Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Farlisa Ishak

Noor Hamid, Ahmad Asif Bakhtiar Noor and Nor Zailan, Nor Syazwani and Ishak, Syaza Farlisa (2019) Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Farlisa Ishak. [Student Project] (Unpublished)

Download

[thumbnail of 39385.pdf] Text
39385.pdf

Download (467kB)

Abstract

Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). ECC use very small keys, it is a way to be more effective computationally and makes it ideal for the smaller and less powerful devices that most people use to access network services. Due to small keys that had been offered by ECC, instead of RSA, ECC had been used widely in practical applications in embedded system such as mobile devices and IC card. finite field. ECC can be perfonn by using either finite field or binary field. Text encryption using ECC over bina1y finite ticld, G/(2"' ) has more advantage than Ctnitc field, Gf(p) but the previous study that use ECC and EIGamal for text encryption only represent the system using Gf(p). We observed that to implement Elgamal e1yptosystem in binaiy Cmite field, there are a few modification that need to be done to satisfy the properties of bina,y finite field. This is to ensure that the message that had been send can be decrypt successfully. The algorithm that will be used in this paper to complete the cnetyption and decryption process is EIGainal algorithm. Motivated from Natanael & Suryani in 2018, we represent the finite field using bina1y finite field Gf(2"' ) or ]Fr. Therefore, in this study, the implementation of ECC over lF, .., with the modification of EIGamal encryption ai1d decryption scheme work successfully where the original message or plaintext had been obtained after decryption process. For future studies, this method cai1 be further improves by using a larger value of m in IF)"' in order to increase the security of the text message. This method also can be implemented in GUI to make the calculation of encryption and decryption process faster instead of calculating manually.

Metadata

Item Type: Student Project
Creators:
Creators
Email
Noor Hamid, Ahmad Asif Bakhtiar Noor
UNSPECIFIED
Nor Zailan, Nor Syazwani
UNSPECIFIED
Ishak, Syaza Farlisa
UNSPECIFIED
Subjects: Q Science > QA Mathematics > Mathematical statistics. Probabilities
Q Science > QA Mathematics > Analysis > Analytical methods used in the solution of physical problems
Q Science > QA Mathematics > Philosophy > Mathematical logic > Constructive mathematics > Algorithms
Divisions: Universiti Teknologi MARA, Negeri Sembilan > Seremban Campus > Faculty of Computer and Mathematical Sciences
Programme: Bachelor of Science (Hons.) Computational Mathematics
Item ID: 39385
Uncontrolled Keywords: Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste
URI: https://ir.uitm.edu.my/id/eprint/39385

Fulltext

Fulltext is available at:
  • Koleksi Akses Terhad | PTAR KampusSeremban
  • ID Number

    39385

    Indexing


    View in Google Scholar

    Edit Item
    Edit Item