A Client Server Crypto System Based on Elliptic Curve Cryptography and Mapping Technique
Keywords:
ECC, EC, Cryptosystem, Python, Cryptography, KeysAbstract
The efficiency and effectiveness of the information systems, in many ways, depend on its architecture and how data are transmitted among different parties. Similarly, a very crucial aspect in the software development is the security of data that flows through open communication channels. One of the most popular architecture is client/server architecture that makes the centralization of data storage and processing enable, and provides flexibility for applying authentication methods and encryption algorithms within information systems. While the number of clients increase, its require increasing the authentication and encryption level as high as possible. Client/server is a technology that allows to open an interactive session between the user's browser and the server. In this study, we used client/server architecture to accomplish secure messaging/chat between clients without the server being able to decrypt the message by applying two layer security: one layer of encryption between the clients and the server, and the second layer of encryption between the clients in the chat room. In this manner, a Client / Server Crypto system Based on elliptic curve cryptography and mapping technique a Secure Messaging System is proposed .Elliptic curve cryptography is a widely used public-key cryptography and authentication system for data encryption of digital messaging transactions such as email over the intranet, extranet and Internet, to encode and decode messages in a terminal window is developed. Elliptic Curve Cryptography (ECC) is a public-key crypto system which can be used for message encryption, key agreement protocols and digital signature applications. ECC offers high level of security with smaller key sizes makes it ideal for applications which run on small devices that have power and memory constraints such as smart cards and cell phones. Encoding (converting a plaintext message to a point) and Decoding (converting a point to a plaintext message) are important functions in encryption and decryption schemes using ECC before transmission over public networks and unsecured channels. In this paper, we proposed a text message encoding scheme which is based on computational operations on points that lie on a predefined elliptic curve (EC). For any ECC-based encryption scheme, the mapping methodology of a plaintext message onto a coordinate on an affine curve is a mandatory prerequisite. ASCII character codes are considered for the mapping method to convert a plaintext message into coordinates of the predefined EC-points. Discussing the mapping methodology, creating the mapping table and the converting process are given in detail along with their implementations.
References
- Bibinagar, N., Kim, W. J. (2013). Switched Ethernet based real-time networked control system with multiple client–server architecture. IEEE/ASME transactions on Mechatronics, 18(1), pp.104-112.
- Honda, K., Hu, R., Neykova, R., Chen, T. C.,Demangeon, R., Deniélou, P. M., Yoshida, N. (2014). Structuring communication with session types. In Concurrent Objects and Beyond, pp. 105-127, Springer BerlinHeidelberg.
- Lin, T., Zhou, K., Wang, S. (2013). Cloudlet–screen computing: a client–server architecture with top graphics performance. International Journal of Ad Hoc and Ubiquitous Computing, 13(2) , pp.96-108.
- Iwamoto, M., Omino, T., Komano, Y., Ohta, K. A new model of Client-Server Communications under information theoretic security. In Information Theory Workshop (ITW), pp. 511-515, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.