Title: Implementation of Menezes Vanstone elliptical curve cryptography algorithm using matrix mapping method

Authors: V. Kamalakannan; S. Tamilselvan

Addresses: Department of Electronics and Communication Engineering, Pondicherry Engineering College, Puducherry 605014, India ' Department of Electronics and Communication Engineering, Pondicherry Engineering College, Puducherry 605014, India

Abstract: This paper proposes an approach to encrypt data (message) using Menezes Vanstone encryption and decryption algorithm based on elliptic curve (EC). In traditional elliptic curve cryptography (ECC) algorithm, the generator point is published along with other domain parameters. The certificate authority (CA) shares the point between the source and destination. An intruder launching man-in-middle (MIM) attack could crack the public key, leading to a security breach in the network. This paper discusses techniques, which make use of a hidden generator point to overcome MIM attack in the Menezes Vanstone elliptical curve cryptosystem (MVECC). The hidden generator point from two different curves is added to get a common generator point. Mapping is then performed with American Standard Code for Information Interchange (ASCII) characters and double mapped using matrix mapping to enhance the encryption. The MVECC encryption and decryption is implemented on field programmable gate array (FPGA) which is written in Verilog Hardware Description Language (HDL). The synthesis results obtained shows that the minimum period is 92.713 ns and maximum frequency is 10.786 MHz for MVECC over GF (p) on Xilinx Virtex-5 (XC5VLX50T-1FF1136) FPGA Board.

Keywords: Menezes Vanstone elliptical curve cryptography; MVECC; Man-In-Middle; MIM; attack; field programmable gate array; FPGA; generator point; matrix mapping methodology.

DOI: 10.1504/IJKESDP.2016.084606

International Journal of Knowledge Engineering and Soft Data Paradigms, 2016 Vol.5 No.3/4, pp.302 - 315

Received: 31 May 2016
Accepted: 04 Jan 2017

Published online: 17 Jun 2017 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article