Enhancement of encryption techniques using elliptic curve cryptography

Encryption and decryption processes consume more time for mathematical calculations. The main goal of this research work is to improve ElGamal, Menezes-Vanstone, and Hill Cipher encryption techniques by using Elliptic Curve Cryptography to speed up the calculations in MEGECC and MMVECC, and increase...

Full description

Saved in:
Bibliographic Details
Format: Thesis
Language:English
Subjects:
Online Access:http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/72769/1/Page%201-24.pdf
http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/72769/2/Full%20text.pdf
http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/72769/4/Ziad%20Ershaid.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-unimap-72769
record_format uketd_dc
spelling my-unimap-727692022-12-02T06:09:58Z Enhancement of encryption techniques using elliptic curve cryptography Shahrul Nizam, Yaakob, Assoc. Prof. Dr. Encryption and decryption processes consume more time for mathematical calculations. The main goal of this research work is to improve ElGamal, Menezes-Vanstone, and Hill Cipher encryption techniques by using Elliptic Curve Cryptography to speed up the calculations in MEGECC and MMVECC, and increase the security level and key efficiency in ECCHC. In the modified MEGECC, using hexadecimal ASCII code instead of decimal ASCII code reduced the number of doubling and adding operations in the scalar multiplications and sped up the mathematical computations. Only addition and subtraction operations are used in the proposed MMVECC, and no inversion or multiplication operations are used because it consumes a longer time compared to addition and subtraction, besides using hexadecimal ASCII code to speed up calculations. The third modification in this research work is applied on the original Hill Cipher algorithm, it has a simple structure and fast computations, but weak security. A new hybrid encryption approach between Elliptic Curve Cryptosystem and original Hill Cipher has been proposed to convert Hill Cipher from symmetric technique to asymmetric one and increase its security effectiveness. Self-invertible key matrix is used to generate encryption and decryption secret key. The ability to encrypt every character in the 128 ASCII table by using its decimal ASCII value directly without a mapping table is another contribution in ECCHC approach. All the three modifications in this thesis are applied on text messages of different sizes and different grayscale images of size 256256. For text messages, the number of addition and doubling operations and also the encryption/decryption time needed in the proposed techniques are calculated and compared with other techniques. Universiti Malaysia Perlis (UniMAP) Thesis en http://dspace.unimap.edu.my:80/xmlui/handle/123456789/72769 http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/72769/3/license.txt 8a4605be74aa9ea9d79846c1fba20a33 http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/72769/1/Page%201-24.pdf b5b063751d347263fc48a6766ae957f7 http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/72769/2/Full%20text.pdf 78af11005daf353eff55727376522bb0 http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/72769/4/Ziad%20Ershaid.pdf 37678deba99eb91162ea7ce22e277c67 Universiti Malaysia Perlis (UniMAP) Curves, Elliptic Data encryption (Computer science) Cryptography Encryption School of Computer and Communication Engineering
institution Universiti Malaysia Perlis
collection UniMAP Institutional Repository
language English
advisor Shahrul Nizam, Yaakob, Assoc. Prof. Dr.
topic Curves
Elliptic
Data encryption (Computer science)
Cryptography
Encryption
spellingShingle Curves
Elliptic
Data encryption (Computer science)
Cryptography
Encryption
Enhancement of encryption techniques using elliptic curve cryptography
description Encryption and decryption processes consume more time for mathematical calculations. The main goal of this research work is to improve ElGamal, Menezes-Vanstone, and Hill Cipher encryption techniques by using Elliptic Curve Cryptography to speed up the calculations in MEGECC and MMVECC, and increase the security level and key efficiency in ECCHC. In the modified MEGECC, using hexadecimal ASCII code instead of decimal ASCII code reduced the number of doubling and adding operations in the scalar multiplications and sped up the mathematical computations. Only addition and subtraction operations are used in the proposed MMVECC, and no inversion or multiplication operations are used because it consumes a longer time compared to addition and subtraction, besides using hexadecimal ASCII code to speed up calculations. The third modification in this research work is applied on the original Hill Cipher algorithm, it has a simple structure and fast computations, but weak security. A new hybrid encryption approach between Elliptic Curve Cryptosystem and original Hill Cipher has been proposed to convert Hill Cipher from symmetric technique to asymmetric one and increase its security effectiveness. Self-invertible key matrix is used to generate encryption and decryption secret key. The ability to encrypt every character in the 128 ASCII table by using its decimal ASCII value directly without a mapping table is another contribution in ECCHC approach. All the three modifications in this thesis are applied on text messages of different sizes and different grayscale images of size 256256. For text messages, the number of addition and doubling operations and also the encryption/decryption time needed in the proposed techniques are calculated and compared with other techniques.
format Thesis
title Enhancement of encryption techniques using elliptic curve cryptography
title_short Enhancement of encryption techniques using elliptic curve cryptography
title_full Enhancement of encryption techniques using elliptic curve cryptography
title_fullStr Enhancement of encryption techniques using elliptic curve cryptography
title_full_unstemmed Enhancement of encryption techniques using elliptic curve cryptography
title_sort enhancement of encryption techniques using elliptic curve cryptography
granting_institution Universiti Malaysia Perlis (UniMAP)
granting_department School of Computer and Communication Engineering
url http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/72769/1/Page%201-24.pdf
http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/72769/2/Full%20text.pdf
http://dspace.unimap.edu.my:80/xmlui/bitstream/123456789/72769/4/Ziad%20Ershaid.pdf
_version_ 1776104227992502272