Title: Key generation based on elliptic curve over finite prime field

Authors: S. Maria Celestin Vigila; K. Muneeswaran

Addresses: Department of Information Technology, Noorul Islam College of Engineering, Kumaracoil 629180, Tamilnadu, India ' Department of Computer Science and Engineering, Mepco Schlenk Engineering College, Sivakasi 626005, Tamilnadu, India

Abstract: With the explosion of networks and the huge amount of data transmitted along, securing data content is becoming more and more important. Data encryption is widely used to ensure security in open networks, like the internet. This paper presents the implementation of stream cipher, where the key stream is generated based on the properties of linear feedback shift register (LFSR) and cyclic elliptic curve (EC) over a finite prime field. Here, the process of encryption/decryption of an image in spatial domain is illustrated and also key file parameters needed for generating the key stream to other parties are encrypted using elliptic curve cryptography (ECC). Only, the encrypted key file parameters are transmitted, not the entire full length key. Since ECC is replacing RSA for key exchange, EC-based stream cipher offers a good choice for encryption in real-time application. The strength of the proposed cipher lies in the generation of random sequence using LFSR over finite prime field and also the use of EC discrete logarithmic problem makes it more difficult to determine the key file parameters. This paper also discusses the security aspects of the proposed cipher which is secure against all kinds of attacks.

Keywords: elliptic curve cryptography; discrete logarithms; finite fields; stream ciphers; OTP; one time pad; key generation; data encryption; linear feedback shift register; LFSR; key exchange; electronic security.

DOI: 10.1504/IJESDF.2012.045391

International Journal of Electronic Security and Digital Forensics, 2012 Vol.4 No.1, pp.65 - 81

Received: 06 Sep 2011
Accepted: 31 Oct 2011

Published online: 19 Nov 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article