Abstract

Due to enormous growth of devices and its interconnected communication, there are lot of possibilities for attacks and vulnerabilities in the network. From recent studies, we come to know about various security related techniques and their usage. A lot of cryptographic algorithms are used efficiently and effectively in plenty of applications. Thus it is notable to classify the attacks as two types Active and Passive Attack. Unauthorized access to the information implies passive attack. For example, in the communication channel doing operations like intercepting and eavesdropping are considered as passive attack. If the attacker tries to access the information and modify the information in an unauthorized manner, then it is considered as active attack. Man in the Middle attack is the best example of active attack. Here the attacker sends its public key as the hosts public and tries to hack the message. To overcome the issues in tradional authentication model, we proposed an Advanced Elliptical Curve Cryptographic (AECC) Algorithm which uses a code bit with a random function in both the sender and receiver side for encoding and decoding functions. This code bit is used to identify whether the public key belongs to attacker or the sender. By identifying the sender, the receiver can communicate with it without any restrictions. The results analysis section shows that our proposed AECC algorithm enhances security for user defined input messages like text, image, video and also for binary data.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.