JOURNAL ARTICLE

ENCRYPTION/DECRYPTION USING ELLIPTICAL CURVE CRYPTOGRAPHY

Ansah Jeelani Zargar

Year: 2017 Journal:   International Journal of Advanced Research in Computer Science Vol: 8 (7)Pages: 48-51   Publisher: International Journal of Advanced Research in Computer Science

Abstract

One of the buzzwords in network security nowadays is the ECC-Elliptical Curve Cryptography.It is one of the best cryptography techniques that provide security to our personal as well as professional data over the network.In our day to day life the need of data sharing has increased exponentially.We like to stay updated with every events occurring around and love to be a "know-it-all".With the upswing of social networking people stay connected all the time.They make their social media profiles and use them to communicate by sharing their information over the network.It has become a necessary part of our life.The need for securing that data has also increased, in order to prevent attacks that may cause unauthorized access to our data, misuse of our data or modification of our data and also to maintain privacy over the network.Thus sharing the data has to be done in such a way such that only the sender and the receiver understands it and no one else on the network does.It is done by using methods of encryption and decryption, wherein we change our data in a way that it becomes senseless to everyone, until it is changed back to its original form in order to make sense out of it.We have many techniques for doing the same.In this paper we will be discussing about two such techniques that encompass not only server and desktop systems, but also large numbers of small devices ranging from PDAs and cell phones to appliances and networked sensors.To the end we will be making a necessary comparison between the techniques explaining why ECC is better than any other cryptographic techniques recent to it.

Keywords:
Computer science Computer security Communication source Encryption Cryptography Elliptic curve cryptography Data sharing Order (exchange) Internet privacy Computer network Public-key cryptography

Metrics

13
Cited By
0.64
FWCI (Field Weighted Citation Impact)
0
Refs
0.73
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Cryptography and Residue Arithmetic
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Encryption and Decryption of data using Elliptical Curve Cryptography

V GnanalakshmiN. YogavarshiniA. HemapriyadharshiniG.P.Mithra Pooja

Journal:   International Journal of Innovative Technology and Exploring Engineering Year: 2019 Vol: 8 (9)Pages: 1141-1144
JOURNAL ARTICLE

Text Encryption in Android Chat Applications using Elliptical Curve Cryptography (ECC)

Dimas NatanaelFaisal FaisalDewi Suryani

Journal:   Procedia Computer Science Year: 2018 Vol: 135 Pages: 283-291
© 2026 ScienceGate Book Chapters — All rights reserved.