Open Access   Article Go Back

Some Techniques of Ancient Indian Vedic Mathematics for Elliptic Curve Cryptography over the Ring A4

Manoj Kumar1 , Ankur Kumar2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1330-1337, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.13301337

Online published on May 31, 2019

Copyright © Manoj Kumar, Ankur Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Manoj Kumar, Ankur Kumar, “Some Techniques of Ancient Indian Vedic Mathematics for Elliptic Curve Cryptography over the Ring A4,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1330-1337, 2019.

MLA Style Citation: Manoj Kumar, Ankur Kumar "Some Techniques of Ancient Indian Vedic Mathematics for Elliptic Curve Cryptography over the Ring A4." International Journal of Computer Sciences and Engineering 7.5 (2019): 1330-1337.

APA Style Citation: Manoj Kumar, Ankur Kumar, (2019). Some Techniques of Ancient Indian Vedic Mathematics for Elliptic Curve Cryptography over the Ring A4. International Journal of Computer Sciences and Engineering, 7(5), 1330-1337.

BibTex Style Citation:
@article{Kumar_2019,
author = {Manoj Kumar, Ankur Kumar},
title = {Some Techniques of Ancient Indian Vedic Mathematics for Elliptic Curve Cryptography over the Ring A4},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1330-1337},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4409},
doi = {https://doi.org/10.26438/ijcse/v7i5.13301337}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.13301337}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4409
TI - Some Techniques of Ancient Indian Vedic Mathematics for Elliptic Curve Cryptography over the Ring A4
T2 - International Journal of Computer Sciences and Engineering
AU - Manoj Kumar, Ankur Kumar
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1330-1337
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
341 164 downloads 124 downloads
  
  
           

Abstract

In this present approach, some efficient computing techniques of Ancient Indian Vedic Mathematics for elliptic curve cryptography (ECC) over the Ring A4 has been studied, in which, it has been observed that the applications of AIVM Techniques or Sutras decrease the number of multiplications and squares which occur in point doubling and point addition in ECC over the Ring A4. This paper described the use of AIVM Sutras, Urdhva-Tiryagbhyam for multiplication and Dvandva-Yoga for the square of any number in the ECC over the Ring A4. The results proved that AIVM based scheme shows better performance in speed, processing time and power consumption of multipliers compared to conventional method. The effect of some AIVM techniques over ECC was investigated and the obtained results are explained in the form of tables and graphs.

Key-Words / Index Term

Cryptography, Dvandva-Yoga, Elliptic Curve, Finite Field, Point Addition, Point Doubling, Ring A4, Scalar Multiplication, Urdhva-Tiryagbhyam, Vedic Mathematics

References

[1] A. Chillali, M.H. Hassib, M.A. Elomary, “Elliptic curves over a chain ring of characteristic 3”, Journal of Taibah University for Science, Vol.9 Issue.3, pp.276-287, 2015.
[2] A. Kan he, S.K. Das, A.K. Singh, “Design and implementation of low power multiplier using Vedic multiplication technique”, International Journal of Computer Science and Communication, Vol.3, Issue.1, pp.131-132, 2012.
[3] A. Nanda, S. Behera “Design and Implementation of Urdhva-Tiryagbhyam Based Fast Vedic Binary Multiplier”, International Journal of Engineering Research & Technology, Vol.3, Isuue.3, pp.1856-1859, 2014.
[4] A. Pawar, A.K. Sahu, G.R. Sinha, “Implementation of High Speed Vedic Multiplier” International Journal of Innovative Research in Advanced Engineering, Vol.1, Issue10, pp.396-401, 2014.
[5] A. Tadmori, A. Chillali and M. Ziane, “Coding over elliptic curves in the ring of characteristic two”, International journal of Applied Mathematics and Informatics, Vol.8, pp.65-67, 2014.
[6] A. Tadmori, A. Chillali and M. Ziane., “Elliptic Curve over Ring A4”, Applied Mathematics Science, Vol.9, pp.1721-1733, 2015.
[7] A. Tadmori, A. Chillali and M. Ziane., “Normal Form of the elliptic curves over the finite ring”, Journal of Mathematics and system Science, Vol.4, pp.194-196, 2014.
[8] G. Sameer, M. Sumana and S. Kumar, “Novel High Speed Vedic Mathematics Multiplier using Compressors” International Journal of Advanced Technology and Innovative Research, Vol.7, Issue.2, pp.0244-0248, 2015.
[9] J. S. S. B. K. Tirthaji, Vedic Mathematics or Sixteen Simple Sutras from Vedas, Motilal Bhandaridas Varanasi India, 1986.
[10] K. N. Palata, V. K. Nadar, J. S. Jethawa, T. J. Surwadkar and R. S. Deshmukh “Implementation of an Efficient Multiplier based on Vedic Mathematics” International Research Journal of Engineering and Technology, Vol.4, Issue.4, pp494-497, 2017.
[11] M. Poornima, S. K. Patil, S. Kumar, K. P. Shridhar and H. Sanjay, “Implementation of multiplier using Vedic algorithm”, International Journal of Innovative Technology and Exploring Engineering, Vol.2, Issue6, pp.219-223 , 2013.
[12] N. Koblitz, “Elliptic Curve Cryptosystem”, Journal of Mathematics Computation, Vol.48, Issuue.177, pp.203-209, 1987.
[13] N. Shylashree, D. V. N. Reddy and V. Sridhar, “Efficient Implementation of Scalar Multiplication for Elliptic Curve Cryptography using Ancient Indian Vedic Mathematics over GF(p)", International Journal of Computer Applications, Vol.49, Issue.7, pp.0975-8887, 2012.
[14] R. Anchalya, G. Chiranjeevi N., S. Kulkarni, “Efficient Computing Techniques using Vedic Mathematics Sutras, International Journal of Innovative Research in Electrical”, Electronic Instrumentation and control engineering, Vol.3, Issue5, pp.24-27, 2015.
[15] S. M. Salim and S. A. Lakhotiya, “Implementation of RSA Cryptosystem Using Ancient Indian Vedic Mathematics” International Journal of Science and Research, Vol.4, Issue.5, pp.3221-3230, 2015.
[16] S. Sadanandan and V.Anjali, “Design of advanced encryption standard using Vedic Mathematics” International Journal of Innovative Research in Advanced Engineering, Vol.1, Issue.6, pp.322-325, 2014.
[17] W. Stallings, “Cryptography and Network Security: Principals and Practices” Prentice Hall, India, 2003.