Abstract
This paper is an algorithmic approach to a compression scheme followed by an encryption of the compressed input stream using Elliptic Curve Cryptography (ECC) over prime field. The compression is an Artificial Intelligence (AI) approach where the input stream is fully read, and the repetitive groups in input stream are replaced by some unused character set. Elliptic curve has been chosen as it requires very less key size. The cryptanalysis to find back the private key requires discrete logarithmic approach. In the encryption scheme, first, the required parameters have been chosen to satisfying the equation [4a3 + 27b2 ≠ 0 mod p], where a prime number “p”, which defines the cardinal number of the set. Each “p + 1” elements of the set has been evaluated. Each distinct character in the input stream is reflected to a point over the elliptic curve to deduce a point (xA, yA) using an integer value (K) which has been agreed by both sender and receiver. The receiver of the cipher text chooses a point from the set as the generator point generates public key set using key and is distributed among all the senders. This public key set has used in conjunction with the sender’s private key and the point (xA, yA) to generate the cipher text which has been passed over to the intended recipient. The receiver takes up the cipher text and uses private key to find back the (xA, yA). The actual character from (xA, yA) using K and the original input stream has been evaluated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Atul K (2005) Cryptography and network security. Tata McGraw-Hill, New Delhi. ISBN 0-07-049483-5
Som S, Mandal JK (2008) A session key based secure-bit encryption technique (SBET). In: National conference (INDIACom-2008) on computing for nation development, New Delhi, India, 08–09 Feb 2008
Al-Vahed A, Sahhavi H (2011) An overview of modern cryptography. World Appl Program 1(1):3–8. ISSN: 2222–2510
Certicom (2000) Standards for efficient cryptography, SEC 1: elliptic curve cryptography, Version 1.0, Sep 2000
Certicom (2000) Standards for efficient cryptography, SEC 2: recommended elliptic curve domain parameters, Version 1.0, Sep 2000
William S Cryptography and network security, principles and practice
Anoop MS (2015) Elliptic curve cryptography—an implementation guide. URL: http://www.infosecwriters.com/text_resources/pdf/Elliptic_curve_AnnopMS.pdf. Last accessed on April 2015
Darrel H, Alfred M, Scott V (2003) Guide to elliptic curve cryptography. Springer, Berlin. ISBN 0-387-95273-X
Henri C, Gerhard F, Roberto A (2005) Handbook of elliptic and hyper-elliptic curve cryptography. Chapman and Hall/CRC. ISBN: 978-1-58488-518-4
Jadhav A (2011) Implementation of elliptic curve cryptography on text and image. Int J Enterp Comput Bus Syst 1(2): ISSN (Online): 2230–8849. http://www.ijecbs.com, July 2011
Kumar R, Jaiswal UC (2011) Experimental investigation of image encryption technique using public key. Int J Tech 1(1):12–14
Sharma RD (2011) Quantum cryptography: a new approach to information security. Int J Power Syst Op Energy Manag (IJPSOEM) 1(1)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Som, S. (2018). Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_42
Download citation
DOI: https://doi.org/10.1007/978-981-10-8536-9_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8535-2
Online ISBN: 978-981-10-8536-9
eBook Packages: EngineeringEngineering (R0)