International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 131 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013


Elliptic Curve Cryptography: An efficient approach for encryption & decryption of a data sequence

Ankita Soni [2] | Nisheeth Saxena


Abstract: The paper describes the basic idea of Elliptic Curve Cryptography (ECC) and the use of Elliptic curves in Elliptic curve cryptography. This paper gives an introduction to elliptic curves and the basic operations of elliptic curves. Elliptic Curve Diffie Hellman (ECDH) key exchange protocol of ECC is described. The paper illustrates the procedure of Encryption and Decryption of message by first transforming the message into an affine point on the Elliptic Curve (EC), over the finite field GF (p). In ECC we normally starts with an affine point called Pm (x, y) which lies on the elliptic curve [1]. And further the process of encryption and decryption of a text message is implemented. A comparison is performed between the encrypted text messages using different key sizes, to calculate the time consumed by each. The security strength of ECC lies in the unfeasibility of solving the ECDLP (Elliptic Curve Discrete Logarithmic Problem) [2].


Keywords: Elliptic curve cryptography ECC, Elliptic Curve EC, Discrete Logarithm Problem DLP, Elliptic Curve Diffie Hellman ECDH


Edition: Volume 2 Issue 5, May 2013,


Pages: 203 - 208


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Ankita Soni, Nisheeth Saxena, "Elliptic Curve Cryptography: An efficient approach for encryption & decryption of a data sequence", International Journal of Science and Research (IJSR), Volume 2 Issue 5, May 2013, pp. 203-208, https://www.ijsr.net/get_abstract.php?paper_id=IJSRON2013982

Similar Articles with Keyword 'Elliptic'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane [2] | S. N. Shelke [2]

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2174 - 2177

Key Agreement Protocol Based On EC-MQV Algorithm for Cooperative Wireless Communication

Anagha Dhargave | S. U. Nimbhorkar

Share this Article
Top