Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms

The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers due to its robust math...

Full description

Bibliographic Details
Main Authors: Hala Bahjat Abdul Wahab, Suhad Malallah Kadhem, Estabraq Abdul Redaa Kadhim
Format: Article
Language:English
Published: Unviversity of Technology- Iraq 2014-01-01
Series:Engineering and Technology Journal
Subjects:
Online Access:https://etj.uotechnology.edu.iq/article_102335_87f911252e04148f60a2506d118630bf.pdf
_version_ 1827358592804585472
author Hala Bahjat Abdul Wahab
Suhad Malallah Kadhem
Estabraq Abdul Redaa Kadhim
author_facet Hala Bahjat Abdul Wahab
Suhad Malallah Kadhem
Estabraq Abdul Redaa Kadhim
author_sort Hala Bahjat Abdul Wahab
collection DOAJ
description The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers due to its robust mathematical structure and highest security compared to other existing algorithms. This paper produces a new cryptographic key generation approach that investigate from metaheuristic algorithms (Greedy Randomized Adaptive Search Procedure (GRASP) and Variable Neighborhood Search(VNS)) in order generate symmetric mask key that consist of more the one EC points with minimum correlation among points. The proposed approach aims to combine between the features of elliptic curve arithmetic, Discrete Logarithm and metaheuristic algorithms (GRASP and VNS) to produce robust symmetric cryptography key (mask key). The proposed approach tested and gives efficient results when compared with other previous approach in term of secrecy and privacy .
first_indexed 2024-03-08T06:13:08Z
format Article
id doaj.art-245e247d7c39419fb85362b9d3e6d1b3
institution Directory Open Access Journal
issn 1681-6900
2412-0758
language English
last_indexed 2024-03-08T06:13:08Z
publishDate 2014-01-01
publisher Unviversity of Technology- Iraq
record_format Article
series Engineering and Technology Journal
spelling doaj.art-245e247d7c39419fb85362b9d3e6d1b32024-02-04T17:30:01ZengUnviversity of Technology- IraqEngineering and Technology Journal1681-69002412-07582014-01-01322B33334610.30684/etj.32.2B.15102335Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic AlgorithmsHala Bahjat Abdul WahabSuhad Malallah KadhemEstabraq Abdul Redaa KadhimThe key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers due to its robust mathematical structure and highest security compared to other existing algorithms. This paper produces a new cryptographic key generation approach that investigate from metaheuristic algorithms (Greedy Randomized Adaptive Search Procedure (GRASP) and Variable Neighborhood Search(VNS)) in order generate symmetric mask key that consist of more the one EC points with minimum correlation among points. The proposed approach aims to combine between the features of elliptic curve arithmetic, Discrete Logarithm and metaheuristic algorithms (GRASP and VNS) to produce robust symmetric cryptography key (mask key). The proposed approach tested and gives efficient results when compared with other previous approach in term of secrecy and privacy .https://etj.uotechnology.edu.iq/article_102335_87f911252e04148f60a2506d118630bf.pdfelliptic curvekey exchangecryptography protocolsmet heuristic algorithms
spellingShingle Hala Bahjat Abdul Wahab
Suhad Malallah Kadhem
Estabraq Abdul Redaa Kadhim
Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms
Engineering and Technology Journal
elliptic curve
key exchange
cryptography protocols
met heuristic algorithms
title Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms
title_full Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms
title_fullStr Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms
title_full_unstemmed Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms
title_short Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms
title_sort proposed approach for key generation based on elliptic curve ec algebra and metaheuristic algorithms
topic elliptic curve
key exchange
cryptography protocols
met heuristic algorithms
url https://etj.uotechnology.edu.iq/article_102335_87f911252e04148f60a2506d118630bf.pdf
work_keys_str_mv AT halabahjatabdulwahab proposedapproachforkeygenerationbasedonellipticcurveecalgebraandmetaheuristicalgorithms
AT suhadmalallahkadhem proposedapproachforkeygenerationbasedonellipticcurveecalgebraandmetaheuristicalgorithms
AT estabraqabdulredaakadhim proposedapproachforkeygenerationbasedonellipticcurveecalgebraandmetaheuristicalgorithms