{"id":197,"date":"2005-08-05T18:08:56","date_gmt":"2005-08-05T11:08:56","guid":{"rendered":"https:\/\/www.khudri.com\/web\/?p=197"},"modified":"2022-02-15T02:06:57","modified_gmt":"2022-02-14T19:06:57","slug":"implementation-of-elgamal-elliptic-curve-cryptography-using-malab","status":"publish","type":"post","link":"https:\/\/www.khudri.com\/web\/implementation-of-elgamal-elliptic-curve-cryptography-using-malab-200508\/","title":{"rendered":"Implementation of Elgamal Elliptic Curve Cryptography Using Malab"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>IMPORTANT.<\/strong> This is not a full paragraph of this papers. Please download full papers. You can download from the URL below the end of this paragraph.<\/p><\/blockquote>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<p align=\"justify\">The idea of using elliptic curve in cryptography was introduced by Victor Miller [10] and Neal Koblitz as an alternative to established public key systems such as DSA and RSA. In 1985, they proposed a public key cryptosystems analogue of the ElGamal encryption schemes which used Elliptic Curve Discrete Logarithm Problem (ECDLP) [5,6,11]. According to Purbo and Wahyudi [11], Elliptic Curve Cryptography (ECC) can be used in some necessities such as encryption scheme (ElGamal ECC\/EC ElGamal), digital signature (ECDSA) and key exchange protocol (Diffie Hellman<br \/>ECC\/EC Diffie Hellman).<\/p>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<p align=\"justify\">The most time consuming part of the computation is elliptic scalar multiplication. So we need to represent the multiplication algorithm ( see [5] and [6] ) to make the computation more efficient, such as binary algorithm, addition-subtraction algorithm and repeated-dobling algorithm. We use the addition-subtraction algorithm in our implementation and Non Adjacent Form (NAF) to represent the scalar. For computing the elliptic scalar multiplication k.P, k is represented by NAF form.<\/p>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<p align=\"justify\">There are 3 main programmes which will be described in our implementation, they are:<br>1. Key Generation Programme.<br>2. Encryption Programme<br>3. Decryption Programme.<br>There are many functions must be made<br>to build the main programmes which<br>are classified into 3 categories, they are<br>1) Functon of Modular Arithmetics<br>2) Function of Elliptic Curve<br>Arithmatics<br>3) Function of ElGamal ECC.<\/p>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p> International Conference (ICICI 2005)<br>&#8220;<em>Implementation of ElGamal Elliptic Curve Cryptography Using Matlab <\/em>&#8220;.<br>Download: <a href=\"https:\/\/wan.khudri.com\/my_files\/icici2005\/Abstract_ICICI_2005.pdf\">Abstract<\/a> | <a href=\"https:\/\/wan.khudri.com\/my_files\/icici2005\/paper_ICICI_2005.pdf\">Full Papers<\/a> | <a href=\"https:\/\/wan.khudri.com\/my_files\/skripsi\/source_code\/source-code-en-matlab7.zip\">Source Code for Matlab Ver 7<\/a>.<\/p><\/blockquote>\n\n\n\n<p>My Project (Essay, papers, Source Code, etc): <a href=\"https:\/\/wan.khudri.com\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/wan.khudri.com<\/a><br>Tutorial, Article (All Download List): <a href=\"https:\/\/download.khudri.com\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/download.khudri.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IMPORTANT. This is not a full paragraph of this papers. Please download full papers. You can download from the URL below the end of this paragraph. The idea of using elliptic curve in cryptography was introduced by Victor Miller [10] and Neal Koblitz as an alternative to established public key systems such as DSA and &hellip; <a href=\"https:\/\/www.khudri.com\/web\/implementation-of-elgamal-elliptic-curve-cryptography-using-malab-200508\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Implementation of Elgamal Elliptic Curve Cryptography Using Malab&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,12,6],"tags":[84,88,81,89,91,79,85,90,92,83,87],"class_list":["post-197","post","type-post","status-publish","format-standard","hentry","category-cryptography","category-mathemathics","category-matlab","category-security","tag-elgamal-ecc-using-matlab","tag-elliptic-group","tag-full-papers","tag-icici-2005","tag-icici-bandung","tag-implementation-elgamal-ecc","tag-implementation-elliptic-curve-cryptograhy","tag-international-conference-icici","tag-itb","tag-matlab-version-7","tag-prime-finite-field"],"_links":{"self":[{"href":"https:\/\/www.khudri.com\/web\/wp-json\/wp\/v2\/posts\/197"}],"collection":[{"href":"https:\/\/www.khudri.com\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.khudri.com\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.khudri.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.khudri.com\/web\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":12,"href":"https:\/\/www.khudri.com\/web\/wp-json\/wp\/v2\/posts\/197\/revisions"}],"predecessor-version":[{"id":213,"href":"https:\/\/www.khudri.com\/web\/wp-json\/wp\/v2\/posts\/197\/revisions\/213"}],"wp:attachment":[{"href":"https:\/\/www.khudri.com\/web\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.khudri.com\/web\/wp-json\/wp\/v2\/categories?post=197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.khudri.com\/web\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}