Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.]
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervene...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UiTM
2021
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/49132/1/49132.pdf https://ir.uitm.edu.my/id/eprint/49132/ https://mjoc.uitm.edu.my/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Mara |
Language: | English |
id |
my.uitm.ir.49132 |
---|---|
record_format |
eprints |
spelling |
my.uitm.ir.491322022-06-14T03:13:20Z https://ir.uitm.edu.my/id/eprint/49132/ Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.] Udin, Md Nizam Mohd Amin, Farah Azaliney Abdul Malek, Aminah Zulkifili, Nur Annisa Ghazali, Nur Atiqah Mohd Ridzuwan, Siti Aisyah Algebra Electronic data processing. Maple (Computer file) Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study. Penerbit UiTM 2021-10 Article PeerReviewed text en https://ir.uitm.edu.my/id/eprint/49132/1/49132.pdf Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.]. (2021) Malaysian Journal of Computing (MJoC), 6 (2). pp. 812-822. ISSN 2600-8238 https://mjoc.uitm.edu.my/ |
institution |
Universiti Teknologi Mara |
building |
Tun Abdul Razak Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Mara |
content_source |
UiTM Institutional Repository |
url_provider |
http://ir.uitm.edu.my/ |
language |
English |
topic |
Algebra Electronic data processing. Maple (Computer file) |
spellingShingle |
Algebra Electronic data processing. Maple (Computer file) Udin, Md Nizam Mohd Amin, Farah Azaliney Abdul Malek, Aminah Zulkifili, Nur Annisa Ghazali, Nur Atiqah Mohd Ridzuwan, Siti Aisyah Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.] |
description |
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study. |
format |
Article |
author |
Udin, Md Nizam Mohd Amin, Farah Azaliney Abdul Malek, Aminah Zulkifili, Nur Annisa Ghazali, Nur Atiqah Mohd Ridzuwan, Siti Aisyah |
author_facet |
Udin, Md Nizam Mohd Amin, Farah Azaliney Abdul Malek, Aminah Zulkifili, Nur Annisa Ghazali, Nur Atiqah Mohd Ridzuwan, Siti Aisyah |
author_sort |
Udin, Md Nizam |
title |
Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.] |
title_short |
Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.] |
title_full |
Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.] |
title_fullStr |
Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.] |
title_full_unstemmed |
Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.] |
title_sort |
implementation of blom’s key predistribution scheme by using elliptic curve cryptography / md nizam udin ... [et al.] |
publisher |
Penerbit UiTM |
publishDate |
2021 |
url |
https://ir.uitm.edu.my/id/eprint/49132/1/49132.pdf https://ir.uitm.edu.my/id/eprint/49132/ https://mjoc.uitm.edu.my/ |
_version_ |
1736837236949778432 |