Loading

Implementation of Double Fold Text Encryption Based on Elliptic Curve Cryptography (ECC) with Digital Signature
CH. Suneetha1, T. Surendra2, CH. Neelima3
1CH. Suneetha, Associate Professor, Dept. of Applied Mathematics GITAM University, Visakhapatnam, India.
2T. Surendra, Assistant Professor, Dept. of Applied Mathematics GITAM University, Visakhapatnam, India.
3CH. Neelima, Faculty of Mathematics, Sankethika Engineering college Visakhapatnam, India.

Manuscript received on January 05, 2020. | Revised Manuscript received on January 25, 2020. | Manuscript published on January 30, 2020. | PP: 3840-3846 | Volume-8 Issue-5, January 2020. | Retrieval Number: E6446018520/2020©BEIESP | DOI: 10.35940/ijrte.E6446.018520

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As the internet provides access to millions of communications in every second around the world, security implications are tremendously increasing. Transfer of important files like banking transactions, tenders, and e commerce require special security and authenticated mechanism in its journey from the sender to the receiver. Recent attention of cryptography is mainly focused on use of elliptic curves in public key cryptosystems. The present paper explains an innovative public key cryptographic scheme for protecting sensitive of critical information using elliptic curve over finite field. This mechanism besides providing the robustness of the cipher contributes the authentication of the message with digital signature.
Keywords: Encryption, Decryption, Elliptic curve over finite field, Digital Signature Algorithm.
Scope of the Article: Digital Clone or Simulation.