Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms
The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers due to its robust math...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Unviversity of Technology- Iraq
2014-01-01
|
Series: | Engineering and Technology Journal |
Subjects: | |
Online Access: | https://etj.uotechnology.edu.iq/article_102335_87f911252e04148f60a2506d118630bf.pdf |
_version_ | 1827358592804585472 |
---|---|
author | Hala Bahjat Abdul Wahab Suhad Malallah Kadhem Estabraq Abdul Redaa Kadhim |
author_facet | Hala Bahjat Abdul Wahab Suhad Malallah Kadhem Estabraq Abdul Redaa Kadhim |
author_sort | Hala Bahjat Abdul Wahab |
collection | DOAJ |
description | The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers due to its robust mathematical structure and highest security compared to other existing algorithms. This paper produces a new cryptographic key generation approach that investigate from metaheuristic algorithms (Greedy Randomized Adaptive Search Procedure (GRASP) and Variable Neighborhood Search(VNS)) in order generate symmetric mask key that consist of more the one EC points with minimum correlation among points. The proposed approach aims to combine between the features of elliptic curve arithmetic, Discrete Logarithm and metaheuristic algorithms (GRASP and VNS) to produce robust symmetric cryptography key (mask key). The proposed approach tested and gives efficient results when compared with other previous approach in term of secrecy and privacy . |
first_indexed | 2024-03-08T06:13:08Z |
format | Article |
id | doaj.art-245e247d7c39419fb85362b9d3e6d1b3 |
institution | Directory Open Access Journal |
issn | 1681-6900 2412-0758 |
language | English |
last_indexed | 2024-03-08T06:13:08Z |
publishDate | 2014-01-01 |
publisher | Unviversity of Technology- Iraq |
record_format | Article |
series | Engineering and Technology Journal |
spelling | doaj.art-245e247d7c39419fb85362b9d3e6d1b32024-02-04T17:30:01ZengUnviversity of Technology- IraqEngineering and Technology Journal1681-69002412-07582014-01-01322B33334610.30684/etj.32.2B.15102335Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic AlgorithmsHala Bahjat Abdul WahabSuhad Malallah KadhemEstabraq Abdul Redaa KadhimThe key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers due to its robust mathematical structure and highest security compared to other existing algorithms. This paper produces a new cryptographic key generation approach that investigate from metaheuristic algorithms (Greedy Randomized Adaptive Search Procedure (GRASP) and Variable Neighborhood Search(VNS)) in order generate symmetric mask key that consist of more the one EC points with minimum correlation among points. The proposed approach aims to combine between the features of elliptic curve arithmetic, Discrete Logarithm and metaheuristic algorithms (GRASP and VNS) to produce robust symmetric cryptography key (mask key). The proposed approach tested and gives efficient results when compared with other previous approach in term of secrecy and privacy .https://etj.uotechnology.edu.iq/article_102335_87f911252e04148f60a2506d118630bf.pdfelliptic curvekey exchangecryptography protocolsmet heuristic algorithms |
spellingShingle | Hala Bahjat Abdul Wahab Suhad Malallah Kadhem Estabraq Abdul Redaa Kadhim Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms Engineering and Technology Journal elliptic curve key exchange cryptography protocols met heuristic algorithms |
title | Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms |
title_full | Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms |
title_fullStr | Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms |
title_full_unstemmed | Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms |
title_short | Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms |
title_sort | proposed approach for key generation based on elliptic curve ec algebra and metaheuristic algorithms |
topic | elliptic curve key exchange cryptography protocols met heuristic algorithms |
url | https://etj.uotechnology.edu.iq/article_102335_87f911252e04148f60a2506d118630bf.pdf |
work_keys_str_mv | AT halabahjatabdulwahab proposedapproachforkeygenerationbasedonellipticcurveecalgebraandmetaheuristicalgorithms AT suhadmalallahkadhem proposedapproachforkeygenerationbasedonellipticcurveecalgebraandmetaheuristicalgorithms AT estabraqabdulredaakadhim proposedapproachforkeygenerationbasedonellipticcurveecalgebraandmetaheuristicalgorithms |