com/coinmonks/elliptic-curve-cryptography-6de8fc748b8b
Koko, S.O.A.L.F.M., Nabi Mustafa, A.B.A.: Comparison of various encryption algorithms and techniques for improving secured data communication. IOSR J. Comput. Eng. (IOSR-JCE) 17(1), 62–69 (2015). e-ISSN 2278-0661, p-ISSN 2278-8727, www.iosrjournals.org
Fathima, H.: Comparative study of symmetric key algorithms-des, AES and Blowfish. Published by Global Journals Inc. (USA) Double Blind Peer Reviewed International Research Journal 17(2) Version 1.0 (2017). Online ISSN 0975-4172 & Print ISSN 0975-4350
Suresh, M., Neema, M.: Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Things. Procedia Technol. 25, 248–255 (2016). https://doi.org/10.1016/j.protcy.2016.08.104. ISSN 2212-0173
Alvarez, R., Caballero-Gil, C., Santonja, J., Zamora, A.: Algorithms for lightweight key exchange. Sensors 17(7), 1517 (2017)
Forouzan, B., Mukhopadhyay, D.: Cryptography and Network Security, 3rd edn, pp. 283–290. McGraw-Hill, New York (2015)
Mahto, D., Yadav, D.K.: RSA and ECC: a comparative analysis. Int. J. Appl. Eng. Res. 12(19), 9053–9061 (2017). ISSN 0973-4562, http://www.ripublication.com
Bafandehkar, M., Yasin, S., Mahmod, R., Hanapi, Z.M.: Comparison of ECC and RSA algorithm in resource constrained devices. In: 2013 International Conference on IT Convergence and Security, ICITCS 2013, pp. 1–3 (2013). https://doi.org/10.1109/ICITCS.2013.6717816
Bhardwaj, I., Kumar, A., Bansal, M.: A review on lightweight cryptography algorithms for data security and authentication in IoTs (2017). https://doi.org/10.1109/ISPCC.2017.8269731
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Banerjee, S., Patil, A. (2020). ECC Based Encryption Algorithm for Lightweight Cryptography. In: Abraham, A., Cherukuri, A.K., Melin, P., Gandhi, N. (eds) Intelligent Systems Design and Applications. ISDA 2018 2018. Advances in Intelligent Systems and Computing, vol 940. Springer, Cham. https://doi.org/10.1007/978-3-030-16657-1_56
Download citation
DOI: https://doi.org/10.1007/978-3-030-16657-1_56
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16656-4
Online ISBN: 978-3-030-16657-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)