IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY

Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervene...

Full description

Bibliographic Details
Main Authors: Md Nizam Udin, Farah Azaliney Mohd Amin, Aminah Abdul Malek, Nur Annisa Zulkifili, Nur Atiqah Ghazali, Siti Aisyah Mohd Ridzuwan
Format: Article
Language:English
Published: UiTM Press 2021-05-01
Series:Malaysian Journal of Computing
Subjects:
_version_ 1797450939432435712
author Md Nizam Udin
Farah Azaliney Mohd Amin
Aminah Abdul Malek
Nur Annisa Zulkifili
Nur Atiqah Ghazali
Siti Aisyah Mohd Ridzuwan
author_facet Md Nizam Udin
Farah Azaliney Mohd Amin
Aminah Abdul Malek
Nur Annisa Zulkifili
Nur Atiqah Ghazali
Siti Aisyah Mohd Ridzuwan
author_sort Md Nizam Udin
collection DOAJ
description Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study.
first_indexed 2024-03-09T14:47:46Z
format Article
id doaj.art-cca26b18d7af4a98a367df13abc5c281
institution Directory Open Access Journal
issn 2600-8238
language English
last_indexed 2024-03-09T14:47:46Z
publishDate 2021-05-01
publisher UiTM Press
record_format Article
series Malaysian Journal of Computing
spelling doaj.art-cca26b18d7af4a98a367df13abc5c2812023-11-27T01:53:50ZengUiTM PressMalaysian Journal of Computing2600-82382021-05-0162812822https://doi.org/10.24191/mjoc.v6i2.11508IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHYMd Nizam Udin0Farah Azaliney Mohd Amin1Aminah Abdul Malek2Nur Annisa Zulkifili3Nur Atiqah Ghazali4Siti Aisyah Mohd Ridzuwan5Universiti Teknologi MARA Cawangan Negeri SembilanUniversiti Teknologi MARA Cawangan Negeri SembilanUniversiti Teknologi MARA Cawangan Negeri SembilanUniversiti Teknologi MARA Cawangan Negeri SembilanUniversiti Teknologi MARA Cawangan Negeri SembilanUniversiti Teknologi MARA Cawangan Negeri SembilanCryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study.asymmetric cryptographyblom’s key pre-distribution schemeelliptic curve cryptography
spellingShingle Md Nizam Udin
Farah Azaliney Mohd Amin
Aminah Abdul Malek
Nur Annisa Zulkifili
Nur Atiqah Ghazali
Siti Aisyah Mohd Ridzuwan
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
Malaysian Journal of Computing
asymmetric cryptography
blom’s key pre-distribution scheme
elliptic curve cryptography
title IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
title_full IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
title_fullStr IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
title_full_unstemmed IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
title_short IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
title_sort implementation of blom s key predistribution scheme by using elliptic curve cryptography
topic asymmetric cryptography
blom’s key pre-distribution scheme
elliptic curve cryptography
work_keys_str_mv AT mdnizamudin implementationofblomskeypredistributionschemebyusingellipticcurvecryptography
AT farahazalineymohdamin implementationofblomskeypredistributionschemebyusingellipticcurvecryptography
AT aminahabdulmalek implementationofblomskeypredistributionschemebyusingellipticcurvecryptography
AT nurannisazulkifili implementationofblomskeypredistributionschemebyusingellipticcurvecryptography
AT nuratiqahghazali implementationofblomskeypredistributionschemebyusingellipticcurvecryptography
AT sitiaisyahmohdridzuwan implementationofblomskeypredistributionschemebyusingellipticcurvecryptography