An innovative Approach for enhancing the security of Amazigh Text using Graph Theory based ECC

Authors

  • Fatima AMOUNAS  R.O.I Group, Computer Sciences Department, Moulay Ismail University, Faculty of Sciences and Technics, Errachidia, Morocco

Keywords:

Elliptic curve, Cryptography, Graph theory, Adjacency Matrix, Unicode, Amazigh text.

Abstract

Security in today’s world is one of the important challenges. Encryption is one of the popular methods to achieve secret communication between sender and receiver. Graph theory is widely used as a tool of encryption, due to its various properties and its easy representation in computers as a matrix. In this paper we introduce an enhanced approach of elliptic curve encryption algorithm for achieving better data protection using graph theory. Experimental results show that this proposed method is more efficient and robust.

References

  1. Darrel R. Hankerson, A. Menezes and A. Vanstone, “Guide to Elliptic Curve Cryptography”, Springer, 2004.
  2. Ali M. Sagheer, “Elliptic curves cryptographic techniques”, proceeding of the 6th International Conference on Signal Processing and Communication Systems, 2012 IEEE, Gold Coast, Australia, , pp.12-14 December 2012.
  3. Kurt M, Yerlikaya Y. 2013. “A new modified cryptosystem based on Menezes Vanstone elliptic curve cryptography algo­rithm that uses characters hexadecimal values". Interna­tional Conference on Technological Advances in Electrical, Electronics and Computer Engineering: IEEE, pp. 449-453.
  4. M. Yamuna, A. Sankar, Siddarth Ravichandran, V. Harish. 2013. “Encryption of a Binary String Using Music Notes and Graph theory”, International Journal of Engineering and Technology, Vol. 5 No 3, pp. 2920-2925.
  5. M. Yamuna, A. Suwathi, Nikitha Krishnan. 2014. “Four Digit Pin Number as a Digraph”, International Journal of Computer Application, Issue 4, Volume 3, pp. 100-107.
  6.  Shubham Agarwal and Anand Singh Uniyal. 2015. “Prime Weighted Graph in Cryptographic system for Secure Communication”, International Journal of Pure and Applied Mathematics, Vol. 105 No. 3, pp. 325-338.
  7. Krishnappa.H.K., N.K.Srinath and P.Ramakanth Kumar. 2010. “Vertex Magic Total Labeling of Complete graphs”, IJCMSA., Vol 4, No 1-2, pp. 157-169.
  8. Wael Mahmoud Al Etaiwi. 2014, “Encryption Algorithm Using Graph Theory”, Journal of Scientific Research & Reports, Journal of Scientific Research & Reports, Vol 3, No.19, pp. 2519-2527.
  9. Sagheer AM. “Enhancement of elliptic curve cryptography methods [MSc Thesis], Iraq, University of Technology, 2004.
  10. Hoffstein, Jeffrey, Jill Pipher, and Joseph H. Silverman. "In An Introduction to Mathematical Cryptography", pp. 299-371. Springer, 2014.
  11. Thippeswamy.K., Hanumanthappa. J.,  Manjaiah D.H. 2010. “A study on contrast and comparison between Bellman-Ford and Dijkstra’s Algorithms”, National Conference on wireless Networks.
  12. Ameur M. 2006. “Graphie et orthographe de l’amazighe”, Rabat: IRCAM, pp. 47-48.
  13. Zenkouar L. 2008. "Normes des technologies de l’information pour l’ancrage de l’écriture amazighe,”, Etudes et documents berbères, 27, pp. 159–172.
  14. F.Amounas. 2015. "Enhanced  Elliptic Curve Encryption Approach of Amazigh alphabet with Braille representation", International Journal of Computer Science and Network Solutions, vol 3, No 8, pp. 1-9.
  15. F.Amounas and E.H. El Kinani. 2012. "Fast mapping method based on matrix approach for elliptic curve cryptography", International Journal of Information & Network Security, vol.1, No.2, pp. 54-59.
  16. Herbert Shildt. 2011, “Java complete reference”, Tata McGraw-Hill.

Downloads

Published

2016-06-30

Issue

Section

Research Articles

How to Cite

[1]
Fatima AMOUNAS, " An innovative Approach for enhancing the security of Amazigh Text using Graph Theory based ECC, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 3, pp.480-487, May-June-2016.