ECC Based Encryption Algorithm for Lightweight Cryptography

  • Soumi Banerjee
  • Anita PatilEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 940)


Cryptography can be considered as toolbox, where potential attackers have access to different computing resources and techniques to try and calculate key values. In a modern cryptography the strength of the cryptographic algorithm is nothing but the key size. So, our objective is to generate strong key value having minimum length of bits which will be useful in lightweight cryptography. Using Elliptic Curve Cryptography (ECC) with algebraic graph we are finding secret key value. ECC is itself a strong algorithm which generates pair of public and private We are generating secret key value with the help of above pair of key. Secret key parameters not shared in network so it will defense against man-in-middle attack. In this paper we are performing encryption and decryption process with mid-point of graph. This algorithm may be applicable for Smart card, Sensors and wireless network security.


ECC ECDLP AES Galois Field (GF) RSA DH Lightweight cryptography 


  1. 1.
    Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Miller, V.S.: Use of elliptic curves in cryptograph. In: Advances in Cryptology—CRYPTO 1985 Proceedings (1985)Google Scholar
  3. 3.
    Brown, M., et al.: Software implementation of the NIST elliptic curves over prime fields. Springer, Berlin (2001)CrossRefGoogle Scholar
  4. 4.
    Kumar, R., Shiv, Y., Kumar, V., Wairiya, M.: An authentication technique in mobile Ad hoc network using elliptic curve cryptography. In: 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2018)Google Scholar
  5. 5.
    Shiv, Y., Kumar, R., Kumar, V., Wairiya, M.: A lightweight authentication cheme for wearable medical sensors. In: 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, pp. 366–370 (2018).
  6. 6.
    Doerner, J., Kondi, Y., Lee, E., Shelat, A.: Secure two-party threshold ECDSA from ECDSA assumptions. In: 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, pp. 980–997 (2018).,
  7. 7.
    Koko, S.O.A.L.F.M., Nabi Mustafa, A.B.A.: Comparison of various encryption algorithms and techniques for improving secured data communication. IOSR J. Comput. Eng. (IOSR-JCE) 17(1), 62–69 (2015). e-ISSN 2278-0661, p-ISSN 2278-8727,
  8. 8.
    Fathima, H.: Comparative study of symmetric key algorithms-des, AES and Blowfish. Published by Global Journals Inc. (USA) Double Blind Peer Reviewed International Research Journal 17(2) Version 1.0 (2017). Online ISSN 0975-4172 & Print ISSN 0975-4350Google Scholar
  9. 9.
    Suresh, M., Neema, M.: Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Things. Procedia Technol. 25, 248–255 (2016). ISSN 2212-0173CrossRefGoogle Scholar
  10. 10.
    Alvarez, R., Caballero-Gil, C., Santonja, J., Zamora, A.: Algorithms for lightweight key exchange. Sensors 17(7), 1517 (2017)CrossRefGoogle Scholar
  11. 11.
    Forouzan, B., Mukhopadhyay, D.: Cryptography and Network Security, 3rd edn, pp. 283–290. McGraw-Hill, New York (2015)Google Scholar
  12. 12.
    Mahto, D., Yadav, D.K.: RSA and ECC: a comparative analysis. Int. J. Appl. Eng. Res. 12(19), 9053–9061 (2017). ISSN 0973-4562,
  13. 13.
    Bafandehkar, M., Yasin, S., Mahmod, R., Hanapi, Z.M.: Comparison of ECC and RSA algorithm in resource constrained devices. In: 2013 International Conference on IT Convergence and Security, ICITCS 2013, pp. 1–3 (2013).
  14. 14.
    Bhardwaj, I., Kumar, A., Bansal, M.: A review on lightweight cryptography algorithms for data security and authentication in IoTs (2017).

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Information TechnologyRAITNavi MumbaiIndia

Personalised recommendations