





Tamil Data Communication Security Using Elliptic Curve Cryptography Key Algorithms
Subscribe/Renew Journal
Tamil data, scripts, files needs to be preserved in computing. As there is a need for security in various computer networks fields, the paper mainly focus an algorithm in the field of secrecy , privacy, confidentiality of the documents in a computer system by the principle “ Cryptography “. Cryptography is defined as an art of security technique for computer networks. A computer user to preserve his documents, scripts needs to search for security oriented algorithms, packages, databases which arises an unfulfilled thirst. To quench the security thirst, a recent algorithm namely ‘Elliptic Curve Cryptography (ECC)’ is framed as it is an approach to public-key cryptography based on some algebraic structure of elliptic curves over finite fields. The creator keeps the knowledge of security key mechanisms such as private key, public keys. The keys which are generated best choose random-numbers that uses products of two large prime numbers as the key. Any user to preserve his documents picks two large random primes as his private key, and publishes the product as his public key. The public key based algorithm ‘Elliptic Curve Cryptography (ECC)’ is based on the creation of different keys that are difficult to solve without certain knowledge about how they were created. Elliptic curve cryptosystems is computationally efficient than the first generation public key systems such as RSA and Diffie-Hellman algorithms as the report says. As an added advantage the paper mainly focus on ECC based security algorithms for Tamil document privacy. The document related in Tamil words are analyzed commonly as a process which includes security mechanisms that emerges finally in the system as a preserved document.
Keywords
Elliptic Curve, Scripts, Co-Clustering, Algorithm, Security.
User
Subscription
Login to verify subscription
Font Size
Information

Abstract Views: 331

PDF Views: 3