IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervene...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
UiTM Press
2021-05-01
|
Series: | Malaysian Journal of Computing |
Subjects: |
_version_ | 1797450939432435712 |
---|---|
author | Md Nizam Udin Farah Azaliney Mohd Amin Aminah Abdul Malek Nur Annisa Zulkifili Nur Atiqah Ghazali Siti Aisyah Mohd Ridzuwan |
author_facet | Md Nizam Udin Farah Azaliney Mohd Amin Aminah Abdul Malek Nur Annisa Zulkifili Nur Atiqah Ghazali Siti Aisyah Mohd Ridzuwan |
author_sort | Md Nizam Udin |
collection | DOAJ |
description | Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study. |
first_indexed | 2024-03-09T14:47:46Z |
format | Article |
id | doaj.art-cca26b18d7af4a98a367df13abc5c281 |
institution | Directory Open Access Journal |
issn | 2600-8238 |
language | English |
last_indexed | 2024-03-09T14:47:46Z |
publishDate | 2021-05-01 |
publisher | UiTM Press |
record_format | Article |
series | Malaysian Journal of Computing |
spelling | doaj.art-cca26b18d7af4a98a367df13abc5c2812023-11-27T01:53:50ZengUiTM PressMalaysian Journal of Computing2600-82382021-05-0162812822https://doi.org/10.24191/mjoc.v6i2.11508IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHYMd Nizam Udin0Farah Azaliney Mohd Amin1Aminah Abdul Malek2Nur Annisa Zulkifili3Nur Atiqah Ghazali4Siti Aisyah Mohd Ridzuwan5Universiti Teknologi MARA Cawangan Negeri SembilanUniversiti Teknologi MARA Cawangan Negeri SembilanUniversiti Teknologi MARA Cawangan Negeri SembilanUniversiti Teknologi MARA Cawangan Negeri SembilanUniversiti Teknologi MARA Cawangan Negeri SembilanUniversiti Teknologi MARA Cawangan Negeri SembilanCryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study.asymmetric cryptographyblom’s key pre-distribution schemeelliptic curve cryptography |
spellingShingle | Md Nizam Udin Farah Azaliney Mohd Amin Aminah Abdul Malek Nur Annisa Zulkifili Nur Atiqah Ghazali Siti Aisyah Mohd Ridzuwan IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY Malaysian Journal of Computing asymmetric cryptography blom’s key pre-distribution scheme elliptic curve cryptography |
title | IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY |
title_full | IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY |
title_fullStr | IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY |
title_full_unstemmed | IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY |
title_short | IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY |
title_sort | implementation of blom s key predistribution scheme by using elliptic curve cryptography |
topic | asymmetric cryptography blom’s key pre-distribution scheme elliptic curve cryptography |
work_keys_str_mv | AT mdnizamudin implementationofblomskeypredistributionschemebyusingellipticcurvecryptography AT farahazalineymohdamin implementationofblomskeypredistributionschemebyusingellipticcurvecryptography AT aminahabdulmalek implementationofblomskeypredistributionschemebyusingellipticcurvecryptography AT nurannisazulkifili implementationofblomskeypredistributionschemebyusingellipticcurvecryptography AT nuratiqahghazali implementationofblomskeypredistributionschemebyusingellipticcurvecryptography AT sitiaisyahmohdridzuwan implementationofblomskeypredistributionschemebyusingellipticcurvecryptography |