menu
{ "item_title" : "Implementation of Elliptic curve cryptosystem", "item_author" : [" Jhajharia Smita "], "item_description" : "Cryptographic systems are divided into two kinds. One is symmetric and other is asymmetric. In symmetric we require only a single key to encrypt and decrypt the data while asymmetric or public key cryptography requires two separate keys-one to lock and other one to unlock the text. In this project a public key crypto-scheme has been studied and implemented. The project is aimed to implement the methods for solving Elliptic curve Discrete Logarithm Problem (ECDLP) on which the elliptic curve schemes are based. For this, Pollard's Rho method has been chosen for implemen- tation. This way, cryptanalysis of a public key elliptic curve algorithm can be performed. The project also explains what Elliptic Curve Discrete Log- arithm Problem is and implements the Diffie Hellman algorithm based on ECDLP. Thus, this project implements cryptographic algorithm as well as cryptanalytic method.", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/3/65/975/083/3659750832_b.jpg", "price_data" : { "retail_price" : "59.29", "online_price" : "59.29", "our_price" : "59.29", "club_price" : "59.29", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Implementation of Elliptic curve cryptosystem|Jhajharia Smita

Implementation of Elliptic curve cryptosystem

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Cryptographic systems are divided into two kinds. One is symmetric and other is asymmetric. In symmetric we require only a single key to encrypt and decrypt the data while asymmetric or public key cryptography requires two separate keys-one to lock and other one to unlock the text. In this project a public key crypto-scheme has been studied and implemented. The project is aimed to implement the methods for solving Elliptic curve Discrete Logarithm Problem (ECDLP) on which the elliptic curve schemes are based. For this, Pollard's Rho method has been chosen for implemen- tation. This way, cryptanalysis of a public key elliptic curve algorithm can be performed. The project also explains what Elliptic Curve Discrete Log- arithm Problem is and implements the Diffie Hellman algorithm based on ECDLP. Thus, this project implements cryptographic algorithm as well as cryptanalytic method.

This item is Non-Returnable

Details

  • ISBN-13: 9783659750830
  • ISBN-10: 3659750832
  • Publisher: LAP Lambert Academic Publishing
  • Publish Date: July 2015
  • Dimensions: 9 x 6 x 0.28 inches
  • Shipping Weight: 0.4 pounds
  • Page Count: 116

Related Categories

You May Also Like...

    1

BAM Customer Reviews