Open Access Open Access  Restricted Access Subscription or Fee Access

A Robust Elliptical Based Security using Cryptography Technique

S. Suriya, S. Sivachandrian, D. JayaKumar

Abstract


With the increase of networked electronic communication came overwhelming capabilities to collect, process, combine and store data, resulting in previously unseen transformational pressure on the concepts of trust, security and privacy as we know them. In the Future all the work will be made digitalized. Technology development for data linking and mining, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity lie at the basis of many human interactions and transactions, and societies have developed legitimate concern for privacy being essential for freedom and creativity. The up-and-coming development of the Information Society shows the readiness to respond to the transformational change evoked by ICT. We have reached the eleventh hour for the safeguarding of trust and privacy as elements that can be transposed into our digital future. The Cryptography plays major role in securing data while transmission. There are several cryptographic techniques introduced to secure data in the current world. In future the technology may improve in such a way that the current cryptographic technique may enhance the security of the data. Hence the cryptographic requirements must also be improved.


Keywords


Cryptography, Unauthorized, Elliptical Curve, UNICODE.

Full Text:

PDF

References


https://www.cl.cam.ac.uk/~rja14/Papers/SE-05.pdf

http://encryption_policies.tripod.com/us/denning_1095_fut ure.htm

http://www.ttivanguard.com/austinreconn/encrypt.pdf

http://staffweb.ncnu.edu.tw/jcliu/course/security2005/02-Classical.pdf.

http://findlaw.co.uk/law/consumer/other_consumer_law_topi cs/emails-and-privacy.html.

http://www.iaeng.org/publication/WCECS2012/WCECS201 2_pp979-982.pdf.

http://cdn1.tnwcdn.com/wp-content/blogs.dir/1/files/2014/11/data-breach-financials.png

http://www-03.ibm.com/security/services/2014-cyber-security-intelligence-index-infographic/index.html

R. Deaton, R.C. Murphy, M. Garzon, D.R. Franceschetti, and Jr. S.E. Stevens. Reliability and efficiency of a dna-based computation. Phys. Rev. Lett. 80, pages 417–420, 1998.

S. Henikoff and J. G. Henikoff. Amino acid substitution matrices from protein blocks. ProcNatlAcadSci, 89(22):10915–9, Nov 1992..

http://securityaffairs.co/wordpress/33879/security/dna-cryptography.html

https://encryptedtbn2.gstatic.com/images?q=tbn:ANd9GcShvn6qA tCZmMZlIkjZ23JoyXXGvQGsHnWggvhJFzxqEtjKazCYaw

Darrel Hankerson, Julio Lopez Hernandez, Alfred Menezes, Software Implementation of Elliptic Curve Cryptography over Binary Fields, 2000,Available at http://citeseer.ist.psu.edu/hankerson00software.html

M. Brown, D. Hankerson, J. Lopez, A. Menezes, Software Implementation of the NISTElliptic Curves Over Prime Fields, 2001, Available athttp://citeseer.ist.psu.edu/brown01software.html

Aditya gaitonde 2012. Color Coded Cryptography,International Journal of Scientific & Engineering Research, Volume 3, Issue 7

Prof. K. RavindraBabu, Dr.S.Udaya Kumar, Dr.A.VinayaBabu and Dr.Thirupathi Reddy, 2010. A block cipher generation using color substitution, International Journal of Computer Applications Volume 1 – No. 28

MaramBalajee “UNICODE and Colors Integration tool for Encryption and Decryption “published in International Journal on Computer Science and Engineering (IJCSE). ISSN:0975-3397 Vol. 3 No. 3 Mar 2011


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.