Comparative Analysis of RSA-RK and ECC-RK for Aadhaar Card

  • Conference paper
  • First Online:
Power Engineering and Intelligent Systems (PEIS 2023)

Abstract

Hackers are inventing novel strategies to breach the encrypted information of practically all existing cryptographic algorithms, and therefore network security has always been an emerging study in communication technology. “Elliptic Curve Cryptography” (ECC) is a new cryptographic approach that has been demonstrated to work in public-key cryptosystems. ECC’s benefits ensure secure data transmission across an insecure medium. The standard ECC key pact procedure is based on El-Gamal encryption. ECC is the handiest procedure for network security because it offers good security with smaller key sizes, quicker computations, lower computing power, and less storage space. By merging ECC and Runge–Kutta (RK) methods, the performance of the ECC cryptanalysis technique is enhanced in relation to speed and security in this paper. The key advantages of RK techniques are that they are simple to use and have a low error rate. The Runge–Kutta-ECC procedure is designed to improve the avalanche effect, speed, throughput, and power consumption of the method. The enhanced performance of the RKECC method is discussed, in addition to the experimental results. There is also a detailed mathematical justification for the RKECC algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Siddharth Raju R, Singh S, Khatter K (2017) Aadhaar card: challenges and impact on digital transformation

    Google Scholar 

  2. Paar C, Pelzl J (2010) Understanding cryptography. Springer-Verlag, Berlin Heidelberg, Germany, pp 239–255

    Book  Google Scholar 

  3. Urvashi, Kaur A (2015) A review on various approaches for image steganography. Int J Sci Res 4(8):2024–2028

    Google Scholar 

  4. Aldabagh GMTK (2019) Proposed hybrid algorithm for image steganography in text security using fish algorithm 54(6). http://jsju.org/index.php/journal/article/view/441

  5. Hoobi MM (2020) Efficient hybrid cryptography algorithm. J Southw Jiaotong Univ 55(3):1–9

    Google Scholar 

  6. Celestin Vigila M, Muneeswaran K (2012) Nonce based elliptic curve cryptosystem for text and image applications. Int J Netw Secur 14(4):236–242

    Google Scholar 

  7. Singh R, Chauhan R, Ritu G, Vinit K, Singh P (2014) Implementation of elliptic curve cryptography for audio-based application. Int J Eng 3(1)

    Google Scholar 

  8. Luma A, Selimi B, Ameti L (2015) Using elliptic curve encryption and decryption for securing audio messages. In: Yang GC, Ao SI, Gelman L (eds) Transactions on engineering technologies. Springer, Dordrecht

    Google Scholar 

  9. Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187–202

    Article  Google Scholar 

  10. Fang X, Wu Y (2017) Investigation into the elliptic curve cryptography. In: Information Management (ICIM). International conference on IEEE, pp 412–415

    Google Scholar 

  11. Felista Sugirtha Lizy R (2020) Performance enhancement of RSA Using Runge-Kutta technique. Test Eng Manag 11850–11857

    Google Scholar 

  12. Felista Sugirtha Lizy R (2021) Image encryption using RK-RSA algorithm in Aadhaar Card. Turkish J Comput Math Educ 4683–4693

    Google Scholar 

  13. Felista Sugirtha Lizy R (2021) Improvement of RSA algorithm using Euclidean technique. Turkish J Comput Math Educ 4694–4700

    Google Scholar 

  14. Shamina Ross B (2016) Security evaluation of blowfish and its modified version using GT’s one-shot category of nash equilibrium. Int J Contr Theory Appl 4771–4777

    Google Scholar 

  15. Shamina RB (2015) Enhancing the performance of blowfish encryption algorithm in terms of speed and security by modifying its function. Int J Appl Eng Res 10(79):621–624

    Google Scholar 

  16. Shamina RB (2017) Performance enhancement of blowfish encryption using RK-blowfish technique. Int J Appl Eng Res 12:9236–9244

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Felista Sugirtha Lizy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Felista Sugirtha Lizy, R. (2024). Comparative Analysis of RSA-RK and ECC-RK for Aadhaar Card. In: Shrivastava, V., Bansal, J.C., Panigrahi, B.K. (eds) Power Engineering and Intelligent Systems. PEIS 2023. Lecture Notes in Electrical Engineering, vol 1097. Springer, Singapore. https://doi.org/10.1007/978-981-99-7216-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7216-6_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7215-9

  • Online ISBN: 978-981-99-7216-6

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics

Navigation