Building Elliptic Curve Cryptography With Public Key To Encrypt Vietnamese Text
DOI:
https://doi.org/10.54654/isj.v1i15.854Keywords:
Decryption, Discrete logarithm, Elliptic curve, Elliptic curve cryptosystem, Encryption, Public keyTóm tắt
Abstract— Today, Elliptic Curve Cryptography (ECC) has many practical applications. ECC was a direction in lightweight primitive cryptography. This paper is based on the arithmetic idea of an Elliptic curve. Elliptic curve arithmetic can be used to develop Elliptic curve encryption schemes such as key exchange, encryption, and digital signature. Compared with traditional cryptosystems with the same level of security, Elliptic curve cryptography has a smaller key size, reducing processing costs. To encode the Vietnamese text, we are based on the sound of Vietnamese characters to make a table of these characters’ order. In the present paper, we apply a new encryption algorithm with a public key using an Elliptic curve over finite fields on our proposed Elliptic curve equation.
Downloads
References
N.Koblitz, “Elliptic curve cryptosystems”, Mathematics of Computation”, 203 – 209, 1987.
V.Miller, “Uses of elliptic curves in cryptography, Advances in Cryptology – Crypto”, Lecture Notes in Computer Science, SpringerVerlag, 417 -426, 1986.
S.Sugantha Priya, Dr.M.Mohanraj, “A Review on Secure Elliptic Curve Cryptography (ECC) and Dynamic Secure Routing Link Path Detection Algorithm (DSRLP) Under Jamming Attack”, ISSN: 0474-9030, Vol-68-Issue-30, February. 2020.
Negin Dinarvand, Hamid Barati , “An efficient and secure RFID authentication protocol using elliptic curve cryptography”, Springer Science+Business Media, LLC, 2017
Utku Gulen, Selcuk Baktir, “Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform”, journal-sensors, Published: 9 March. 2020.
D. Sravana Kumar, CH. Suneetha, A. ChandrasekhAR , “Encryption of Data Using Elliptic Curve Over Finite Fields”, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January. 2012.
Alfred J. Menezes and Scott A. Vanstone, “Elliptic Curve Cryptosystems and their implementations”, Journal of Cryptology, Volume-6, Number-4, pages 209-224, 1993.
Enge A. “Elliptic curves and their applications to cryptography”, Norwell, MA: Kulwer Academic publishers, 1999.
Neil Koblitz, “An Elliptic Curve implementation of the finite field digital signature algorithm”, in Advances in cryptology,(CRYPTO 1998), Springer Lecture Notes in computer science, 1462, 327-337, 1998.
D. Sravana Kumar, CH. Suneetha, A. ChandrasekhAR “Encryption of data using Elliptic curve over finite fields”, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012.
Vu Thi Hai Ha, Dinh Thi Hang, Bui Dang Binh, “The influence of volume on the formant of vowels and the identification of Vietnamese speakers”, Vietnam Institute of Linguistics, 2015.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).