IMAGE ENCRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY
Main Article Content
Keywords
ECC, domain parameter generation, key pair generation, ElGamal encryption algorithm.
Abstract
This paper deals with encryption of image using Elliptic curve cryptography (ECC).Elliptic curve cryptography (ECC) is an approach to public key cryptography based on algebraic structure of elliptic curves over finite fields. Basic ElGamal elliptic curve encryption is used for encryption of the image. It brings about confidential, authentication and integrity in the exchange of data. The primary benefit promised by ECC is a smaller key size, reducing storage and transmission requirements.
Downloads
Download data is not yet available.
References
1. William Stallings, Cryptography and Network Security, Prentice Hall, 4th Edition, 2006.
2. V. Miller, “Uses of elliptic curves in cryptography”, Advances in Cryptology, Springer-Verlog
New York,1986
3. Jeffrey L. Vagle, “A Gentle Introduction to Elliptic Curve Cryptography”,BBN
Technology,Nov21,2010.
4. D.Hankerson, A.Menezes, and S.A. Vanstone, Guide to Elliptic Curve Cryptography, Springer-
Verlag, 2004.
5. ElGamal, T., “A public key cryptosystem and a Signature scheme based on discrete logarithm,”
IEEE Trans. Informn, Theory, IT-31, no.4, pp 469-472, July 1985.
2. V. Miller, “Uses of elliptic curves in cryptography”, Advances in Cryptology, Springer-Verlog
New York,1986
3. Jeffrey L. Vagle, “A Gentle Introduction to Elliptic Curve Cryptography”,BBN
Technology,Nov21,2010.
4. D.Hankerson, A.Menezes, and S.A. Vanstone, Guide to Elliptic Curve Cryptography, Springer-
Verlag, 2004.
5. ElGamal, T., “A public key cryptosystem and a Signature scheme based on discrete logarithm,”
IEEE Trans. Informn, Theory, IT-31, no.4, pp 469-472, July 1985.
