Abstract
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study.
Metadata
Item Type: | Article |
---|---|
Creators: | Creators Email / ID Num. Udin, Md Nizam nizam1558@uitm.edu.my Mohd Amin, Farah Azaliney farah525@uitm.edu.my Abdul Malek, Aminah aminah6869@uitm.edu.my Zulkifili, Nur Annisa nurannisa.btzulkifili@gmail.com Ghazali, Nur Atiqah nuratiqahbintighazali@gmail.com Mohd Ridzuwan, Siti Aisyah siti.aishahridzuwan97@gmail.com |
Subjects: | Q Science > QA Mathematics > Algebra Q Science > QA Mathematics > Algebra > Electronic data processing. Maple (Computer file) |
Divisions: | Universiti Teknologi MARA, Shah Alam > Faculty of Computer and Mathematical Sciences |
Journal or Publication Title: | Malaysian Journal of Computing (MJoC) |
UiTM Journal Collections: | UiTM Journal > Malaysian Journal of Computing (MJoC) |
ISSN: | 2600-8238 |
Volume: | 6 |
Number: | 2 |
Page Range: | pp. 812-822 |
Keywords: | Asymmetric Cryptography, Blom’s Key pre-distribution scheme, Elliptic Curve Cryptography. |
Date: | October 2021 |
URI: | https://ir.uitm.edu.my/id/eprint/49132 |