Security Enhancement in Elliptic Key Cryptography Using Character Based Method
Arun Kumar Gandhi1, S. S.Tyagi2
1Arun Kumar Gandhi is a M.Tech student in computer science and engineering in Manav Rachna International University, Faridabad, India
2Dr. S. S. Tyagi is a professor in department of computer science and engineering in Manav Rachna International University, Faridabad, India.
Manuscript received on June 15, 2011. | Revised Manuscript received on June 25, 2011. | Manuscript published on July 05, 2011. | PP: 37-41 | Volume-1 Issue-3, July 2011. | Retrieval Number: C049051311
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: It is widely recognized that data security will play a central role in the design of future IT system. Elliptic key cryptography recently gained lot of attention in industries when we talk about security. This paper discusses the basic operation how ECC is more secure than other public key cryptosystems and also how security can be enhanced in ECC by using character-based-method.
Keywords: Elliptic Key Cryptography, Security.