PhD in Cryptography using Elliptic Curves

PhD Paper writing in Machine Learning Research Topics
May 25, 2021
PhD Research Topics in 5G Networking
May 25, 2021

PhD in Cryptography using Elliptic Curves

Cryptography is the process that converts ordinary text into unintelligible text and vice versa. Elliptic curve cryptography (ECC) is a technique that is based on keys for data encryption. ECC is an encryption algorithm that can provide a strong security level using a relatively smaller key size when compared to the existing RSA (Ron rivest, Adi Shamir and Leonard Adleman) algorithms. In the existing ECCs, it is difficult to construct a united platform for on-board devices with processors of different instruction lengths. Therefore, to solve this problem, the proposed work suggests a dynamic scalable elliptic curve cryptosystem. 

PhD in Cryptography using Elliptic Curves

PhD in Cryptography using Elliptic Curves

A curve list with different security levels is generated and preserved for synchronising the curve in use. In the proposed system, new elliptic curves are constructed with the validated security level and scalable structure. Pseudo-Mersenne and Montgomery friendly primes are considered to enhance the performance of the base field arithmetic. The parameter assignment process is allocated to select the group with shared parameters that construct a secure curve. The user picks a random nonce and calculates the verification information. If an adversary tries to alter the message, then the user will reject the request and initializes the conversation with the default curve.

Problem Statement:

  • Embedded devices are equipped with simple microcontrollers that are relatively weak and insecure.
  • Selecting secure curves and key size is difficult
  • Unsafe curves raised the threat on known elliptic curves
  • Intensive analysis is required when a fixed curve is used
  • The design of a lightweight cryptographic platform for resource-constrained on-board devices is a challenge
  • Accidents may happen by false driving reaction caused by attacks on onboard devices
  • Attackers can launch an attack against the vulnerable devices and cause threats to the entire system

Proposed Solution:

  • Computation efficiency is increased by 30%
  • Power consumption is reduced
  • Suitable for on-board embedded devices
  • A unified cryptographic platform is more economic
  • Provides a solution to the security problems which targets the resource-constrained onboard devices.
  • Helps in the dynamic scalable selection of curves

PhD support to have a comprehensive end to end PhD Paper Writing Support for PhD in Cryptography using Elliptic Curves. The experts provide complete guidance for PhD in Cryptography using Elliptic Curves.

Contact Now
× How can I help you?