A Review on Elliptic Curve Cryptography for Big Data Transportation

Dr. Anil V Turukmane and Dr. Divya Midhunchakkaravarthy

In the year 1985, Miller Victor and his partner Koblitz Neal brought forth the concept of Elliptic curvesin Cryptography. The evolution of the concept of Elliptic Curve Cryptography (ECC) has led to the development of Public Key Cryptography Systems. Distinct set of keys are used for encoding and decoding data in this system. The size of the larger key decides how strong the security will be as one of the keys involved in the encryption have to distributed publicly. Prime Factorization and Discrete Logarithm played a major role in PKC systems. With the advent of Elliptic Curve Cryptography, it has be enable to ensure the similar level of security as was favored in PKC systems by the use of proportionate magnitudes of small key. Elliptic Curve Cryptography solely involves the practice of Application Based Specific Systems and the gamut of research in this field does not lie out of this practice. Restrictions do exist in this kind of system such as Specific Domain CPU architecture which is used for Big Data Transportation in Network and the amount of processing speed and storage that can be used.

Volume 11 | Issue 12

Pages: 107-110

DOI: 10.5373/JARDCS/V11I12/20193218