Research Article

Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture

by  Manali Dubal, Aaradhana Deshmukh
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Issue 24
Published: May 2013
Authors: Manali Dubal, Aaradhana Deshmukh
10.5120/12118-8141
PDF

Manali Dubal, Aaradhana Deshmukh . Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture. International Journal of Computer Applications. 69, 24 (May 2013), 11-15. DOI=10.5120/12118-8141

                        @article{ 10.5120/12118-8141,
                        author  = { Manali Dubal,Aaradhana Deshmukh },
                        title   = { Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 69 },
                        number  = { 24 },
                        pages   = { 11-15 },
                        doi     = { 10.5120/12118-8141 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Manali Dubal
                        %A Aaradhana Deshmukh
                        %T Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture%T 
                        %J International Journal of Computer Applications
                        %V 69
                        %N 24
                        %P 11-15
                        %R 10.5120/12118-8141
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Communication security is one of the areas where research is highly required. The data used in communication is very sensitive and needs to be protected and made abstract from intruders of system. This research is all about securing the messages or data that is being communicated among two parties. The recent branch of Network security is Cryptography using Elliptic Curve Architectures which is based on the arithmetic of elliptic curves and discrete logarithmic problems. ECC schemes are public-key based mechanisms that provide encryption, digital signatures and key exchange algorithms. The best known encryption scheme is the Elliptic Curve Integrated Encryption Scheme (ECIES) which is included in IEEE and also in SECG SEC 1 standards. The key establishment protocol is Elliptic Curve MQV, with implicit certificates and symmetric key cryptographic techniques. The research focuses on achieving secrecy using ECIES algorithm for encryption, and authentication using Hashing technique. The hashed plaintext is again encrypted with RSA. At the receiver end, the hashed text is decrypted first. The hash value of the plaintext decrypted is compared with the latter hash. If they are found equal, the integrity can also be assured. The parameters to considered choosing Elliptic Curves are presented in NIST document of recommended elliptic curves.

References
  • Xixiang LV, Hui LI, Baocang WANG,"Identity-based key distribution for mobile Ad Hoc networks", Springer-Verlag Berlin Heidelberg 2011
  • Kamal Kumar Chauhan, Amit Kumar Singh Sanger, Virendra Singh Kushwah, "Securing On-Demand Source Routing in MANETs", IEEE- Second International Conference on Computer and Network Technology- 2010
  • Kavitha Ammayappan, V. N. Sastry, Atul Negi, "Cluster based Multihop Security Protocol in MANET using ECC", TENCON 2008, IEEE Conference.
  • V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila, "A Survey of the Elliptic Curve Integrated Encryption Scheme", Journal Of Computer Science And Engineering, Volume 2, Issue 2, August 2010.
  • Johann Heyszl, Frederic Stumpf, "Efficient One-Pass Entity Authentication based on ECC for Constrained Devices", 2010 IEEE, 978-1-4244-7812-5.
  • Miguel Morales-Sandoval and Claudia Feregrino-Uribe, "A Hardware Architecture for Elliptic Curve Cryptography and Lossless Data Compression", International Conference on Electronics, Communications and Computers (IEEE-CONIELECOMP 2005)
  • V. Gayoso Martinez, L. Hern´andez Encinas, and C. S´anchez ´ Avila, "Java Card implementation of the Elliptic Curve Integrated Encryption Scheme using prime and binary finite fields", Computational Intelligence in Security for Information Systems, Springer, 2011.
  • Shadi S. Azoum, "Secure Real-Time Conversations", Thesis, Florida State University, Spring 2008.
  • Kavitha Ammayappan, V. N. Sastry, Atul Negi , "Authentication And Dynamic Key Management Protocol Based On Certified Tokens For Manets", IEEE-Global Mobile Congress 2009.
  • Patroklos G. Argyroudis et. al, "Secure Routing for Mobile Ad Hoc Networks", IEEE Communications Surveys, 2005
  • Campete, S. A. , Yener, "Combinatorial design of key distribution mechanisms for wireless sensor networks", IEEE/ACM Transaction Network, 2008
  • Chiang, Chien-Wen, "A new scheme of key distribution using implicit security in wireless sensor networks", IEEE-Advanced Communication Technology (ICACT 2010)
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Elliptic curve Cryptography Integrated encryption scheme information security encryption-decryption scheme security in Wireless sensor nodes (MANET's) Message authentication

Powered by PhDFocusTM