Abstract

Problem statement: In this research, we incorporate the polynomial interpolation method in the discrete logarithm problem based cryptosystem which is the elliptic curve cryptosystem. Approach: In this study, the polynomial interpolation method to be focused is the Lagrange polynomial interpolation which is the simplest polynomial interpolation method. This method will be incorporated in the encryption algorithm of the elliptic curve ElGamal cryptosystem. Results: The scheme modifies the elliptic curve ElGamal cryptosystem by adding few steps in the encryption algorithm. Two polynomials are constructed based on the encrypted points using Lagrange polynomial interpolation and encrypted for the second time using the proposed encryption method. We believe it is safe from the theoretical side as it still relies on the discrete logarithm problem of the elliptic curve. Conclusion/Recommendations: The modified scheme is expected to be more secure than the existing scheme as it offers double encryption techniques. On top of the existing encryption algorithm, we managed to encrypt one more time using the polynomial interpolation method. We also have provided detail examples based on the described algorithm.

Highlights

  • Whitfield Diffie and Martin Hellman had introduced the Diffie-Hellman key exchange scheme to the cryptography world which later planted the seeds for the development of public key cryptosystem (Diffie and Hellman, 1976)

  • We are going to turn our attention to elliptic curve cryptosystem which is the elliptic curve discrete logarithm based public key cryptosystem

  • elliptic curve cryptosystem (ECC) was based on discrete logarithm problem by using a group of points on an elliptic curve defined over finite field and its running times is fully exponential

Read more

Summary

Introduction

Whitfield Diffie and Martin Hellman had introduced the Diffie-Hellman key exchange scheme to the cryptography world which later planted the seeds for the development of public key cryptosystem (Diffie and Hellman, 1976). In this scheme, two keys namely public key and secret key are used where public key is made public for encryption steps whereas secret key is kept secretly for decryption steps and it is computationally infeasible. ECC was based on discrete logarithm problem by using a group of points on an elliptic curve defined over finite field and its running times is fully exponential.

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.