Abstract
Sustaining privacy and securing the various data sources using lightweight cryptosystem is becoming essential in this digital world. Any sensitive information or resource container in the web that are exposed in the form of url must be preserved using suitable cryptographic techniques. One of the technique that belong to public key cryptography and truly identified for providing security towards digitial resource is Elliptical Curve Cryptography (ECC). ECC is one of the small key sized and fast computation cryptographic model that consumes less power, memory and bandwidth to ensure equivalent security than already existing one. Digital world engaged in on-line data security is the most pressing issues to transaction, have to trust the data disclosure in storage, ensure modification immunity in transit and assures identity among the communicating parties. Hence, the CIA packed computing paradigm that impact towards confidentiality, integrity and authentication is an urgent need. The first one and most important security traits is the confidentiality. This can be achieved by encryption operation. In ECC, encryption and decryption operation is carried using Elliptical curve arithmetic mechanism. This mechanism is based on point multiplication that is performed using repeated point addition and point doubling. The proposed alternative efficient method for point multiplication is binary form or NAF (Non-Adjacent Form). The computation performance with NAF preprocessed and on-the-fly approach ensures optimisation than the binary form of scalar multiplication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Karthikeyan, E.: Survey of elliptic curve scalar multiplication algorithms. Int. J. Adv. Netw. Appl. 4, 1581–1590 (2012)
Balasubramaniam, P., Karthikeyan, E.: Elliptic curve scalar multiplication algorithm using complementary recoding. Int. J. Comput. Appl. 20, 37 (2011)
Geetha, G., Jain, P.: Implementation of matrix based mapping method using elliptic curve cryptography. Int. J. Comput. Appl. Technol. Res. 3, 312–317 (2015)
Brar, H., Kaur, R.: Design and implementation of block method for computing NAF. Int. J. Comput. Appl. 20, 37–41 (2011)
Booth, A.D.: A signed binary multiplication technique. J. Appl. Math. 4(4), 236–240 (1951)
Sawlikar, A.: Point multiplication methods for elliptic curve cryptography. Int. J. Eng. Innov. Technol. 1, 1–4 (2012)
Malik, M.Y.: Efficient implementation of elliptic curve cryptography using low-power digital signal processor. ICACT 2, 1464–1468 (2010)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 4, 203–209 (1987)
Priyadharshini, M., Suganya, I., Saravanan, N.: A security gateway for message exchange in services by streaming and validation. Int. J. Innov. Res. Comput. Commun. Eng. 1(3), 604–612 (2013)
Moosavi, S.R., Nigussie, E., Virtanen, S., Isoaho, J.: An elliptic curve-based mutual authentication scheme for RFID implant systems. Procedia Comput. Sci. 32, 198–206 (2014)
Muthukuru, J., Sathyanarayana, B.: Implementation of elliptic curve digital signature algorithm using variable text based message encryption. Int. J. Comput. Eng. Res. 2(5), 1263–1271 (2012)
Chou, D.C., Yurov, K.: Security development in web services environment. Comput. Stand. Interfaces 27(3), 233–240 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Menaka, R., Wahida Banu, R.S.D. (2020). A Non-Adjacent Form (NAF) Based ECC for Scalar Multiplication that Assure Computation Reduction on Outsourcing. In: Pandian, A.P., Senjyu, T., Islam, S.M.S., Wang, H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_38
Download citation
DOI: https://doi.org/10.1007/978-3-030-24643-3_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24642-6
Online ISBN: 978-3-030-24643-3
eBook Packages: EngineeringEngineering (R0)