Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Elliptical curve cryptography (ECC)
Post: #1

ECC is a public key encryption technique based on elliptic curve theory. ECC can be used to create faster, smaller and more efficient cryptographic keys. It generates keys through the properties of the elliptic curve equation rather than the traditional method of generation, as the product of very large prime numbers. This technology can be used in conjunction with most of the public key encryption methods such as RSA and Diffie-Hellman.


ECC can yield a level of security with a 164-bit key compared with other systems that require a 1,024-bit key. Since ECC provides an equivalent security at a lower computing power and battery resource usage, it is widely used for mobile applications. ECC was developed by Certicom, a mobile e-business security provider and was recently licensed by Hifn, a manufacturer of integrated circuitry and network security products. Many manufacturers, including 3COM, Cylink, Motorola, Pitney Bowes, Siemens, TRW and VeriFone have incorporated support for ECC in their products .
Post: #2
Elliptical Curve Cryptography
Abstract
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. The technology can be used in conjunction with most public key encryption methods, such as RSA, and Diffie-Hellman. ECC can yield a level of security with a 164-bit key that other systems require a 1,024-bit key to achieve. Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is becoming widely used for mobile applications. ECC was developed by Certicom, a mobile e-business security provider, and was recently licensed by Hifn, a manufacturer of integrated circuitry and network security products. Many manufacturers, including 3COM, Cylink, Motorola, Pitney Bowes, Siemens, TRW, and VeriFone have included support for ECC in their products.
Post: #3
[attachment=5941]
Cryptography

CONTENTS


Secrecy
Ciphers
Secret Key Cryptography
Key Exchange
Public Key Cryptography
Digital Signatures
Internet applications

Secrecy


Scenario: Alice wants to send a message (plaintext p) to Bob. The communication channel is insecure and can be eavesdropped by Trudy. If Alice and Bob have previously agreed on an encryption scheme (cipher), the message can be sent encrypted (ciphertext c)

Issues:
What is a good cipher?
What is the complexity of encrypting/decrypting?
What is the size of the ciphertext, relative to the plaintext?
If Alice and Bob have never interacted before, how can they agree on a cipher?

Traditional Cryptography

Ciphers were already studied in ancient times
Caesar’s cipher:
replace a with d
replace b with e
...
replace z with c
A more general monoalphabetic substitution cipher maps each letter to some other letter.
Post: #4
PRESENTED BY,
Ayesha Farhin

[attachment=10592]
Cryptography considered as a branch of both mathematics and computer science.
Affiliated closely with information theory, computer security, and engineering.
Definitions:
 Cryptography comes from the Greek words Kryptos, meaning hidden, and Graphen, meaning to write.
 Thus Cryptography is the study of secret (crypto-) writing (-graphy)
 Cryptography deals with all aspects of secure messaging, authentication, digital signatures, electronic money, and other applications.
 The practitioner of Cryptography is called Cryptographer
Cryptography Through History
 Cryptography has a history of at least 4000 years.
 Ancient Egyptians enciphered some of their hieroglyphic writing on monuments.
 Ancient Hebrews enciphered certain words in the scriptures.
 2000 years ago Julius Caesar used a simple substitution cipher, now known as the Caesar cipher.
 Roger Bacon in the middle ages described several methods in 1200s.
 Geoffrey Chaucer included several ciphers in his works (e.g. Canterbury Tales).
 Leon Alberti devised a cipher wheel, and described the principles of frequency analysis in the 1460s.
 Blaise de Vigenère published a book on cryptology in 1585, & described the polyalphabetic substitution cipher.
 Increasing use, especially in diplomacy & war over centuries.
Areas of Study
Computer Security:
Cryptanalysis, Cryptology, Cryptography
Terminologies:
Encryption
Decryption
Plaintext
Cipher Text
Cryptanalaysis
 The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key is called Cryptanalysis.
 Also called “code breaking” sometimes.
 Practitioners of cryptanalysis are cryptanalysts.
Cryptology
 Cryptology is the branch of mathematics that studies the mathematical foundations of cryptographic methods.
 Cryptology is actually the study of codes and ciphers.
 Cryptology = both cryptography and cryptanalysis
Definitions:
 In cryptographic terminology, the message is called plaintext or cleartext.
 Encoding the contents of the message in such a way that hides its contents from outsiders is called encryption.
 A method of encryption and decryption is called a cipher - The name cipher originates from the Hebrew word "Saphar," meaning "to number.”
 The encrypted message is called the ciphertext.
 The process of retrieving the plaintext from the ciphertext is called decryption.
 Encryption and decryption usually make use of a key, and the coding method is such that decryption can be performed only by knowing the proper key.
The Key
 All modern algorithms use a key to control encryption and decryption; a message can be decrypted only if the key matches the encryption key.
 The key used for decryption can be different from the encryption key, but for most algorithms they are the same.
 

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  QUANTUM CRYPTOGRAPHY- MAKING CODE UNBREAKABLE seminar class 2 1,668 11-07-2013 02:07 PM
Last Post: computer topic
  Palladium Cryptography (Download Seminar Report) Computer Science Clay 18 14,356 31-12-2012 02:33 PM
Last Post: seminar details
  Java Cryptography Architecture (JCA) seminar projects crazy 1 1,792 17-12-2012 01:51 PM
Last Post: seminar details
Lightbulb Java Cryptography Architecture (JCA) computer science crazy 1 1,833 17-12-2012 01:51 PM
Last Post: seminar details
  Public Key Cryptography and the RSA algorithm seminar class 1 1,725 23-11-2012 11:32 AM
Last Post: seminar details
  IMBRICATE CRYPTOGRAPHY Electrical Fan 3 3,327 18-10-2012 12:34 PM
Last Post: seminar details
Thumbs Up IMBRICATE CRYPTOGRAPHY Computer Science Clay 4 2,908 18-10-2012 12:33 PM
Last Post: seminar details
  VISUAL CRYPTOGRAPHY project topics 9 10,556 01-03-2012 11:36 AM
Last Post: seminar paper
  Quantum Cryptography computer science crazy 5 5,188 19-01-2012 11:05 AM
Last Post: seminar addict
  cryptography full report computer science technology 14 7,921 19-01-2012 11:04 AM
Last Post: seminar addict