Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.]

Udin, Md Nizam and Mohd Amin, Farah Azaliney and Abdul Malek, Aminah and Zulkifili, Nur Annisa and Ghazali, Nur Atiqah and Mohd Ridzuwan, Siti Aisyah (2021) Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.]. Malaysian Journal of Computing (MJoC), 6 (2). pp. 812-822. ISSN (eISSN): 2600-8238

Download

[thumbnail of 49132.pdf] Text
49132.pdf

Download (2MB)

Abstract

Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study.

Metadata

Item Type: Article
Creators:
Creators
Email
Udin, Md Nizam
nizam1558@uitm.edu.my
Mohd Amin, Farah Azaliney
farah525@uitm.edu.my
Abdul Malek, Aminah
aminah6869@uitm.edu.my
Zulkifili, Nur Annisa
nurannisa.btzulkifili@gmail.com
Ghazali, Nur Atiqah
nuratiqahbintighazali@gmail.com
Mohd Ridzuwan, Siti Aisyah
siti.aishahridzuwan97@gmail.com
Subjects: Q Science > QA Mathematics > Algebra
Q Science > QA Mathematics > Algebra > Electronic data processing. Maple (Computer file)
Divisions: Universiti Teknologi MARA, Shah Alam > Faculty of Computer and Mathematical Sciences
Journal or Publication Title: Malaysian Journal of Computing (MJoC)
UiTM Journal Collections: UiTM Journal > Malaysian Journal of Computing (MJoC)
ISSN: (eISSN): 2600-8238
Volume: 6
Number: 2
Page Range: pp. 812-822
Official URL: https://mjoc.uitm.edu.my/
Item ID: 49132
Uncontrolled Keywords: Asymmetric Cryptography, Blom’s Key pre-distribution scheme, Elliptic Curve Cryptography.
URI: https://ir.uitm.edu.my/id/eprint/49132

ID Number

49132

Indexing


View in Google Scholar

Edit Item
Edit Item