Elliptic Curve Public-Key Cryptosystem Over Z(i)

Abstract

A method to implement elliptic curve public-key cryptosystem over Z(i) is discussed. The method is in fact the same as the technique that works on Galois fields but here works on Z(i). The curve under Z(i) generates more points as compared to the curve under Galois fields. The security of the system is better due to more number of points on the curve. But there are some difficulties in the new system and through this paper; we try to discuss some of the pitfalls of the new system.

Authors and Affiliations

Soram Ranbir Singh , Khomdram Memeta Chanu

Keywords

Related Articles

A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network

A structure less network is called the mobile ad-hoc network, where all the nodes are independent. In MANET, there is a collection of mobile nodes that from temporary network. Those nodes are act like a host or like a ro...

Secret Detection of Sensitive Data Leakage

Surveys from many years have shown that many data leakages has been found due different problems like malicious attacks, hacking, different attacks. Approximately 28% of all data leakages are due to human mistakes which...

Modified Suffix Search Algorithm for Multiple String Matching

String Matching is now a prominent field in the area of Computer Science and it has many applications in the real world. A new algorithm for Suffix Search which uses chained hashing is proposed and this works well in mat...

Comparing the Testing Approaches of Traditional, Object-Oriented and Agent- Oriented Software System

Testing is one of the important and indispensable activities of software development life cycle. Software testing makes sure that the developed software satisfies all the customer requirements and executes without error....

A Secure Image Steganography Method Based on Neural Network

Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. By m...

Download PDF file
  • EP ID EP150920
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

Soram Ranbir Singh, Khomdram Memeta Chanu (2012). Elliptic Curve Public-Key Cryptosystem Over Z(i). International Journal of Computer Science & Engineering Technology, 3(4), 22-32. https://europub.co.uk./articles/-A-150920