Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification

Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification

Gautam Kumar (Jaypee University of Information Technology, Solan, India) and Hemraj Saini (Jaypee University of Information Technology, Solan, India)
Copyright: © 2018 |Pages: 16
DOI: 10.4018/IJISP.2018010102
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The scalar multiplication techniques used in Elliptic curve cryptography (ECC) are having the scope for gaining the computation efficiency. This is possible through the reduction of precomputed operations. Finding the more efficient technique compares to the most recent or efficient one is a research gap for all schemes. The manuscript presents an application oriented work for Telemedicine using ECC. It is based on robust application on reduced computational complexity. The methodology we apply for the same is Scalar Multiplication without precomputation on Radix-8. Introduced software and the hardware performance are reporting a big advantage over all the related proposed techniques. The reason to cover this problem is to provide a path on a fascinating area of ECC on a smaller key size be applicable for all applications on a same level of security strengths. The smaller length key gives the higher speed and shorter clock cycle to initiate the operation.
Article Preview

Introduction

The scenario for all applications concerns to performance and considerable security services in the real life. The security services are using with the concept of cryptography and it has been considered to be a discipline of computer science. The performances are achieving through the use of optimized algorithms. The used algorithms are running with the data security techniques. In general, all the developed algorithms have based on reduced costs of computation and communication cost. The associated researchers and/or cryptographers have shown their matured behaviors in the field of security. But, in preference to this, still the various requirements are motivational issues related to more enhanced performance and system security services. The applications of security are to protect information from secure message transmission, disclosure, and guaranteed authenticity of data (Jirasek, 2012).

The public key cryptography (PKC) was proposed in 1976 by (Diffie & Hellman, 1976). Afterword’s various PKC algorithms have been proposed, but in all of them Elliptic Curve Cryptography (ECC) has attracted the most attention. ECC algorithm has been considered to be secure on shorter key sizes. This level of security is also achieving by algorithms but they need a very higher length of the key sizes. The shorter length keys computes much faster and that also the best suits to low memory devices. For example, for the same level of security RSA uses 1024-bit key whereas ECC only uses 160 bit key sizes (Bos et al., 2009). We have considered and analyzed the algorithms for ECC on the core work of cryptography, which shows still the opportunities of improvements in the algorithms are possible in relations to the proposed algorithms.

The heart of cryptography is Discrete Logarithmic Problem (DLP), which plays a central role in information security on applied algorithms. The used algorithms are running with their own complexity that depends on the precomputed operations. Lower precomputed operations are putting a high mark on system performance. The faster running algorithms are leading with high-speed in the growing field of computation and communication (Jarvinen & Skytta, 2008).

DLP for ECC is working on a given two elliptic points P and Q on the curve, to find the value of k (generally secret key), such that , which acts like a core building blocks in PKC (Koblitz, 1987). It computes for the cryptographic function in the forward direction using repeated point additions (ADDs) and point doublings (DBLs) operations. It is known as scalar multiplication. But, the adversaries try to find the secret key on behalf of generated scalar multiplication, which has been considered negligible to revert back for ECC. ECC is attracting the most attention in appropriateness to the short-memory devices. Such devices may be smart cards, net banking, mobile banking and the various real-time applications for secure and efficient implementations.

An ECC is a hierarchy of consistent operations structured into different but interrelated levels. As depicted in Figure 1, the highest level i.e., level 0, ECC presents algorithms for scalar multiplication kP with ensuring to group operations such as ADDs and DBLs, and finally these operations depend on finite field arithmetic operations such as addition, subtraction, multiplication, inversion, and squaring. The respective precomputed operations realized by (Gebotys, 2010, pp. 75-109) for one point ADDs are 13,617 and for one point DBLs are 14,000 clock cycles.

Figure 1.

Hierarchy of ECC operations

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 12: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing