CFP last date
20 January 2025
Reseach Article

An Enhanced Elliptic Curve Cryptosystem for Securing Data

by Edward Kwadwo Boahen, James Ben Hayfron-Acquah, Frimpong Twum
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 9
Year of Publication: 2018
Authors: Edward Kwadwo Boahen, James Ben Hayfron-Acquah, Frimpong Twum
10.5120/ijca2018917688

Edward Kwadwo Boahen, James Ben Hayfron-Acquah, Frimpong Twum . An Enhanced Elliptic Curve Cryptosystem for Securing Data. International Journal of Computer Applications. 182, 9 ( Aug 2018), 47-53. DOI=10.5120/ijca2018917688

@article{ 10.5120/ijca2018917688,
author = { Edward Kwadwo Boahen, James Ben Hayfron-Acquah, Frimpong Twum },
title = { An Enhanced Elliptic Curve Cryptosystem for Securing Data },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2018 },
volume = { 182 },
number = { 9 },
month = { Aug },
year = { 2018 },
issn = { 0975-8887 },
pages = { 47-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number9/29852-2018917688/ },
doi = { 10.5120/ijca2018917688 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:10:56.720381+05:30
%A Edward Kwadwo Boahen
%A James Ben Hayfron-Acquah
%A Frimpong Twum
%T An Enhanced Elliptic Curve Cryptosystem for Securing Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 9
%P 47-53
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The purpose of this research is to enhance the cryptographic system called the Elliptic Curve. Elliptic Curve cryptosystem (ECC) is a technique of public-key encryption, which is rooted on the arithmetical construction of elliptic curves over finite fields. Elliptic Curve Cryptographic System necessitates smaller keys compared to non-ECC cryptography to offer equal security. The security of RSA is based on the computational task of considering extensive numbers leading to an increase in encryption computation time, slower connection of the SSL handshake and increase in CPU usage during handshakes. Therefore, there should be a new way of solving this problem, which is ECC encryption. Elliptic curves are effective for digital signatures, key agreement, generators, pseudo-random and other related tasks. The first phase of the project involves understanding the key exchange of Diffie-Hellman and applying the properties of the Elliptic Curves. It is terminated with key facts that the Elliptic Curve Cryptography has a shorter key length, saves bandwidth, which facilitates key generation during the encryption/decryption of data, also the assurance of faster encryption and decryption, and notwithstanding its efficiency and efficacy in small devices.

References
  1. Stallings, W. (2005). Cryptography and Network Security Principles and Practices. Prentice Hall.
  2. Singh, G., & Supriya. (April 2013). A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications, 67(19), 0975 – 8887.
  3. Fielding, R. (1999). Hypertext Transfer Protocol – HTTP/1.1. RFC 2616.
  4. Frier, A., Karlton, P., & Kocher, P. (n.d.). The SSL3.0 Protocol Version 3.0. Retrieved from http://home.netscape.com
  5. Wagner, D., & Schneier, B. (1996). Analysis of the SSL 3.0 protocol. 2nd USENIX Workshop on Electronic.
  6. Ylonen, T., Kivinen, T., Saarinen, M., Rinne, T., & Lehtinen, S. (2003). SSH Protocol Architecture..
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic Curve Cryptography Diffie-Hellman Secured Socket Layer encryption decryption Rivest-Shamir-Adleman Hypertext transfer protocol Triple DES Digital Signature Algorithm.