CFP last date
20 January 2025
Reseach Article

Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture

by Manali Dubal, Aaradhana Deshmukh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 24
Year of Publication: 2013
Authors: Manali Dubal, Aaradhana Deshmukh
10.5120/12118-8141

Manali Dubal, Aaradhana Deshmukh . Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture. International Journal of Computer Applications. 69, 24 ( May 2013), 11-15. DOI=10.5120/12118-8141

@article{ 10.5120/12118-8141,
author = { Manali Dubal, Aaradhana Deshmukh },
title = { Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 24 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 11-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number24/12118-8141/ },
doi = { 10.5120/12118-8141 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:11.585256+05:30
%A Manali Dubal
%A Aaradhana Deshmukh
%T Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 24
%P 11-15
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Communication security is one of the areas where research is highly required. The data used in communication is very sensitive and needs to be protected and made abstract from intruders of system. This research is all about securing the messages or data that is being communicated among two parties. The recent branch of Network security is Cryptography using Elliptic Curve Architectures which is based on the arithmetic of elliptic curves and discrete logarithmic problems. ECC schemes are public-key based mechanisms that provide encryption, digital signatures and key exchange algorithms. The best known encryption scheme is the Elliptic Curve Integrated Encryption Scheme (ECIES) which is included in IEEE and also in SECG SEC 1 standards. The key establishment protocol is Elliptic Curve MQV, with implicit certificates and symmetric key cryptographic techniques. The research focuses on achieving secrecy using ECIES algorithm for encryption, and authentication using Hashing technique. The hashed plaintext is again encrypted with RSA. At the receiver end, the hashed text is decrypted first. The hash value of the plaintext decrypted is compared with the latter hash. If they are found equal, the integrity can also be assured. The parameters to considered choosing Elliptic Curves are presented in NIST document of recommended elliptic curves.

References
  1. Xixiang LV, Hui LI, Baocang WANG,"Identity-based key distribution for mobile Ad Hoc networks", Springer-Verlag Berlin Heidelberg 2011
  2. Kamal Kumar Chauhan, Amit Kumar Singh Sanger, Virendra Singh Kushwah, "Securing On-Demand Source Routing in MANETs", IEEE- Second International Conference on Computer and Network Technology- 2010
  3. Kavitha Ammayappan, V. N. Sastry, Atul Negi, "Cluster based Multihop Security Protocol in MANET using ECC", TENCON 2008, IEEE Conference.
  4. V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila, "A Survey of the Elliptic Curve Integrated Encryption Scheme", Journal Of Computer Science And Engineering, Volume 2, Issue 2, August 2010.
  5. Johann Heyszl, Frederic Stumpf, "Efficient One-Pass Entity Authentication based on ECC for Constrained Devices", 2010 IEEE, 978-1-4244-7812-5.
  6. Miguel Morales-Sandoval and Claudia Feregrino-Uribe, "A Hardware Architecture for Elliptic Curve Cryptography and Lossless Data Compression", International Conference on Electronics, Communications and Computers (IEEE-CONIELECOMP 2005)
  7. V. Gayoso Martinez, L. Hern´andez Encinas, and C. S´anchez ´ Avila, "Java Card implementation of the Elliptic Curve Integrated Encryption Scheme using prime and binary finite fields", Computational Intelligence in Security for Information Systems, Springer, 2011.
  8. Shadi S. Azoum, "Secure Real-Time Conversations", Thesis, Florida State University, Spring 2008.
  9. Kavitha Ammayappan, V. N. Sastry, Atul Negi , "Authentication And Dynamic Key Management Protocol Based On Certified Tokens For Manets", IEEE-Global Mobile Congress 2009.
  10. Patroklos G. Argyroudis et. al, "Secure Routing for Mobile Ad Hoc Networks", IEEE Communications Surveys, 2005
  11. Campete, S. A. , Yener, "Combinatorial design of key distribution mechanisms for wireless sensor networks", IEEE/ACM Transaction Network, 2008
  12. Chiang, Chien-Wen, "A new scheme of key distribution using implicit security in wireless sensor networks", IEEE-Advanced Communication Technology (ICACT 2010)
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic curve Cryptography Integrated encryption scheme information security encryption-decryption scheme security in Wireless sensor nodes (MANET's) Message authentication