Ijeee v1i4 03

Page 1

IJEEE, Vol. 1, Issue 4 (August, 2014)

e-ISSN: 1694-2310 | p-ISSN: 1694-2426

REVIEW OF CRYPTOGRAPHY WITH ECC ENCRYPTION SCHEME 1

Indu Bala, 2Dr. Dinesh Arora

1,2

Gurukul Vidyapeeth Institute of Engineering & Technology, Banur, Punjab, India 1

thakurindu405@yahoo.com, 2drdinesh169@gmail.com

ABSTRACT—This paper represent the basic idea of elliptic curve cryptography. Cryptography is the art of hiding information so the network security can be arranged. We explain the communication between cryptography and elliptic curve.ECC uses the public key to give high security and high speed.ECC is very helpful cryptography techniques with implementation of AES and MD5 algorithms. In our study we will we will growth the Rivest ciper with elliptic curve cryptography along with message summary and leading encryption usual techniques. The Rivest ciper will be effected with data aggregation and validation program which will be joined with MD5 and AES.WSN will be checked with RSA and mini signature processes.

process known as encryption. And transforming an encrypted message to its original form is cultivated by process is known as decryption. Cryptography is the science of information security. It concerns with some objectives; Confidentially—the information cannot be understood by anyone for whom it was unexpected. Integrity—the information cannot be modified in storage or travel between sender and intended receiver without the alteration being discovered. Non-repudiation—the producer/sender of the information cannot discard at a later stage his or her objective in the creation or transmission of the information. Verification— process of actually conforming that identity.

KEYWORDS—Elliptic curve cryptography, public key, wireless sensor network, encryption, decryption, MD5.

SYMMETRIC KEY CRYPTOGRAPHY—Here we use the same key for encryption and decryption. Symmetric key cryptography is easy to count and the public key is more protected compared to symmetric but it is slow. To connecting these two methods, the level of security can be increased. Data Encryption Standard to raise the speed and security level. Each and every node in a network has a combination of key,the

I. INTRODUCTION WIRELESS SENSOR NETWORKS—Sensor networks are randomly divided networks of limited, weightless wireless nodes, to monitor the physical framework such as light, temperature, current, pressure. These nodes are small in size and communicate in short-lived distances. These small nodes consist of sensing, data processing and communicating fundamentals. Sensor networks produce a powerful improvement over common sensors. The location of sensor nodes need not be engineered or prearranged. Sensor nodes are used in many applications which require regular monitoring, vehicular tracking and emergency medical care systems. Sensor networks are also energy strained network.WSN is the process of propagating a new code image or suitable commands to sensor nodes. CRYPTOGRAPHY—Cryptography is the art of suppressing information so that network security can be provided. It is a exhaustive, complementary subject. It is the major component for security application used to arrange cryptographic services communication over public and unsecured channels. Cryptography focuses on issues of securing messages. The main goal of cryptography is to encode the data to unreadable form and vice versa. Transforming a message to an exhaustive form. In this paper, we study the usage of elliptic curves in cryptography. Cryptographic systems have been used extensively in our daily routine communications to provide us with upraised or grand level of security. Cryptography is applied in many applications such as; internet communication, mobile phones, banking transactions. Transforming a message to an incomprehensive form is cultivated by a International Journal of Electrical & Electronics Engineering

10

private key and the public key. In a public key, every party has a combination of keys, one distributed in public, called as the public key. And other saved in a protected place, known as secret or private key. ASYMMERTICKEY CRYPTOGRAPHY—In public key cryptography, the end to end encryption does not provide a provision for aggregation on intermediate nodes because it is unaware about the private key of sink node. Public key cryptography for hop by hop encryption is not suited for WSN because of computational complexity which consumes more energy in the order of micro joules at each node. MESSAGE ENCRYPTION AT SOURCE NODE—The message to be transferred is initially divided into two regions; aggregation data and required data. Required data region contain the sink is interested in, and the aggregation data region contains the data that is used www.ijeee-apm.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.