Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Multi-Party Electronic Payment System Using ECCMA Algorithm


Affiliations
1 Dept. of Computer Science, Karpagam University, Coimbatore, India
2 Dept. of Computer Science, Tamil University, Thanjavur-613010, Tamil Nadu, India
     

   Subscribe/Renew Journal


Security in digital communications nowadays depends on cryptography. Multiparty Key Access depends on algorithms for generating asymmetric keys. The present algorithmic rule in use is MKA that uses mathematical properties of prime numbers and therefore the quality of resolving giant numbers to come up with secure asymmetric keys. A more modern algorithmic rule that might be used is Elliptic Curve Cryptography (ECC). Elliptic Curves have mathematical properties in which specified uneven keys is generated which is stronger than those created by Existing strategies. To investigate the utilization of ECC for MKA, a basic ECC generator is used and it will generate live keys and coding durations. The comparative key strength of ECC and Existing strategies is taken into thought; ECC is orders of magnitude quicker than Existing strategies for a similar security. The problems preventing the adoption of ECC using MKA in Cryptography area for raising security unit mentioned. The properties rights of ECC are utilized in MKA, the biggest obstacle to ECC adoption are substitution the present MKA infrastructure that uses Existing strategies. It is expected that ECC in MKA can become customary by 2020.

Keywords

Cryptography, Decryption, Encryption, Elliptic Curve, Multi-Party.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 317

PDF Views: 3




  • Multi-Party Electronic Payment System Using ECCMA Algorithm

Abstract Views: 317  |  PDF Views: 3

Authors

A. Udhayakumar
Dept. of Computer Science, Karpagam University, Coimbatore, India
K. Ravikumar
Dept. of Computer Science, Tamil University, Thanjavur-613010, Tamil Nadu, India

Abstract


Security in digital communications nowadays depends on cryptography. Multiparty Key Access depends on algorithms for generating asymmetric keys. The present algorithmic rule in use is MKA that uses mathematical properties of prime numbers and therefore the quality of resolving giant numbers to come up with secure asymmetric keys. A more modern algorithmic rule that might be used is Elliptic Curve Cryptography (ECC). Elliptic Curves have mathematical properties in which specified uneven keys is generated which is stronger than those created by Existing strategies. To investigate the utilization of ECC for MKA, a basic ECC generator is used and it will generate live keys and coding durations. The comparative key strength of ECC and Existing strategies is taken into thought; ECC is orders of magnitude quicker than Existing strategies for a similar security. The problems preventing the adoption of ECC using MKA in Cryptography area for raising security unit mentioned. The properties rights of ECC are utilized in MKA, the biggest obstacle to ECC adoption are substitution the present MKA infrastructure that uses Existing strategies. It is expected that ECC in MKA can become customary by 2020.

Keywords


Cryptography, Decryption, Encryption, Elliptic Curve, Multi-Party.