Open Access   Article Go Back

A Method of Text Message Mapping in Elliptic Curve Cryptosystems

T. K. Ghosh1

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 395-398, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.395398

Online published on Mar 31, 2019

Copyright © T. K. Ghosh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: T. K. Ghosh, “A Method of Text Message Mapping in Elliptic Curve Cryptosystems,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.395-398, 2019.

MLA Style Citation: T. K. Ghosh "A Method of Text Message Mapping in Elliptic Curve Cryptosystems." International Journal of Computer Sciences and Engineering 7.3 (2019): 395-398.

APA Style Citation: T. K. Ghosh, (2019). A Method of Text Message Mapping in Elliptic Curve Cryptosystems. International Journal of Computer Sciences and Engineering, 7(3), 395-398.

BibTex Style Citation:
@article{Ghosh_2019,
author = {T. K. Ghosh},
title = {A Method of Text Message Mapping in Elliptic Curve Cryptosystems},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {395-398},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3851},
doi = {https://doi.org/10.26438/ijcse/v7i3.395398}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.395398}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3851
TI - A Method of Text Message Mapping in Elliptic Curve Cryptosystems
T2 - International Journal of Computer Sciences and Engineering
AU - T. K. Ghosh
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 395-398
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
357 212 downloads 116 downloads
  
  
           

Abstract

Use of web applications in our day to day life are increasing, which result in an increase in the amount of sensitive data transmitted over the Internet. Sensitive data can be transmitted securely over the Internet by encrypting them. Among several public key cryptosystems elliptic curve cryptosystem is a recent one. This cryptosystem gives us stronger security with smaller key size, thus making it useful in those devices which have limited memory and power consumption ability. Encoding of text messages into elliptic curve points and decoding encoded points into original plaintext is always challenging in ECC. General approach for message mapping is to encode the characters of a message into the x-Coordinate of a point on an elliptic curve Ep (a, b). Then find out corresponding y value so that (x, y) lies on Ep (a, b). The point is then encrypted and transmitted. Since for every point both x and y values are to be transmitted and for stronger security, value of p is of at least 160 bits in today’s standard, therefore a major concern is to diminish the number of bits used in mapped point (x, y). In this paper we will discuss about a new mapping methodology of a group of alphanumeric characters into an elliptic curve point which reduces the number of bits to be transmitted without compromising the data security.

Key-Words / Index Term

Elliptic Curve, Mapping algorithm, encoding, decoding, encryption, decryption

References

[1] Victor Miller, “Uses of Elliptic Curve in Cryptography”, Advances in cryptology-CRYPTO’85, vol-218, SpringerHeidelberg, 1986, pp. 417-426.
[2] Neal Koblitz, “Elliptic Curve Cryptosystems”, Mathematics of Computation, Vol-48, 1987, pp-203-209
[3] Alfred J Menezes, Paul C. van Oorschot, Scott A Vanstone, “A Handbook of applied Cryptography”. CRC Press.
[4] Darrel Hankerson, Alfred Menezes, Scott Vanstone “Guide to Elliptic Curve Cryptography”, Springer Professional Computing, 2004.
[5] William Stallings, “Network Security Essentials: Applications and Standards”, 4th Edition.
[6] F.Amounas and E.H.EI Kinani, “Fast mapping method based on matrix approach for Elliptic Curve cryptography”, International Journal of Information and Network Security 1, 54-59(2012).
[7] Bh P, Chandravati D, Prapoorna Roja P, “Encoding and decoding of a message in the implementation of Elliptic Curve Cryptography using Koblitz’s method.” International Journal on Computer Science and Engineering, 2010; 2(5): 1904-1907.
[8] Aritro Sengupta and Utpal Kumar Ray, “Message mapping and reverse mapping in elliptic curve cryptosystem”, Security Comm. Networks 2016;9:5363:5375.
[9] Oxford University Press, 2019, “which-letters-are-used-most”.
[10] Recommended elliptic curves for federal government use; July 1999.
[11] John Cannon, Wieb Bosma, Claus Fieker, Allan Steel (Editors), “Handbook of Magma Functions”, Version 2.19.