CFP last date
20 December 2024
Reseach Article

Huffman Compression Technique in the Context of ECC for Enhancing the Security and Effective Utilization of Channel Bandwidth for Large Text

Published on December 2011 by O. Srinivasa Rao, Prof. S. Pallam Setty
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 1
December 2011
Authors: O. Srinivasa Rao, Prof. S. Pallam Setty
fdd8e304-05ea-4659-b146-0d85cdc91f5f

O. Srinivasa Rao, Prof. S. Pallam Setty . Huffman Compression Technique in the Context of ECC for Enhancing the Security and Effective Utilization of Channel Bandwidth for Large Text. Network Security and Cryptography. NSC, 1 (December 2011), 45-54.

@article{
author = { O. Srinivasa Rao, Prof. S. Pallam Setty },
title = { Huffman Compression Technique in the Context of ECC for Enhancing the Security and Effective Utilization of Channel Bandwidth for Large Text },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 1 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 45-54 },
numpages = 10,
url = { /specialissues/nsc/number1/4324-spe013t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A O. Srinivasa Rao
%A Prof. S. Pallam Setty
%T Huffman Compression Technique in the Context of ECC for Enhancing the Security and Effective Utilization of Channel Bandwidth for Large Text
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 1
%P 45-54
%D 2011
%I International Journal of Computer Applications
Abstract

In this paper, we proposed a model for text encryption using elliptic curve cryptography (ECC) for secure transmission of large text and by incorporating the Huffman data compression technique for effective utilization of channel bandwidth and enhancing the security. In this model, every character of text message is transformed into the elliptic curve points (Xm, Ym), these elliptic curve points are converted into cipher text .The resulting size of cipher text becomes four times of the original text. For minimizing the channel bandwidth requirements, the encrypted text is compressed using the Huffman compression technique in two ways i)x-y co-ordinates of encrypted text and ii) x-co-ordinates of the encrypted text. The resulting system saves the overall bandwidth and further enhances the security.

References
  1. Neal Koblitz, ”Elliptic Curve Cryptosystem, Journal of mathematics computation Vol.48, No.177pp.203-209,Jan-1987.
  2. V. Miller, “Uses of elliptic curves in cryptography”, Advances in Cryptology–Crypto ’85,Lecture Notes in Computer Science, 218
  3. Certicom Corp., “An Introduction to Information Security”, Number 1, March 1997.
  4. ANSI X9.63, Public Key Cryptography for the Financial Services Industry: Elliptic CurveKey Agreement and Key Transport Protocols, ballot version, May 2001.
  5. Internet Engineering Task Force, The OAKLEY Key Determination Protocol, IETF RFC 2412, November 1998.
  6. ISO/IEC 15946-3, Information Technology–Security Techniques–Cryptographic Techniques Based on Elliptic Curves, Part 3, Final Draft International Standard (FDIS), February 2001
  7. National Institute of Standards and Technology, Digital Signature Standard, FIPS Publication186-2, 2000.
  8. M. Jacobson, N. Koblitz, J. Silverman, A. Stein and E. Teske, “Analysis of the xedni calculus attack”, Designs, Codes and Cryptography, 20 (2000), 41-64. (1986), Springer-Verlag, 417-426.
  9. Standards for Efficient Cryptography Group, SEC 1: Elliptic Curve Cryptography, version1.0, 2000. Available at http://www.secg.org
  10. R.L. Rivest, A. Shamir, and L.M. Adleman, Method for Obtaining Digital Signatures and Public-key Cryptosystems “, Communications of the ACM,Volume 21, pages 120-126, February 1978.
  11. S. Arita, “Weil descent of elliptic curves over finite fields of characteristic three”, Advances in Cryptology–Asiacrypt 2000, LectureNotes in Computer Science, 1976 (2000),Springer-Verlag, 248-259
  12. Fernandes, A. “Elliptic Curve Cryptography”, Dr.Dobb’s journal, December 1999
  13. D. A. Huffman, "A method for the construction of minimum redundancy codes", Proc. IRE, Vol. 40, No. 9, pp. 1098-1101, September 1952.
  14. A.Moffat and J.Katajainen, "In-place calculation of minimum-redundancy codes", 4th Intl. Workshop on Algorithms and Data Structures, Vol. 955, pp. 393-402, August 1995.
  15. J.Van Leeuwen, "On the construction of Huffman trees", 3rd International Colloquium on Automata, Languages and Programming, pp. 382-410, July 1976.
  16. 16 M. Buro, "On the maximum length of Huffman codes", Information Processing Letters, Vol. 45, No.5, pp. 219-223, April 1993.
  17. H. C. Chen, Y. L. Wang and Y. F. Lan, "A memory efficient and fast Huffman decoding algorithm", Information Processing Letters, Vol. 69, No. 3, pp. 119- 122, February 1999.
  18. R. Hashemian, "Direct Huffman coding and decoding using the table of code-lengths", Proc. International Conf. on Inform. Technology: Computers and Communications (ITCC '03), pp. 237-241, April 2003.
  19. S. Ho and P. Law, "Efficient hardware decoding method for modified Huffman code", Electronics Letters, Vol. 27, No. 10, pp. 855-856, May 1991.
  20. S. T. Klein, "Skeleton trees for the efficient decoding of Huffman encoded texts", Kluwer Journal of Inform. Retrieval, Vol. 3, No. 1, pp. 7-23, July 2000.
  21. L. L. Larmore and D. S. Hirschberg, "A fast algorithm for optimal length-limited Huffman codes", Journal of ACM, Vol. 37, No. 3, pp. 464-473, July 1999.
  22. A. Moffat and A. Turpin, "On the implementation of minimum-redundancy prefix codes", IEEE Trans. Commun., Vol. 45, No. 10, pp. 1200-1207, October 1997.
  23. O.Srinivasa Rao, S.Pallam Setty, “Efficient mapping methods of Elliptic Curve Crypto Systems” International Journal of Engineering Science and Technology, Vol. 2(8), 2010, pp. 3651-3656
  24. Vigila, S.; Muneeswaran, K.; “Implementation of text based cryptosystem using Elliptic Curve Cryptography”, Advanced Computing, 2009. ICAC 2009. First International Conference on 13-15 Dec. 2009, on page(s): 82-85.
  25. Gupta, K.; Silakari, S.; Gupta, R.; Khan, S.A.; “ An Ethical Way of Image Encryption Using ECC” Computational Intelligence, Communication Systems and Networks, 2009. CICSYN '09. First International Conference on 23-25 July 2009,Onpage(s):342-345.
  26. R. Rajaram Ramasamy, M. Amutha Prabakar, M. Indra Devi, and M. Suguna, “Knapsack Based ECC Encryption and Decryption” International Journal of Network Security, Vol.9, No.3, PP.218–226, Nov. 2009
  27. O.Srinivasa Rao, S.Pallam Setty, “Comparative Study of Arithmetic and Huffman Data Compression Techniques for Koblitz Curve Cryptography” International Journal of Computer Applications (0975 – 8887), Volume 14– No.5, January 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic Curve Cryptography (ECC) Huffman compression