CFP last date
20 January 2025
Reseach Article

Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text Cryptosystem

by Komal Agrawal, Anju Gera
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 1
Year of Publication: 2014
Authors: Komal Agrawal, Anju Gera
10.5120/18484-9542

Komal Agrawal, Anju Gera . Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text Cryptosystem. International Journal of Computer Applications. 106, 1 ( November 2014), 18-24. DOI=10.5120/18484-9542

@article{ 10.5120/18484-9542,
author = { Komal Agrawal, Anju Gera },
title = { Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text Cryptosystem },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 1 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 18-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number1/18484-9542/ },
doi = { 10.5120/18484-9542 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:38:15.224481+05:30
%A Komal Agrawal
%A Anju Gera
%T Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text Cryptosystem
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 1
%P 18-24
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is an art to protect secret information from attacks. This idea of information security leads to the evolution of cryptography. In this paper, an idea is proposed in which hill cipher is generated with Elliptic Curve Cryptography to provide better security and proper security coverage. Hill Cipher is harder to break due to its linearity and ECC is smaller key size algorithm which provide fast computations as well as memory, speed, bandwidth. ECC provides secure text based cryptography by generating base points on Elliptic curve over the finite field. It starts with plain text conversion by hill cipher then it is converted into its ASCII value to get points on curve and then perform scalar multiplication to encrypt the data and to generate secret and public key. Hill cipher with ECC improves efficiency of cryptography algorithm, provides better security and a level of complexity so that this technique is harder to break.

References
  1. N. Koblitz, Elliptic Curve Cryptosystems, Mathematics of Computation, volA8, 1987, pp. 203-209.
  2. P. K Sahoo, Dr. Gunamani Jena, Dr. R. K Chhotray, Dr. S. Patnaik, "An implementation of Elliptic Curve Cryptography" IJERT ISSN: 2278-0181, vol. 2, Issue 1, Jan 2013.
  3. Ayushi, "A symmetric key cryptographic algorithm" International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 15, 2010.
  4. Williams Stallings, Cryptography and Network Security, Prentice Hall, 4th Edition, 2006.
  5. Ruchika Markan, Gurvinder Kaur, "Literature survey on elliptic curve encryption technique" IJARCSSE, vol. 3, issue 9, September 2013.
  6. R. V. Kurja, Kirti Joshi, N. Mohan Kumar, Kapil H Raranape, A. Ramanathan, T. N. Shorey, R. R. Simha, and V. Srinivas, "Elliptic Curves", International Distribution by American Mathematical Society, 2006.
  7. N. Koblitz, Elliptic curve cryptosystems,Mathematics of Computations, 48, 203-209 (1987) of Computation, vol. 77, no. 262, pp. 1075–1104, 2008.
  8. Oswald, E. (2002), "Introduction to Elliptic Curve Cryptography", Institute for Applied Information Processing and Communication, Graz University Technology.
  9. Yuan Xue, " lectur notes on classical cipher".
  10. http://www. asciitable. com/
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic Curve Cryptography Hill Cipher RSA.