Enhancing Data Encryption using Elliptic Curve Cryptography (ECC) Algorithm in 4G Networks

Author(s):  
Abdu Ahmed Osman ◽  
2021 ◽  
Vol 11 (12) ◽  
pp. 5316
Author(s):  
Ghadah Aldabbagh ◽  
Daniyal M. Alghazzawi ◽  
Syed Hamid Hasan ◽  
Mohammed Alhaddad ◽  
Areej Malibari ◽  
...  

The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world. The cloud storage system consists of several defense issues since data security and privacy have become known as the foremost apprehension for the users. Uploading and storing specific data in the cloud is familiar and widespread, but securing the data is a complicated task. This paper proposes a cloud-based mobile learning system using a hybrid optimal elliptic curve cryptography (HOECC) algorithm comprising public and private keys for data encryption. The proposed approach utilizes an adaptive tunicate slime-mold (ATS) algorithm to generate optimal key value. Thus, the data uploaded in the cloud system are secured with high authentication, data integrity and confidentiality. The study investigation employed a survey consisting of 50 students and the questionnaire was sent to all fifty students. In addition to this, for obtaining secure data transmission in the cloud, various performance measures, namely the encryption time, decryption time and uploading/downloading time were evaluated. The results reveal that the time of both encryption and decryption is less in ATF approach when compared with other techniques.


2020 ◽  
Author(s):  
Rosheen Qazi ◽  
Imran A. Khan

Encryption helps in transmitting sensitive data over an insecure channel without any danger of data being lost or being manipulated by some unauthorized entity. Different Encryption schemes have been applied for Data security in a different environment. Many cryptosystems worked during different eras and evolved accordingly with time. This paper mainly focuses on asymmetric encryption which is also known as Public key encryption scheme or Holomorphic encryption. However, due to large key size asymmetric encryption is mostly used for Key exchange rather than data Encryption. Nowadays, Data security is the main issue in large data centers and Cloud computing. This paper uses Elliptic Curve Cryptography to encrypt data in the cloud environment because the size of the key used in Elliptic Curve Cryptography is very small. Due to the small key size of Elliptic Curve, computational power is reduced and this results into least energy consumption. This paper shows that elliptic curve cryptography is fast and more efficient for data protection in a cloud computing environment and reduces the computational power and also increases the efficiency.


2021 ◽  
Vol 12 (1) ◽  
pp. 74
Author(s):  
Mohammad Y. Alshahrani

Blockchain technology allows for the decentralized creation of a propagated record of digital events, in which third parties do not control information and associated transactions. This methodology was initially developed for value transmission. Still, it now has a broad array of utilization in various industries, including health, banking, the internet of things, and several others. With its numerous added benefits, a blockchain-based learning management system is a commonly utilized methodology at academic institutes, and more specifically during and after the COVID-19 period. It also presents several potentials for decentralized, interoperable record management in the academic system in education. Integrity, authenticity, and peer-executed smart contracts (SC) are some of the qualities of a blockchain that could introduce a new degree of safety, trustworthiness, and openness to e-learning. This research proposes a unique encryption technique for implementing a blockchain system in an e-learning (EL) environment to promote transparency in assessment procedures. Our methodology may automate evaluations and provide credentials. We built it to be analytical and content-neutral in order to demonstrate the advantages of a blockchain back-end to end-users, including student and faculty members particularly during this COVID-19 era. This article explains the employment of blockchain and SC in e-learning. To improve the trust in the assessment, we propose a novel improved elliptic curve cryptography algorithm (IECCA) for data encryption and decryption. The performance of the suggested method is examined by comparing it with various existing algorithms of encryption. The evaluation of the behaviour of the presented method demonstrates that the technique shall enhance trust in online educational systems, assessment processes, educational history, and credentials.


2020 ◽  
Vol 55 (3) ◽  
Author(s):  
Mayes M. Hoobi

Cryptography is the operation of transferring a specific message to prevent an attacker from accessing the contents of a message. To increase the level of security in any communication, both parties must have a copy of the encryption key. The Data Encryption Standard algorithm is insufficient due to its weak key generation, so that the key must be reconfigured to make this algorithm more secure, effective, and stronger. The key for encryption enhances securities of the Data Encryption Standard algorithm. This research assumed a combination of two efficient encryption algorithms to achieve the goal of information security by adding a new level of security to the Data Encryption Standard algorithm using the elliptic curve cryptography algorithm. This aim was met by adding two new key functions; the first one is EncK(), and the second one is DecK() for an encryption and decryption key of the Data Encryption Standard algorithm to make this algorithm more secure against attackers. The results obtained from this research also demonstrate good resistance against a brute-force attack, which makes the system more effective by applying the elliptic curve cryptography algorithm to encrypt and decrypt keys using the Data Encryption Standard. In addition, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message more difficult for an attacker to crack.


Author(s):  
Kazuki NAGANUMA ◽  
Takashi SUZUKI ◽  
Hiroyuki TSUJI ◽  
Tomoaki KIMURA

Author(s):  
Mohd Javed ◽  
Khaleel Ahmad ◽  
Ahmad Talha Siddiqui

WiMAX is the innovation and upgradation of 802.16 benchmarks given by IEEE. It has numerous remarkable qualities, for example, high information rate, the nature of the service, versatility, security and portability putting it heads and shoulder over the current advancements like broadband link, DSL and remote systems. Though like its competitors the concern for security remains mandatory. Since the remote medium is accessible to call, the assailants can undoubtedly get into the system, making the powerless against the client. Many modern confirmations and encryption methods have been installed into WiMAX; however, regardless it opens with up different dangers. In this paper, we proposed Elliptic curve Cryptography based on Cellular Automata (EC3A) for encryption and decryption the message for improving the WiMAX security


Sign in / Sign up

Export Citation Format

Share Document