How to construct random functions
Journal of the ACM (JACM)
Analysis and design of stream ciphers
Analysis and design of stream ciphers
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A pseudo-random bit generator based on elliptic logarithms
Proceedings on Advances in cryptology---CRYPTO '86
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
On the (non)Universality of the One-Time Pad
FOCS '02 Proceedings of the 43rd Symposium on Foundations of Computer Science
Elliptic Curve Pseudorandom Sequence Generators
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
New stream ciphers based on elliptic curve point multiplication
Computer Communications
On the security and composability of the one time pad
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
Hi-index | 0.00 |
With the explosion of networks and the huge amount of data transmitted along, securing data content is becoming more and more important. Data encryption is widely used to ensure security in open networks, like the internet. This paper presents the implementation of stream cipher, where the key stream is generated based on the properties of linear feedback shift register (LFSR) and cyclic elliptic curve (EC) over a finite prime field. Here, the process of encryption/decryption of an image in spatial domain is illustrated and also key file parameters needed for generating the key stream to other parties are encrypted using elliptic curve cryptography (ECC). Only, the encrypted key file parameters are transmitted, not the entire full length key. Since ECC is replacing RSA for key exchange, EC-based stream cipher offers a good choice for encryption in real-time application. The strength of the proposed cipher lies in the generation of random sequence using LFSR over finite prime field and also the use of EC discrete logarithmic problem makes it more difficult to determine the key file parameters. This paper also discusses the security aspects of the proposed cipher which is secure against all kinds of attacks.