W4301117121 PDF
W4301117121 PDF
W4301117121 PDF
com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121
ABSTRACT
The Elliptic curve cryptography ( ECC) a promising and important because it requires less computing power,
bandwidth, and also the memory when comparing to other cryptosystems The clustering algorithm using the
Integer Linear Programming (ILP) and Boolean Satisfiability (SAT) solvers. These improvements will secure
the application of SAT and ILP techniques in modeling composite engineering problem that is the Clustering
Problem in Mobile Ad-Hoc Networks (MANETs). The Clustering Problem in MANETs consists of selecting the
most appropriate nodes of a given MANET topology as clusterheads, and ensuring that regular nodes are related
to clusterheads such that the lifetime of the network is maximized. In which, discussing SAT/ILP techniques for
clustering techniques and ECC El Gamal Threshold Cryptography for the security. Through our implementation,
explored the possibility of using ECCEG-TC in MANETs.
Keywords - Boolean Satisfiability, Elliptic curve cryptography, ECC El Gamal Threshold Cryptography
Integer Linear Programming.
www.ijera.com 117 | P a g e
Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121
www.ijera.com 118 | P a g e
Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121
in the system, and make sure that links are , 0 ≤ a ≤ p-1, defining the random polynomial
1 j
recognized only between nodes that are within each f(x) over Zp, a Galois prime field GF(p).
other’s exposure radius. Likewise the same manner in • We compute n shares, M = f(x ) mod p, 1≤ i ≤ n,
which the distances between nodes are used to i i
determine the price of the links, it can also be where x can be just the public index i for
i
compared to the exposure radius of each node and simplicity, and convert them to points P on
i
used to Sample MANET topology. elliptic curve E (a, b).
p
III. Ecc Elgamal Tc (Ecceg-Tc) • Alice picks a random number r, and sends rG
The ELGamal public-key encryption scheme and P + rK to Bob with index t.
i B
can be viewed as Diffie-Hellman key agreement • Bob recovers each elliptic curve point by
protocol in key transmit mode. Its protection is based calculating P + rK – n rG = P .
i B B i
on the intractability of the discrete Logarithm • Bob converts P to M , and deduces M by using
Problem (DLP) and the Diffie-Hell man problem. i i
www.ijera.com 119 | P a g e
Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121
Fig.4 illustrates that with increase in ECC Fig. 6 Decryption and Combination Timings for
key size, the total encryption timings increase ECCEG-TC
gradually for given n and t. For constant key size and
n, the encryption timings increase with t as the time Number of point addition of ECCEG-TC
to generated Lagrange polynomial and respective increases with n resulting into proportionate increase
message shares increases accordingly. in addition timing in encryption and decryption as
seen in Fig. 4 and Fig. 6. The time required
converting message to point and vice-versa is
significantly small compared to encryption and share
generation time and hence not shown separately. In
ECCEG-TC, the Lagrange is carried over prime field
p, hence the success rate is 100% as all the partial
messages are recovered without any issue of inverse
calculation.
V. Conclusion
Fig. 4 Total Encryption Timings for ECCEG-TC An improved ILP formulation to solve the
clustering trouble in MANETs. The future model
Fig. 5 shows that the share generation offered the utilize of a Star-Ring backbone. In
timings increase with increase in key size or with n or addition, the planned formulation incorporated the
t. Share generation timings are very small compared ability to enforce coverage constraints to ensure that
to the encryption timings. only connections that are within the physical
limitations of the node are established. Applications
of MANETs are on rise and hence it is necessary to
provide security to this vulnerable wireless networks.
And by further exploring and implementing ECC
ELgamal threshold cryptography algorithms, its
shown that secure MANETs are feasible.
References
[1] S. Chinara and S. Rath, “Energy efficient
mobility adaptive distributed clustering
algorithm for mobile ad hoc network,” in
Fig. 5 Share Generation Timings for ECCEG-TC Proc. Int. Conf. Adv. Comput. Commun.,
2008, pp. 265–272.
Combination time is the time required to [2] A. Schrijver, Theory of Linear and Integer
combine t partial messages using Shamir’s Lagrange Programming.New York, NY, USA: Wiley,
interpolation method to retrieve original message. 1999.
From Fig. 6, the total decryption and combination [3] F. Aloul, A. Ramani, I. Markov, and K.
timings increase gradually with increase in t for Sakallah, “Generic ILP versus specialized 0-
constant key size and n. This increase is due to time 1 ILP: An update,” in Proc. Int. Conf.
required to decrypt and combine additional partial Comput.-Aided Design, 2002, pp. 450–457.
messages as t is increased. Increase in the key size [4] D. Chai and A. Kuehlmann, “A fast pseudo-
www.ijera.com 120 | P a g e
Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121
[5] Boolean constraint solver,” IEEE Trans. cryptography and other network security
Comput.-Aided Design Integr. Circuits Syst., algorithms for constrained environments”.
vol. 24, no. 3, pp.305–317, Mar. 2005. IEEE International Workshop on WWC-5,
[6] A. Sagahyroon, F. Aloul, and A. Sudnitson, 2009.
“Using SAT-based tech-niques in low [9] K. Lauter, “The advantages of Elliptic
power state assignment,” J. Circuits, Syst., Curve Cryptography For Wireless
Comput, vol. 20, no. 8, pp. 1605–1618, Security”, IEEE Wireless Communications,
2011. vol. 11, no. 1, Feb. 2004, pp. 62-67.
[7] Yufang Huang, “Algorihtm for elliptic [10] Y. Desmedt and Y. Frankel, “Threshold
curve diffie-Hellman key exchange based cryptosystems”, in Advances in Cryptology
on DNA title self assembly In Proceedings - Crypto '89, Proceedings, Lecture Notes in
of 46th IEEE Theories and Computer Science 435, G. Brassard, Ed.,
Applications,pp.31-36, 2008. Santa Barbara: Springer-Verlag,1990, pp.
[8] A. M. Fiskiran and R. B. Lee. “Workload 307-315.
characterization of elliptic curve
www.ijera.com 121 | P a g e