International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 111

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015


Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Anagha P. Zele, Avinash P. Wadhe


Abstract: - Elliptic curves were first proposed as a basis for public key cryptography in the mid-1980s independently by Koblitz and Miller. Elliptic curve cryptography (ECC) algorithm is practical than existing security algorithms. Because of this fact, it showed real attraction to portable devices (handheld devices) manufacturers and the security of their systems. In fact, through these devices, anyone can access either email, or do bank transaction or buy anything on internet using credit cards with high security standards. Elliptic curve algorithm is promising to be the best choice of these handhelds or similar devices because of low computing power and fast execution. ECC further gives very high security as compared to similar crypto systems with less size of key. For example, 160 bit ECC system is believed to provide same level of security as 1024 bit RSA [5, 6]. The other two ECC scalar multiplication modular operations are inversion and multiplication. Inversion is known to be the complex and very expensive operation [7], its cost is reduced by converting the normal (x, y) affine coordinate system to projective coordinate system (X, Y, Z) which will add-up more modular multiplications to the process, i. e. it will increase the number of multiplications in both ECC point doubling and adding processes operations to reduce the inversion complexity


Keywords: ECC, JECC, public key cryptography, finite prime


Edition: Volume 4 Issue 4, April 2015,


Pages: 2086 - 2089


How to Cite this Article?

Anagha P. Zele, Avinash P. Wadhe, "Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB153565, Volume 4 Issue 4, April 2015, 2086 - 2089

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'ECC'

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Similar Articles with Keyword 'public key cryptography'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1934 - 1936

Trapping Unauthorized Signals in Jammer

Meena Kudande, D. C. Mehetre

Share this Article
Top