Loading

Estimation of Various Scalar Multiplication Algorithms in ECC
Vimal Gaur1, Bineet Singh2, Deepak3, Megha Agrawal4, Nimisha Mishra5

1Vimal Gaur, Guide Reader, Department of Computer Science Engineering, Maharaja Surajmal Institute of Technology, Delhi, India.

2Bineet Singh, Student, Department of Computer Science Engineering, Maharaja Surajmal Institute of Technology, Delhi, India

3Deepak, Student, Department of Computer Science Engineering, Maharaja Surajmal Institute of Technology, Delhi, India.

4Megha Agrawal, Student, Department of Computer Science Engineering, Maharaja Surajmal Institute of Technology, Delhi, India.

5Nimisha Mishra, Student, Department of Computer Science Engineering, Maharaja Surajmal Institute of Technology, Delhi, India.

Manuscript received on 05 April 2019 | Revised Manuscript received on 12 April 2019 | Manuscript Published on 26 July 2019 | PP: 183-186 | Volume-8 Issue-6S4 April 2019 | Retrieval Number: F10360486S419/19©BEIESP | DOI: 10.35940/ijitee.F1036.0486S419

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this modern era of security, public key cryptography is quite popular and holds a great significance. Various public key cryptosystems are available in today’s environment such as RSA and ECC. Elliptic Curve cryptography is beneficial in a lot of aspects which includes shorter key as compared to other cryptosystems, high security, fast processing speed, low storage, low bandwidth, small software print, low hardware implementation costs, high performance. The main and the costliest step in ECC is the Scalar Multiplication. In scalar multiplication, integer multiple of an element in additive group of elliptic curves is calculated. In this paper, we compare various available algorithms for the scalar multiplication used in ECC.

Keywords: Comparison of Scalar Multiplication, ECC, Elliptic Curve Cryptography, Scalar Multiplication.
Scope of the Article: Computer Science and Its Applications