The comparison of several cryptosystems using the elliptic curve: a report

Mai Manh Trung, Le Phe Do, Do Trung Tuan, Thu Thuy Trieu, Nguyen Van Tanh, Ngo Quang Tri, Bui Van Cong

Abstract


The elliptic curve cryptosystem (ECC) has several applications in Information Security, especially in cryptography with two main activities including encrypting and decrypting. There were several solutions of different research teams which propose various forms of the elliptic curve cryptosystem on cryptographic sector. In the paper, we proposed a solution for applying the elliptic curve on cryptography which is based on these proposals as well as basic idea about the elliptic curve cryptosystem. We also make comparison between our proposal and other listed solution in the same application of the elliptic curve for designing encryption and decryption algorithms. The comparison results are based on parameters such as time consumption (t), RAM consumption (MB), source code size (Bytes), and computational complexity.

Keywords


Affine cryptography; Data security; Symmetric key; The cryptosystem; The elliptic curve; Vigenère cryptography; Generating point

Full Text:

PDF


DOI: http://doi.org/10.11591/ijece.v14i5.pp5319-5329

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

International Journal of Electrical and Computer Engineering (IJECE)
p-ISSN 2088-8708, e-ISSN 2722-2578

This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).