Safety Measures Using Sextic Curve Cryptography

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2

Abstract

This paper proposes Sextic Curve Cryptography, which is used to increase the safety measures. The methods to find the critical points in the SCC based on Atriphtaloid symmetric curve using point addition and point doubling also explored here. The operations in finite fields makes the data more secure, which is expressed by several field operations. The experimental result shows the safety measures and harder security of data. The overall objective is to develop harder security measures using Sextic Curve Cryptography.

Authors and Affiliations

W. R. Sam Emmanuel , Dr. C. Suyambulingom

Keywords

Related Articles

Automatic Detection of ECG R-R Interval using Discrete Wavelet Transformation

Detection of QRS-complexes takes an important role in the analysis of ECG signal, based on which the number of heart beats and an irregularity of a heart beat through R-R interval can be determined. Since an ECG may be o...

Probability Measure of Navigation pattern predition using Poisson Distribution Analysis

The World Wide Web has become one of the most important media to store, share and distribute information. The rapid expansion of the web has provided a great opportunity to study user and system behavior by exploring web...

AN EFFICIENT APPROACH FOR ROUTING IN WIRELESS AD HOC NETWORK USING ARTIFICIAL INTELLIGENCE

MANETs are the set of small, low infrastructure communication setup that operates by consuming the energy of batteries. Thus, it is very much important for MANETs to perform efficiently. For efficient transmission, routi...

An Approach to Automatic Generation of Test Cases Based on Use Cases in the Requirements Phase

The main aim of this paper is to generate test cases from the use cases. In the real-time scenario we have to face several issues like inaccuracy, ambiguity, and incompleteness in requirements this is because the require...

Bitwise Operations Based Encryption and Decryption

In this paper, variable block length based character/bit level ransformation has been proposed for encryption and cryption, where a block of characters /few bits has taken into account. he originated text is transfor...

Download PDF file
  • EP ID EP134555
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

W. R. Sam Emmanuel, Dr. C. Suyambulingom (2011). Safety Measures Using Sextic Curve Cryptography. International Journal on Computer Science and Engineering, 3(2), 800-806. https://europub.co.uk./articles/-A-134555