{"title":"Secure encryption scheme of amazigh alphabet based ECC using finite state machine","authors":"Fatima Amounas, E. H. El Kinani","doi":"10.1109/JNS3.2013.6595477","DOIUrl":null,"url":null,"abstract":"Here we propose an algorithm to implement data security using encryption and decryption method based elliptic curve of Amazigh alphabet. The Unicode character is converted into point on elliptic curve, then by using Fibonacci numbers, which generates the data sequence of random point for each character. Further, the obtained points are encrypted using state finite machine. Here, the same symbol is mapped into different points on elliptic curve, which avoid suspicion from the third party when send through an unsecured channel. The steps of the implementation are explained.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 National Security Days (JNS3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JNS3.2013.6595477","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Here we propose an algorithm to implement data security using encryption and decryption method based elliptic curve of Amazigh alphabet. The Unicode character is converted into point on elliptic curve, then by using Fibonacci numbers, which generates the data sequence of random point for each character. Further, the obtained points are encrypted using state finite machine. Here, the same symbol is mapped into different points on elliptic curve, which avoid suspicion from the third party when send through an unsecured channel. The steps of the implementation are explained.