Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/349840
Title: | Performance and Security Issues of Elliptic Curve Cryptography |
Researcher: | Pagar Yogita Subhashrao |
Guide(s): | Chowdhary Girish V. |
Keywords: | Computer Science Computer Science Theory and Methods Engineering and Technology |
University: | Swami Ramanand Teerth Marathwada University |
Completed Date: | 2020 |
Abstract: | The current era has seen an explosive growth in communications. Applications like newlineonline banking, personal digital assistants, mobile communication, smartcards, etc. newlinehave emphasized the need for security in resource constrained environments. newlineElliptic curve cryptography (ECC) serves as a perfect cryptographic tool because newlineof its short key sizes and high security comparable to that of other standard public key newlinealgorithms. ECC is a key based technique for encrypting data. ECC focuses on pairs newlineof public and private keys for encryption and decryption of messages. newlineECC schemes are based on the scalar multiplication of elliptic curve points and newlinethe computational intractability of the inverse operation, the Elliptic Curve Discrete newlineLogarithm Problem (ECDLP). A survey on existing ECC solutions was conducted with newlinea thorough analysis of the challenges in developing ECC based systems. The challenges newlineidentified in the survey are domain parameter selection, scalar multiplication, point newlinemultiplication, elliptic curve selection, elliptic curve generation, key generation, key newlinesize selection, security measurements, applications etc. newlineThe objective of this thesis is to focus on key generation issue of elliptic curve newlinecryptography. Biometrics has been used for secure identification and authentication for newlinemore than two decades since biometric data is unique, non transferable, unforgettable, newlineand always with us. newlineWith fast evolution of mobile devices and mobile network, the need of protecting newlineuser sensitive information locally and performing secure user authentication remotely newlinebecome ever more increasing. Bio-cryptography is emerging as a powerful solution newlinewhich can combine the advantages of conventional cryptography and biometric security. newlineIn the first contribution, focus is given on key generation from user s biometric. newlineA private key is generatd from user s fingerprint minutiae. The minutiae points are newlineextracted from the fingerprint image based on image processing algorithms, then the extracted newlinefingerprint minutiae are used for generating |
Pagination: | 113p |
URI: | http://hdl.handle.net/10603/349840 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 118 kB | Adobe PDF | View/Open |
02_certificate.pdf | 67.68 kB | Adobe PDF | View/Open | |
03_declaration.pdf | 79.77 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 57.52 kB | Adobe PDF | View/Open | |
05_acknowledgement.pdf | 81.74 kB | Adobe PDF | View/Open | |
06_contents.pdf | 118.7 kB | Adobe PDF | View/Open | |
07_abbreviations.pdf | 50.15 kB | Adobe PDF | View/Open | |
08_list of figures.pdf | 90.15 kB | Adobe PDF | View/Open | |
09_list of tables.pdf | 72.52 kB | Adobe PDF | View/Open | |
10_list of algorithms.pdf | 49.4 kB | Adobe PDF | View/Open | |
11_chapter-1.pdf | 411.92 kB | Adobe PDF | View/Open | |
12_chapter-2.pdf | 372.49 kB | Adobe PDF | View/Open | |
13_chapter-3.pdf | 859.09 kB | Adobe PDF | View/Open | |
14_chapter-4.pdf | 664.05 kB | Adobe PDF | View/Open | |
15_chapter-5.pdf | 660.33 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 118.82 kB | Adobe PDF | View/Open | |
17_biblography.pdf | 122.45 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 234.46 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: