Abstract
Elliptic Curve Cryptography is a public key cryptography scheme which is leading now days because of its great advantages (small key size, less time for encryption, no solution to Discrete Logarithmic problem, impossible time taken for brute force attack) for handheld, low memory, portable and small devices. Applying Elliptic Curve Cryptography on text and image gives almost equal performance. In this paper we are summarizing that how Elliptic Curve Cryptography encrypts and decrypt text data and image. Operations responsible for encryption are point multiplication, point addition, point doubling, and point subtraction are explained in detail. One more thing which is very necessary in decryption of the Elliptic Curve Cryptography that is Discrete Logarithmic Problem which is also explained briefly and many more comparative study about Elliptic Curve Cryptography advantages, Disadvantages, Elliptic Curve Cryptography attacks and its applications comparing with other Encryption Algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kolbitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48, 203–209 (1987)
Stallings, W.: Cryptography and network Security, 5th edn. Prentice-Hall
Standard specifications for public key cryptography, IEEE standard, pl363 (2000)
Albirt, A.J.: Understanding & Applied Cryptography and Data Security. CRC Press, Pearson
Certicom, standards for Efficient Elliptic curve cryptography, SEC 1: Elliptic Curve Cryp-tography, Version 1.0 (September 2000), http://www.secg.org/download/aid-385/sec1_final.pdf
Certicom website, http://www.certicom.com/index.php?action=ecc_tutorial,home
Anoop, M.S.: Elliptic Curve Cryptography-An implementation Guide
Cilardo, A., Coppolino, L., Mazocca, N., Roman, L.: Elliptical Curve Cryptography Engineering. Proceedings of the IEEE 94(9), 395–406 (2006)
Kocher, P.C.: Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Self Created table randomly for affine points
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Pardesi, V., Khamparia, A. (2015). Encryption/Decryption of X-Ray Images Using Elliptical Curve Cryptography with Issues and Applications. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham. https://doi.org/10.1007/978-3-319-13731-5_39
Download citation
DOI: https://doi.org/10.1007/978-3-319-13731-5_39
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13730-8
Online ISBN: 978-3-319-13731-5
eBook Packages: EngineeringEngineering (R0)