IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET162390                                                     

An innovative Approach for enhancing the security of Amazigh Text using Graph Theory based ECC


  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Security in today’s world is one of the important challenges. Encryption is one of the popular methods to achieve secret communication between sender and receiver. Graph theory is widely used as a tool of encryption, due to its various properties and its easy representation in computers as a matrix. In this paper we introduce an enhanced approach of elliptic curve encryption algorithm for achieving better data protection using graph theory. Experimental results show that this proposed method is more efficient and robust.


Elliptic curve, Cryptography, Graph theory, Adjacency Matrix, Unicode, Amazigh text.

  1. Darrel R. Hankerson, A. Menezes and A. Vanstone, “Guide to Elliptic Curve Cryptography”, Springer, 2004.
  2. Ali M. Sagheer, “Elliptic curves cryptographic techniques”, proceeding of the 6th International Conference on Signal Processing and Communication Systems, 2012 IEEE, Gold Coast, Australia, , pp.12-14 December 2012.
  3. Kurt M, Yerlikaya Y. 2013. “A new modified cryptosystem based on Menezes Vanstone elliptic curve cryptography algo­rithm that uses characters hexadecimal values". Interna­tional Conference on Technological Advances in Electrical, Electronics and Computer Engineering: IEEE, pp. 449-453.
  4. M. Yamuna, A. Sankar, Siddarth Ravichandran, V. Harish. 2013. “Encryption of a Binary String Using Music Notes and Graph theory”, International Journal of Engineering and Technology, Vol. 5 No 3, pp. 2920-2925.
  5. M. Yamuna, A. Suwathi, Nikitha Krishnan. 2014. “Four Digit Pin Number as a Digraph”, International Journal of Computer Application, Issue 4, Volume 3, pp. 100-107.
  6.  Shubham Agarwal and Anand Singh Uniyal. 2015. “Prime Weighted Graph in Cryptographic system for Secure Communication”, International Journal of Pure and Applied Mathematics, Vol. 105 No. 3, pp. 325-338.
  7. Krishnappa.H.K., N.K.Srinath and P.Ramakanth Kumar. 2010. “Vertex Magic Total Labeling of Complete graphs”, IJCMSA., Vol 4, No 1-2, pp. 157-169.
  8. Wael Mahmoud Al Etaiwi. 2014, “Encryption Algorithm Using Graph Theory”, Journal of Scientific Research & Reports, Journal of Scientific Research & Reports, Vol 3, No.19, pp. 2519-2527.
  9. Sagheer AM. “Enhancement of elliptic curve cryptography methods [MSc Thesis], Iraq, University of Technology, 2004.
  10. Hoffstein, Jeffrey, Jill Pipher, and Joseph H. Silverman. "In An Introduction to Mathematical Cryptography", pp. 299-371. Springer, 2014.
  11. Thippeswamy.K., Hanumanthappa. J.,  Manjaiah D.H. 2010. “A study on contrast and comparison between Bellman-Ford and Dijkstra’s Algorithms”, National Conference on wireless Networks.
  12. Ameur M. 2006. “Graphie et orthographe de l’amazighe”, Rabat: IRCAM, pp. 47-48.
  13. Zenkouar L. 2008. "Normes des technologies de l’information pour l’ancrage de l’écriture amazighe,”, Etudes et documents berbères, 27, pp. 159–172.
  14. F.Amounas. 2015. "Enhanced  Elliptic Curve Encryption Approach of Amazigh alphabet with Braille representation", International Journal of Computer Science and Network Solutions, vol 3, No 8, pp. 1-9.
  15. F.Amounas and E.H. El Kinani. 2012. "Fast mapping method based on matrix approach for elliptic curve cryptography", International Journal of Information & Network Security, vol.1, No.2, pp. 54-59.
  16. Herbert Shildt. 2011, “Java complete reference”, Tata McGraw-Hill.

Publication Details

Published in : Volume 2 | Issue 3 | May-June - 2016
Date of Publication Print ISSN Online ISSN
2016-06-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
480-487 IJSRSET162390   Technoscience Academy

Cite This Article

Fatima AMOUNAS, "An innovative Approach for enhancing the security of Amazigh Text using Graph Theory based ECC", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 3, pp.480-487, May-June-2016.
URL : http://ijsrset.com/IJSRSET162390.php