Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Tamil Data Communication Security Using Elliptic Curve Cryptography Key Algorithms


Affiliations
1 Dept.of Computer of Computer Science, Tamil University, Thanjavur, India
2 Dept.of Computer Science, Tamil University, India
3 Karpagam University, India
     

   Subscribe/Renew Journal


Tamil data, scripts, files needs to be preserved in computing. As there is a need for security in various computer networks fields, the paper mainly focus an algorithm in the field of secrecy , privacy, confidentiality of the documents in a computer system by the principle “ Cryptography “. Cryptography is defined as an art of security technique for computer networks. A computer user to preserve his documents, scripts needs to search for security oriented algorithms, packages, databases which arises an unfulfilled thirst. To quench the security thirst, a recent algorithm namely ‘Elliptic Curve Cryptography (ECC)’ is framed as it is an approach to public-key cryptography based on some algebraic structure of elliptic curves over finite fields. The creator keeps the knowledge of security key mechanisms such as private key, public keys. The keys which are generated best choose random-numbers that uses products of two large prime numbers as the key. Any user to preserve his documents picks two large random primes as his private key, and publishes the product as his public key. The public key based algorithm ‘Elliptic Curve Cryptography (ECC)’ is based on the creation of different keys that are difficult to solve without certain knowledge about how they were created. Elliptic curve cryptosystems is computationally efficient than the first generation public key systems such as RSA and Diffie-Hellman algorithms as the report says. As an added advantage the paper mainly focus on ECC based security algorithms for Tamil document privacy. The document related in Tamil words are analyzed commonly as a process which includes security mechanisms that emerges finally in the system as a preserved document.

Keywords

Elliptic Curve, Scripts, Co-Clustering, Algorithm, Security.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 330

PDF Views: 3




  • Tamil Data Communication Security Using Elliptic Curve Cryptography Key Algorithms

Abstract Views: 330  |  PDF Views: 3

Authors

K. Ravikumar
Dept.of Computer of Computer Science, Tamil University, Thanjavur, India
K. Lakshmi
Dept.of Computer Science, Tamil University, India
M. Karthikeyan
Karpagam University, India

Abstract


Tamil data, scripts, files needs to be preserved in computing. As there is a need for security in various computer networks fields, the paper mainly focus an algorithm in the field of secrecy , privacy, confidentiality of the documents in a computer system by the principle “ Cryptography “. Cryptography is defined as an art of security technique for computer networks. A computer user to preserve his documents, scripts needs to search for security oriented algorithms, packages, databases which arises an unfulfilled thirst. To quench the security thirst, a recent algorithm namely ‘Elliptic Curve Cryptography (ECC)’ is framed as it is an approach to public-key cryptography based on some algebraic structure of elliptic curves over finite fields. The creator keeps the knowledge of security key mechanisms such as private key, public keys. The keys which are generated best choose random-numbers that uses products of two large prime numbers as the key. Any user to preserve his documents picks two large random primes as his private key, and publishes the product as his public key. The public key based algorithm ‘Elliptic Curve Cryptography (ECC)’ is based on the creation of different keys that are difficult to solve without certain knowledge about how they were created. Elliptic curve cryptosystems is computationally efficient than the first generation public key systems such as RSA and Diffie-Hellman algorithms as the report says. As an added advantage the paper mainly focus on ECC based security algorithms for Tamil document privacy. The document related in Tamil words are analyzed commonly as a process which includes security mechanisms that emerges finally in the system as a preserved document.

Keywords


Elliptic Curve, Scripts, Co-Clustering, Algorithm, Security.