2015
DOI: 10.1016/j.procs.2015.06.009
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Text Encryption using Elliptic Curve Cryptography

Abstract: Elliptic Curve Cryptography has been a recent research area in the field of Cryptography. It provides higher level of security with lesser key size compared to other Cryptographic techniques. A new technique has been proposed in this paper where the classic technique of mapping the characters to affine points in the elliptic curve has been removed. The corresponding ASCII values of the plain text are paired up. The paired values serve as input for the Elliptic curve cryptography. This new technique avoids the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
55
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(55 citation statements)
references
References 8 publications
0
55
0
Order By: Relevance
“…Singh and Singh [30] and Das and Giri [31] proposed a scheme to encrypt text messages using ECC. The scheme starts by converting the message into its corresponding ASCII value using the ASCII table.…”
Section: Related Workmentioning
confidence: 99%
“…Singh and Singh [30] and Das and Giri [31] proposed a scheme to encrypt text messages using ECC. The scheme starts by converting the message into its corresponding ASCII value using the ASCII table.…”
Section: Related Workmentioning
confidence: 99%
“…The use of symmetric keys is risky because IoT devices communicate with many other devices. ECC exploits the idea that it takes a long time to find a discrete log of a random elliptic curve for a particular known point [5]. As shown in Table 1 [14], ECC encryption can provide a similar level of security while using a key with a much shorter length than that of the RSA.…”
Section: Proposed Rsamentioning
confidence: 99%
“…Even if encrypted data are acquired, it is extremely difficult to decrypt them if the private key is not known. Typical asymmetric key cryptosystems are RSA [4] and ECC [5]. In an embedded system such as IoT, power must be used efficiently.…”
Section: Introductionmentioning
confidence: 99%
“…With the advantage of high security with lesser key size the authors used elliptic curve cryptography [3] for text encryption. Here the ASCII values of the plain text are paired up and these values are given as input to the scheme.…”
Section: Related Workmentioning
confidence: 99%