Professional Documents
Culture Documents
Nikita Gupta1, Vikas Kundu2, Neha Kurra3, Shivani Sharma4, Bhagyashree Pal5
Department of Computer Engineering
Army Institute of Technology
Pune, India
gupta_nikita12@yahoo.co.in1, kundu.vikas13@gmail.com2, kneha93@yahoo.co.in3, shivani24_7@yahoo.co.in4
PbA=nA.G
IV. APPROACH
Here y, x, a and b belongs to curve Fp and they are integers
modulo p. The coefficients a and b are the characteristic The complete process followed by us can be summarized
coefficients of the curve. by the following flowchart:
1. Curve cryptosystem parameters
References
[1]. Maryam Savari and Yeoh Eng Thiam, “Comparison of ECC and RSA in
Multipurpose Smart Card Application”.
[2]. Elsayed Mohammed and A.E Emarah and Kh.El-Shenawwey, “Elliptic
Curve Cyrptosystems on Smart Cards”.
[3]. Padma Bh, D.Chandravathi, P.prapoorna Roja: “Encoding and decoding
of a message in the implementation of Elliptic Curve Cryptography
using Koblitz Method”. International Journal on Computer Science and
Engineering (IJCSE) Vol. 02, No. 05, 2010, 1904-1907
[4]. Hankerson, Menezes, Vanstone. “Guide to elliptic curve cryptography”
Springer, 2004 ISBN 038795273X 332s_CsCr
[5]. http://www.nsa.gov/business/programs/elliptic_curve.shtml
[6]. Kamlesh Gupta1, Sanjay Silakari, “ECC over RSA for Asymmetric
Encryption: A Review”
[7]. http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-
primer-on-elliptic-curve-cryptography/2/
[8]. http://www.nsa.gov/business/programs/elliptic_curve.shtml
VII. FUTURE SCOPE [9]. Santoshi Ketan Pote, Usha Mittal “Elliptic Curve Cryptographic
Algorithm”
Elliptic Curve Cryptography is such an excellent choice for [10]. Christof Paar, Jan Pelzl ,”Understanding Cryptography”
doing asymmetric cryptography in portable, necessarily
constrained devices right now, mainly because of the level of
security offered for smaller key sizes. A popular,
recommended RSA key size for most applications is 2,048
bits. For equivalent security using Elliptic Curve