You are on page 1of 6

Enhanced security for real time communication using ElGamal elliptic

curve cryptography

Project Guide

Team members

Mr. Balasubramaniam M.E CSE

Ashicka S

(711612104005)

Assistant Professor

Sathya R

(711612104040)

Department of CSE

SenthilKumar S (711612104041)

CRYPTOGRAPHY

Cryptography is a method of storing and transmitting data in a particular form so


that only those for whom it is intended can read and process it.
Modern cryptography is heavily based on mathematical theory and computer science
practice; Algorithms are hard to break in practice by any adversary.
Asymmetric cryptography or public-key cryptography is cryptography in which a
pair of keys is used to encrypt and decrypt a message so that it arrives securely.
Elliptic curve cryptography (ECC) is an approach to public-key cryptography
based on the algebraic structure of elliptic curves over finite fields

ABSTRACT
Network security is the most prominent feature and it has become an
important need for real time communication
ElGamal elliptic curve cryptography provides to be efficient in terms of
resource-constrained devices
Secure and efficient key authentication is used to enhance authenticity,
integrity, confidentiality for real time communication

EXISTING SYSTEM
New Parallel Approaches for Scalar Multiplication in Elliptic Curve
over Fields of Small Characteristic
This Montgomery-halving can be run in parallel with the original
Montgomery-ladder in order to concurrently compute part of the scalar
multiplication
This project present two point thirding formulas in some subfamilies of
curves, these thirding formulas to implement scalar multiplication through
(Third, Double)-and-add and (Third, Triple)-and-add parallel approaches

PROPOSED SYSTEM
This project modification converts each character of the plaintext message to its
hexadecimal ASCII value of two digits, then separates the value into two values.
After that, the transformation is performed on each value into an affine point on the
Elliptic Curve E
This transformation is used to modify ElGamal Elliptic Curve Cryptosystem
(EGECC) to encrypt/decrypt the message
The reduction of this number is a key point in the transformation of each character
into an affine point on the EC

REFERENCE

Group Key Establishment for Enabling Secure,Multicast Communication


in Wireless Sensor,Networks Deployed for IoT applicationspawani
porambage1, an braeken2, corinna schmitt3,andrei gurtov4, (senior member,
ieee), mika ylianttila1, (senior member, ieee), and burkhard stiller3

An Analysis of RFID Authentication Schemes for Internet of Things in


HealthcareEnvironment Using Elliptic Curve Cryptography,Debiao He and
Sherali Zeadally

Parallel and High-Speed Computations of Elliptic Curve Cryptography


Using Hybrid-Double Multipliers,Reza Azarderakhsh, Member, IEEE, and
Arash Reyhani-Masoleh, Member, IEEE

Modified ElGamal Elliptic Curve Cryptosystem using Hexadecimal


RepresentationSchool of Computer and Communication Engineering, UniMAP
University, Malaysia; mziadd@hotmail.com 2Information System Department,
University of Anbar, Anbar, Iraq

You might also like