ENCRYPTION/DECRYPTION USING ELLIPTICAL CURVE CRYPTOGRAPHY
Main Article Content
Abstract
One of the buzzwords in network security nowadays is the ECC-Elliptical Curve Cryptography. It is one of the best cryptography techniques that provide security to our personal as well as professional data over the network. In our day to day life the need of data sharing has increased exponentially. We like to stay updated with every events occurring around and love to be a “know-it-allâ€. With the upswing of social networking people stay connected all the time. They make their social media profiles and use them to communicate by sharing their information over the network. It has become a necessary part of our life. The need for securing that data has also increased, in order to prevent attacks that may cause unauthorized access to our data, misuse of our data or modification of our data and also to maintain privacy over the network. Thus sharing the data has to be done in such a way such that only the sender and the receiver understands it and no one else on the network does. It is done by using methods of encryption and decryption, wherein we change our data in a way that it becomes senseless to everyone, until it is changed back to its original form in order to make sense out of it. We have many techniques for doing the same. In this paper we will be discussing about two such techniques that encompass not only server and desktop systems, but also large numbers of small devices ranging from PDAs and cell phones to appliances and networked sensors. To the end we will be making a necessary comparison between the techniques explaining why ECC is better than any other cryptographic techniques recent to it.
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.