Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/349840
Title: Performance and Security Issues of Elliptic Curve Cryptography
Researcher: Pagar Yogita Subhashrao
Guide(s): Chowdhary Girish V.
Keywords: Computer Science
Computer Science Theory and Methods
Engineering and Technology
University: Swami Ramanand Teerth Marathwada University
Completed Date: 2020
Abstract: The current era has seen an explosive growth in communications. Applications like newlineonline banking, personal digital assistants, mobile communication, smartcards, etc. newlinehave emphasized the need for security in resource constrained environments. newlineElliptic curve cryptography (ECC) serves as a perfect cryptographic tool because newlineof its short key sizes and high security comparable to that of other standard public key newlinealgorithms. ECC is a key based technique for encrypting data. ECC focuses on pairs newlineof public and private keys for encryption and decryption of messages. newlineECC schemes are based on the scalar multiplication of elliptic curve points and newlinethe computational intractability of the inverse operation, the Elliptic Curve Discrete newlineLogarithm Problem (ECDLP). A survey on existing ECC solutions was conducted with newlinea thorough analysis of the challenges in developing ECC based systems. The challenges newlineidentified in the survey are domain parameter selection, scalar multiplication, point newlinemultiplication, elliptic curve selection, elliptic curve generation, key generation, key newlinesize selection, security measurements, applications etc. newlineThe objective of this thesis is to focus on key generation issue of elliptic curve newlinecryptography. Biometrics has been used for secure identification and authentication for newlinemore than two decades since biometric data is unique, non transferable, unforgettable, newlineand always with us. newlineWith fast evolution of mobile devices and mobile network, the need of protecting newlineuser sensitive information locally and performing secure user authentication remotely newlinebecome ever more increasing. Bio-cryptography is emerging as a powerful solution newlinewhich can combine the advantages of conventional cryptography and biometric security. newlineIn the first contribution, focus is given on key generation from user s biometric. newlineA private key is generatd from user s fingerprint minutiae. The minutiae points are newlineextracted from the fingerprint image based on image processing algorithms, then the extracted newlinefingerprint minutiae are used for generating
Pagination: 113p
URI: http://hdl.handle.net/10603/349840
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File118 kBAdobe PDFView/Open
02_certificate.pdf67.68 kBAdobe PDFView/Open
03_declaration.pdf79.77 kBAdobe PDFView/Open
04_abstract.pdf57.52 kBAdobe PDFView/Open
05_acknowledgement.pdf81.74 kBAdobe PDFView/Open
06_contents.pdf118.7 kBAdobe PDFView/Open
07_abbreviations.pdf50.15 kBAdobe PDFView/Open
08_list of figures.pdf90.15 kBAdobe PDFView/Open
09_list of tables.pdf72.52 kBAdobe PDFView/Open
10_list of algorithms.pdf49.4 kBAdobe PDFView/Open
11_chapter-1.pdf411.92 kBAdobe PDFView/Open
12_chapter-2.pdf372.49 kBAdobe PDFView/Open
13_chapter-3.pdf859.09 kBAdobe PDFView/Open
14_chapter-4.pdf664.05 kBAdobe PDFView/Open
15_chapter-5.pdf660.33 kBAdobe PDFView/Open
16_conclusion.pdf118.82 kBAdobe PDFView/Open
17_biblography.pdf122.45 kBAdobe PDFView/Open
80_recommendation.pdf234.46 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: