An innovative Approach for enhancing the security of Amazigh Text using Graph Theory based ECC
Keywords:
Elliptic curve, Cryptography, Graph theory, Adjacency Matrix, Unicode, Amazigh text.Abstract
Security in today’s world is one of the important challenges. Encryption is one of the popular methods to achieve secret communication between sender and receiver. Graph theory is widely used as a tool of encryption, due to its various properties and its easy representation in computers as a matrix. In this paper we introduce an enhanced approach of elliptic curve encryption algorithm for achieving better data protection using graph theory. Experimental results show that this proposed method is more efficient and robust.
References
- Darrel R. Hankerson, A. Menezes and A. Vanstone, “Guide to Elliptic Curve Cryptography”, Springer, 2004.
- Ali M. Sagheer, “Elliptic curves cryptographic techniques”, proceeding of the 6th International Conference on Signal Processing and Communication Systems, 2012 IEEE, Gold Coast, Australia, , pp.12-14 December 2012.
- Kurt M, Yerlikaya Y. 2013. “A new modified cryptosystem based on Menezes Vanstone elliptic curve cryptography algorithm that uses characters hexadecimal values". International Conference on Technological Advances in Electrical, Electronics and Computer Engineering: IEEE, pp. 449-453.
- M. Yamuna, A. Sankar, Siddarth Ravichandran, V. Harish. 2013. “Encryption of a Binary String Using Music Notes and Graph theory”, International Journal of Engineering and Technology, Vol. 5 No 3, pp. 2920-2925.
- M. Yamuna, A. Suwathi, Nikitha Krishnan. 2014. “Four Digit Pin Number as a Digraph”, International Journal of Computer Application, Issue 4, Volume 3, pp. 100-107.
- Shubham Agarwal and Anand Singh Uniyal. 2015. “Prime Weighted Graph in Cryptographic system for Secure Communication”, International Journal of Pure and Applied Mathematics, Vol. 105 No. 3, pp. 325-338.
- Krishnappa.H.K., N.K.Srinath and P.Ramakanth Kumar. 2010. “Vertex Magic Total Labeling of Complete graphs”, IJCMSA., Vol 4, No 1-2, pp. 157-169.
- Wael Mahmoud Al Etaiwi. 2014, “Encryption Algorithm Using Graph Theory”, Journal of Scientific Research & Reports, Journal of Scientific Research & Reports, Vol 3, No.19, pp. 2519-2527.
- Sagheer AM. “Enhancement of elliptic curve cryptography methods [MSc Thesis], Iraq, University of Technology, 2004.
- Hoffstein, Jeffrey, Jill Pipher, and Joseph H. Silverman. "In An Introduction to Mathematical Cryptography", pp. 299-371. Springer, 2014.
- Thippeswamy.K., Hanumanthappa. J., Manjaiah D.H. 2010. “A study on contrast and comparison between Bellman-Ford and Dijkstra’s Algorithms”, National Conference on wireless Networks.
- Ameur M. 2006. “Graphie et orthographe de l’amazighe”, Rabat: IRCAM, pp. 47-48.
- Zenkouar L. 2008. "Normes des technologies de l’information pour l’ancrage de l’écriture amazighe,”, Etudes et documents berbères, 27, pp. 159–172.
- F.Amounas. 2015. "Enhanced Elliptic Curve Encryption Approach of Amazigh alphabet with Braille representation", International Journal of Computer Science and Network Solutions, vol 3, No 8, pp. 1-9.
- F.Amounas and E.H. El Kinani. 2012. "Fast mapping method based on matrix approach for elliptic curve cryptography", International Journal of Information & Network Security, vol.1, No.2, pp. 54-59.
- Herbert Shildt. 2011, “Java complete reference”, Tata McGraw-Hill.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.