International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 183 - Issue 27 |
Published: Sep 2021 |
Authors: Padmashree M.G., Arunalatha J.S., Venugopal K.R. |
![]() |
Padmashree M.G., Arunalatha J.S., Venugopal K.R. . PIECC: Point Inversion algorithm for Elliptic Curve Cryptology to Secure IoT Data Communication. International Journal of Computer Applications. 183, 27 (Sep 2021), 1-9. DOI=10.5120/ijca2021921655
@article{ 10.5120/ijca2021921655, author = { Padmashree M.G.,Arunalatha J.S.,Venugopal K.R. }, title = { PIECC: Point Inversion algorithm for Elliptic Curve Cryptology to Secure IoT Data Communication }, journal = { International Journal of Computer Applications }, year = { 2021 }, volume = { 183 }, number = { 27 }, pages = { 1-9 }, doi = { 10.5120/ijca2021921655 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2021 %A Padmashree M.G. %A Arunalatha J.S. %A Venugopal K.R. %T PIECC: Point Inversion algorithm for Elliptic Curve Cryptology to Secure IoT Data Communication%T %J International Journal of Computer Applications %V 183 %N 27 %P 1-9 %R 10.5120/ijca2021921655 %I Foundation of Computer Science (FCS), NY, USA
In the Internet of Things (IoT), the internet-connected objects send the Collected data and act on the received data. Encryption controls a large number of structured and unstructured data protection during transmission. Inadequate memory and processing capacity of IoT devices demand Elliptic Curve Cryptography (ECC) for simple, secure functionalities. Scalar Multiplication frequently uses Modular Inversions that impact significantly on ECC-based applications with low resource usage with the enhancement of reliable IoT System availability. The Point Inversion algorithm for Elliptic Curve Cryptology (PIECC) enhances security and reduces the Computation time of Modular Point Inversion of Elliptic Curve using High-Speed Split Multiplication and Squaring. The use of limited intermediate registers for Cryptographic functions optimizes the Storage. The proposed algorithm reduces the Computation Time of the Cryptographic operations in terms of Clock cycles using chain Fermat-based Inversion compared with High-Speed multiplication and Product Scanning algorithms with lower Space Complexity.