Javascript must be enabled to continue!
Efficient Mapping Scheme for Elliptic Curve Cryptosystem in a Multiprocessing Environment
View through CrossRef
Abstract
The security of Elliptic Curve Cryptosystem (ECC) hinges on on the hardness of Elliptic Curve Discrete Logic Problem. However, existing mapping schemes are inefficient, make ECC vulnerable to security attacks and cannot be efficiently implemented in a multiprocessing environment. In this paper, an efficient mapping scheme which employ the use of Columnar Transposition technique for bit manipulation before message mapping to point on the elliptic curve was developed. Comparative security, efficiency and performance analysis of the developed mapping scheme with the existing ones were investigated. The outcomes show that the developed mapping scheme is resilient to different attacks that the existing scheme are vulnerable to. ECC schemes that use the developed mapping scheme efficiently use resources in multiprocessing environment, requires lower bandwidth for transmission of encrypted point, without negatively affecting the encryption/decryption time, throughputs and energy consumption, than the ECC schemes with existing mapping schemes.
Title: Efficient Mapping Scheme for Elliptic Curve Cryptosystem in a Multiprocessing Environment
Description:
Abstract
The security of Elliptic Curve Cryptosystem (ECC) hinges on on the hardness of Elliptic Curve Discrete Logic Problem.
However, existing mapping schemes are inefficient, make ECC vulnerable to security attacks and cannot be efficiently implemented in a multiprocessing environment.
In this paper, an efficient mapping scheme which employ the use of Columnar Transposition technique for bit manipulation before message mapping to point on the elliptic curve was developed.
Comparative security, efficiency and performance analysis of the developed mapping scheme with the existing ones were investigated.
The outcomes show that the developed mapping scheme is resilient to different attacks that the existing scheme are vulnerable to.
ECC schemes that use the developed mapping scheme efficiently use resources in multiprocessing environment, requires lower bandwidth for transmission of encrypted point, without negatively affecting the encryption/decryption time, throughputs and energy consumption, than the ECC schemes with existing mapping schemes.
Related Results
Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem
Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem
In this chapter, the authors have defined a new ElGamal cryptosystem by using the power Fibonacci sequence module m. Then they have defined a new sequence module m and the other El...
Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
The Internet of Things’ (IoT) market is expected to grow exponentially at the global level in the coming years, due to the proliferation of more reliable and faster networks result...
Identification of Fake Messages Using Two PKCs
Identification of Fake Messages Using Two PKCs
Abstract
In this paper, two public key cryptosystems are presented and analyzed. The first cryptosystem is an improvement of the RSA public key c...
Identification of Fake Messages Using Two PKCs
Identification of Fake Messages Using Two PKCs
Abstract
In this paper, two public key cryptosystems are presented and analyzed. The first cryptosystem is an improvement of RSA public key cryptosystem. The second...
Curve Shape Modification and Fairness Evaluation
Curve Shape Modification and Fairness Evaluation
A method to generate a quintic NURBS curve which passes through the given points is described. In this case, there are four more equations than there are positions of the control p...
Large families of elliptic curves ordered by conductor
Large families of elliptic curves ordered by conductor
In this paper we study the family of elliptic curves $E/{{\mathbb {Q}}}$, having good reduction at $2$ and $3$, and whose $j$-invariants are small. Within this set of elliptic curv...
Comparison of LA and PVC mapping using OCTARAY and OPTRELL catheters
Comparison of LA and PVC mapping using OCTARAY and OPTRELL catheters
Abstract
Background
Multielectrode mapping catheters, such as the OCTARAY and OPTRELL, are essential in creating myocardial ele...
A New IPR Curve Of Gas-Water Well In Gas Reservoirs Undergoing Simultaneous Water Production
A New IPR Curve Of Gas-Water Well In Gas Reservoirs Undergoing Simultaneous Water Production
Abstract
Based on principle of mass conservation, this paper sets up a new mathematical model of gas-water two-phase underground percolation, and the model includ...

