You are on page 1of 6

Enhanced security for real time communication using ElGamal elliptic

curve cryptography

Project Guide

Team members

Mr. Balasubramaniam M.E CSE

Ashicka S


Assistant Professor

Sathya R


Department of CSE

SenthilKumar S (711612104041)


Cryptography is a method of storing and transmitting data in a particular form so

that only those for whom it is intended can read and process it.
Modern cryptography is heavily based on mathematical theory and computer science
practice; Algorithms are hard to break in practice by any adversary.
Asymmetric cryptography or public-key cryptography is cryptography in which a
pair of keys is used to encrypt and decrypt a message so that it arrives securely.
Elliptic curve cryptography (ECC) is an approach to public-key cryptography
based on the algebraic structure of elliptic curves over finite fields

Network security is the most prominent feature and it has become an
important need for real time communication
ElGamal elliptic curve cryptography provides to be efficient in terms of
resource-constrained devices
Secure and efficient key authentication is used to enhance authenticity,
integrity, confidentiality for real time communication

New Parallel Approaches for Scalar Multiplication in Elliptic Curve
over Fields of Small Characteristic
This Montgomery-halving can be run in parallel with the original
Montgomery-ladder in order to concurrently compute part of the scalar
This project present two point thirding formulas in some subfamilies of
curves, these thirding formulas to implement scalar multiplication through
(Third, Double)-and-add and (Third, Triple)-and-add parallel approaches

This project modification converts each character of the plaintext message to its
hexadecimal ASCII value of two digits, then separates the value into two values.
After that, the transformation is performed on each value into an affine point on the
Elliptic Curve E
This transformation is used to modify ElGamal Elliptic Curve Cryptosystem
(EGECC) to encrypt/decrypt the message
The reduction of this number is a key point in the transformation of each character
into an affine point on the EC


Group Key Establishment for Enabling Secure,Multicast Communication

in Wireless Sensor,Networks Deployed for IoT applicationspawani
porambage1, an braeken2, corinna schmitt3,andrei gurtov4, (senior member,
ieee), mika ylianttila1, (senior member, ieee), and burkhard stiller3

An Analysis of RFID Authentication Schemes for Internet of Things in

HealthcareEnvironment Using Elliptic Curve Cryptography,Debiao He and
Sherali Zeadally

Parallel and High-Speed Computations of Elliptic Curve Cryptography

Using Hybrid-Double Multipliers,Reza Azarderakhsh, Member, IEEE, and
Arash Reyhani-Masoleh, Member, IEEE

Modified ElGamal Elliptic Curve Cryptosystem using Hexadecimal

RepresentationSchool of Computer and Communication Engineering, UniMAP
University, Malaysia; 2Information System Department,
University of Anbar, Anbar, Iraq