Image Encryption Using Elliptic Curve CR
Image Encryption Using Elliptic Curve CR
Nikita Gupta1, Vikas Kundu2, Neha Kurra3, Shivani Sharma4, Bhagyashree Pal5
Department of Computer Engineering
Army Institute of Technology
Pune, India
gupta_nikita12@yahoo.co.in1, kundu.vikas13@gmail.com2, kneha93@yahoo.co.in3, shivani24_7@yahoo.co.in4
PbA=nA.G
IV. APPROACH
Here y, x, a and b belongs to curve Fp and they are integers
modulo p. The coefficients a and b are the characteristic The complete process followed by us can be summarized
coefficients of the curve. by the following flowchart:
1. Curve cryptosystem parameters
References
[1]. Maryam Savari and Yeoh Eng Thiam, “Comparison of ECC and RSA in
Multipurpose Smart Card Application”.
[2]. Elsayed Mohammed and A.E Emarah and Kh.El-Shenawwey, “Elliptic
Curve Cyrptosystems on Smart Cards”.
[3]. Padma Bh, D.Chandravathi, P.prapoorna Roja: “Encoding and decoding
of a message in the implementation of Elliptic Curve Cryptography
using Koblitz Method”. International Journal on Computer Science and
Engineering (IJCSE) Vol. 02, No. 05, 2010, 1904-1907
[4]. Hankerson, Menezes, Vanstone. “Guide to elliptic curve cryptography”
Springer, 2004 ISBN 038795273X 332s_CsCr
[5]. http://www.nsa.gov/business/programs/elliptic_curve.shtml
[6]. Kamlesh Gupta1, Sanjay Silakari, “ECC over RSA for Asymmetric
Encryption: A Review”
[7]. http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-
primer-on-elliptic-curve-cryptography/2/
[8]. http://www.nsa.gov/business/programs/elliptic_curve.shtml
VII. FUTURE SCOPE [9]. Santoshi Ketan Pote, Usha Mittal “Elliptic Curve Cryptographic
Algorithm”
Elliptic Curve Cryptography is such an excellent choice for [10]. Christof Paar, Jan Pelzl ,”Understanding Cryptography”
doing asymmetric cryptography in portable, necessarily
constrained devices right now, mainly because of the level of
security offered for smaller key sizes. A popular,
recommended RSA key size for most applications is 2,048
bits. For equivalent security using Elliptic Curve