Skip to main content

Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

Abstract

This paper is an algorithmic approach to a compression scheme followed by an encryption of the compressed input stream using Elliptic Curve Cryptography (ECC) over prime field. The compression is an Artificial Intelligence (AI) approach where the input stream is fully read, and the repetitive groups in input stream are replaced by some unused character set. Elliptic curve has been chosen as it requires very less key size. The cryptanalysis to find back the private key requires discrete logarithmic approach. In the encryption scheme, first, the required parameters have been chosen to satisfying the equation [4a3 + 27b2 ≠ 0 mod p], where a prime number “p”, which defines the cardinal number of the set. Each “p + 1” elements of the set has been evaluated. Each distinct character in the input stream is reflected to a point over the elliptic curve to deduce a point (xA, yA) using an integer value (K) which has been agreed by both sender and receiver. The receiver of the cipher text chooses a point from the set as the generator point generates public key set using key and is distributed among all the senders. This public key set has used in conjunction with the sender’s private key and the point (xA, yA) to generate the cipher text which has been passed over to the intended recipient. The receiver takes up the cipher text and uses private key to find back the (xA, yA). The actual character from (xA, yA) using K and the original input stream has been evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Atul K (2005) Cryptography and network security. Tata McGraw-Hill, New Delhi. ISBN 0-07-049483-5

    Google Scholar 

  2. Som S, Mandal JK (2008) A session key based secure-bit encryption technique (SBET). In: National conference (INDIACom-2008) on computing for nation development, New Delhi, India, 08–09 Feb 2008

    Google Scholar 

  3. Al-Vahed A, Sahhavi H (2011) An overview of modern cryptography. World Appl Program 1(1):3–8. ISSN: 2222–2510

    Google Scholar 

  4. Certicom (2000) Standards for efficient cryptography, SEC 1: elliptic curve cryptography, Version 1.0, Sep 2000

    Google Scholar 

  5. Certicom (2000) Standards for efficient cryptography, SEC 2: recommended elliptic curve domain parameters, Version 1.0, Sep 2000

    Google Scholar 

  6. William S Cryptography and network security, principles and practice

    Google Scholar 

  7. Anoop MS (2015) Elliptic curve cryptography—an implementation guide. URL: http://www.infosecwriters.com/text_resources/pdf/Elliptic_curve_AnnopMS.pdf. Last accessed on April 2015

  8. Darrel H, Alfred M, Scott V (2003) Guide to elliptic curve cryptography. Springer, Berlin. ISBN 0-387-95273-X

    MATH  Google Scholar 

  9. Henri C, Gerhard F, Roberto A (2005) Handbook of elliptic and hyper-elliptic curve cryptography. Chapman and Hall/CRC. ISBN: 978-1-58488-518-4

    Google Scholar 

  10. Jadhav A (2011) Implementation of elliptic curve cryptography on text and image. Int J Enterp Comput Bus Syst 1(2): ISSN (Online): 2230–8849. http://www.ijecbs.com, July 2011

  11. Kumar R, Jaiswal UC (2011) Experimental investigation of image encryption technique using public key. Int J Tech 1(1):12–14

    MathSciNet  Google Scholar 

  12. Sharma RD (2011) Quantum cryptography: a new approach to information security. Int J Power Syst Op Energy Manag (IJPSOEM) 1(1)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhranil Som .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Som, S. (2018). Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics