Modification of text encryption based on Elliptic Curve Cryptography (ECC) and Cayley-Purser Algorithm / Nurul Sakinah Ismail
The modified scheme is considered secure against eavesdroppers if the suitable points on the elliptic curve are remains hard to be found. However, even this problem remains hard today, it is still very likely in the future that efficient algorithms are found and the ECC problem could be solving....
Saved in:
Main Author: | |
---|---|
Format: | Student Project |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | http://ir.uitm.edu.my/id/eprint/37584/1/37584.pdf http://ir.uitm.edu.my/id/eprint/37584/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uitm.ir.37584 |
---|---|
record_format |
eprints |
spelling |
my.uitm.ir.375842020-11-25T03:40:51Z http://ir.uitm.edu.my/id/eprint/37584/ Modification of text encryption based on Elliptic Curve Cryptography (ECC) and Cayley-Purser Algorithm / Nurul Sakinah Ismail Ismail, Nurul Sakinah Mathematical statistics. Probabilities Analytical methods used in the solution of physical problems The modified scheme is considered secure against eavesdroppers if the suitable points on the elliptic curve are remains hard to be found. However, even this problem remains hard today, it is still very likely in the future that efficient algorithms are found and the ECC problem could be solving. Therefore, one of the strategy to surmount this situation is by designing a scheme with multiple hard problems. Motivated from that, this study reviewed the arithmetical properties of elliptic curve and Cayley purser algorithm. After studying the arithmetical properties, this study propose to modify KamalakannanTamilsevans' s scheme (2015) by adding double layers of encryption and decryption. The theoretical aspects of this scheme are analyzed, concluding that the modified scheme have successfully work very well. 2019 Student Project NonPeerReviewed text en http://ir.uitm.edu.my/id/eprint/37584/1/37584.pdf Ismail, Nurul Sakinah (2019) Modification of text encryption based on Elliptic Curve Cryptography (ECC) and Cayley-Purser Algorithm / Nurul Sakinah Ismail. [Student Project] (Unpublished) |
institution |
Universiti Teknologi Mara |
building |
Tun Abdul Razak Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Mara |
content_source |
UiTM Institutional Repository |
url_provider |
http://ir.uitm.edu.my/ |
language |
English |
topic |
Mathematical statistics. Probabilities Analytical methods used in the solution of physical problems |
spellingShingle |
Mathematical statistics. Probabilities Analytical methods used in the solution of physical problems Ismail, Nurul Sakinah Modification of text encryption based on Elliptic Curve Cryptography (ECC) and Cayley-Purser Algorithm / Nurul Sakinah Ismail |
description |
The modified scheme is considered secure against eavesdroppers if the suitable points on
the elliptic curve are remains hard to be found. However, even this problem remains hard
today, it is still very likely in the future that efficient algorithms are found and the ECC
problem could be solving. Therefore, one of the strategy to surmount this situation is by
designing a scheme with multiple hard problems. Motivated from that, this study
reviewed the arithmetical properties of elliptic curve and Cayley purser algorithm. After
studying the arithmetical properties, this study propose to modify KamalakannanTamilsevans'
s scheme (2015) by adding double layers of encryption and decryption. The
theoretical aspects of this scheme are analyzed, concluding that the modified scheme have
successfully work very well. |
format |
Student Project |
author |
Ismail, Nurul Sakinah |
author_facet |
Ismail, Nurul Sakinah |
author_sort |
Ismail, Nurul Sakinah |
title |
Modification of text encryption based on Elliptic Curve Cryptography (ECC) and Cayley-Purser Algorithm / Nurul Sakinah Ismail |
title_short |
Modification of text encryption based on Elliptic Curve Cryptography (ECC) and Cayley-Purser Algorithm / Nurul Sakinah Ismail |
title_full |
Modification of text encryption based on Elliptic Curve Cryptography (ECC) and Cayley-Purser Algorithm / Nurul Sakinah Ismail |
title_fullStr |
Modification of text encryption based on Elliptic Curve Cryptography (ECC) and Cayley-Purser Algorithm / Nurul Sakinah Ismail |
title_full_unstemmed |
Modification of text encryption based on Elliptic Curve Cryptography (ECC) and Cayley-Purser Algorithm / Nurul Sakinah Ismail |
title_sort |
modification of text encryption based on elliptic curve cryptography (ecc) and cayley-purser algorithm / nurul sakinah ismail |
publishDate |
2019 |
url |
http://ir.uitm.edu.my/id/eprint/37584/1/37584.pdf http://ir.uitm.edu.my/id/eprint/37584/ |
_version_ |
1685651533329334272 |
score |
13.244414 |