Loading

Encryption and Decryption of Data using Elliptical Curve Cryptography
V. Gnanalakshmi1, N. Yogavarshini2, A. Hemapriyadharshini3, G.P. Mithra Pooja4

1V. Gnanalakshmi, Department of Electronics and Communication, Mepco Schlenk Engineering College, Sivakasi, (Tamil Nadu), India.
2N. Yogavarshini, Department of Electronics and Communication, Mepco Schlenk Engineering College, Sivakasi, (Tamil Nadu), India.
3A. Hemapriya dharshini, Department of Electronics and Communication, Mepco Schlenk Engineering College, Sivakasi, (Tamil Nadu), India.
4G.P. Mithra Pooja, Department of Electronics and Communication, Mepco Schlenk Engineering College, Sivakasi, (Tamil Nadu), India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 July 2019 | PP: 1141-1144 | Volume-8 Issue-9, July 2019 | Retrieval Number: I7909078919/19©BEIESP | DOI: 10.35940/ijitee.I7909.078919

Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Aadhaar database is the world’s largest biometric database system. The security of Aadhaar database plays a major role. In order to secure such huge database, an encryption and decryption algorithm has been proposed in this paper. Elliptic Curve Cryptography (ECC) is a public key cryptography which is used to provide high security to those databases. The Aadhaar database contains individual personal information as well as their biometric identities. ECC is widely used for providing security to all kinds of data. ECC has smaller key size, fast computation, high throughput compared to other cryptographic algorithms. The data’s present in database are converted into their corresponding Pixel or ASCII values. After that the encryption process is done with the help of public key, private key, generation points and plain text. After the encryption process, the encrypted coordinates can be mapped with the generated points and from that corresponding ASCII value for text, pixel value for image can be retrieved. Then, the alphabet which is corresponding to ASCII will be displayed so that the cipher text can be viewed. This encrypted data is stored in the database. In order to retrieve the original data decryption process using ECC is carried out. In decryption process, receiver’s private key and cipher coordinates which is retrieved from encryption process are used. Therefore, the personal details of an individual can be retrieved with the presence of that particular person who only knows that private key. So, the hackers will not be able to retrieve the database of any individual just by knowing their Aadhaar ID. The proposed work is implemented in the MATLAB software. The Performance metrics like PSNR, Similarity, Correlation Coefficient, NPCR and UACI has been done for analysis.
Index Terms: Elliptic Curve Cryptography, Prime Number, Points, Generation Points, Cipher text

Scope of the Article: Encryption Methods and Tools