Abstract
Hackers are inventing novel strategies to breach the encrypted information of practically all existing cryptographic algorithms, and therefore network security has always been an emerging study in communication technology. “Elliptic Curve Cryptography” (ECC) is a new cryptographic approach that has been demonstrated to work in public-key cryptosystems. ECC’s benefits ensure secure data transmission across an insecure medium. The standard ECC key pact procedure is based on El-Gamal encryption. ECC is the handiest procedure for network security because it offers good security with smaller key sizes, quicker computations, lower computing power, and less storage space. By merging ECC and Runge–Kutta (RK) methods, the performance of the ECC cryptanalysis technique is enhanced in relation to speed and security in this paper. The key advantages of RK techniques are that they are simple to use and have a low error rate. The Runge–Kutta-ECC procedure is designed to improve the avalanche effect, speed, throughput, and power consumption of the method. The enhanced performance of the RKECC method is discussed, in addition to the experimental results. There is also a detailed mathematical justification for the RKECC algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Siddharth Raju R, Singh S, Khatter K (2017) Aadhaar card: challenges and impact on digital transformation
Paar C, Pelzl J (2010) Understanding cryptography. Springer-Verlag, Berlin Heidelberg, Germany, pp 239–255
Urvashi, Kaur A (2015) A review on various approaches for image steganography. Int J Sci Res 4(8):2024–2028
Aldabagh GMTK (2019) Proposed hybrid algorithm for image steganography in text security using fish algorithm 54(6). http://jsju.org/index.php/journal/article/view/441
Hoobi MM (2020) Efficient hybrid cryptography algorithm. J Southw Jiaotong Univ 55(3):1–9
Celestin Vigila M, Muneeswaran K (2012) Nonce based elliptic curve cryptosystem for text and image applications. Int J Netw Secur 14(4):236–242
Singh R, Chauhan R, Ritu G, Vinit K, Singh P (2014) Implementation of elliptic curve cryptography for audio-based application. Int J Eng 3(1)
Luma A, Selimi B, Ameti L (2015) Using elliptic curve encryption and decryption for securing audio messages. In: Yang GC, Ao SI, Gelman L (eds) Transactions on engineering technologies. Springer, Dordrecht
Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187–202
Fang X, Wu Y (2017) Investigation into the elliptic curve cryptography. In: Information Management (ICIM). International conference on IEEE, pp 412–415
Felista Sugirtha Lizy R (2020) Performance enhancement of RSA Using Runge-Kutta technique. Test Eng Manag 11850–11857
Felista Sugirtha Lizy R (2021) Image encryption using RK-RSA algorithm in Aadhaar Card. Turkish J Comput Math Educ 4683–4693
Felista Sugirtha Lizy R (2021) Improvement of RSA algorithm using Euclidean technique. Turkish J Comput Math Educ 4694–4700
Shamina Ross B (2016) Security evaluation of blowfish and its modified version using GT’s one-shot category of nash equilibrium. Int J Contr Theory Appl 4771–4777
Shamina RB (2015) Enhancing the performance of blowfish encryption algorithm in terms of speed and security by modifying its function. Int J Appl Eng Res 10(79):621–624
Shamina RB (2017) Performance enhancement of blowfish encryption using RK-blowfish technique. Int J Appl Eng Res 12:9236–9244
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Felista Sugirtha Lizy, R. (2024). Comparative Analysis of RSA-RK and ECC-RK for Aadhaar Card. In: Shrivastava, V., Bansal, J.C., Panigrahi, B.K. (eds) Power Engineering and Intelligent Systems. PEIS 2023. Lecture Notes in Electrical Engineering, vol 1097. Springer, Singapore. https://doi.org/10.1007/978-981-99-7216-6_5
Download citation
DOI: https://doi.org/10.1007/978-981-99-7216-6_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7215-9
Online ISBN: 978-981-99-7216-6
eBook Packages: EnergyEnergy (R0)