Dr. Nagaratna P. Hegde, et. al. International Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 12, Issue 4, (Series-IV) April 2022, pp. 35-40 www.ijera.com DOI: 10.9790/9622-1204043540 35 | Page Elliptic Curve Cryptography using Authenticated Encryption Dr. Nagaratna P. Hegde 1 , P. Deepthi 2 1 Professor, Computer Science and Engineering, Vasavi College of Engineering, Hyderabad, Telangana, India 2 Assistant Professor, Computer Science and Engineering, Bhoj Reddy Engineering College for Women, Hyderabad, Telangana, India ABSTRACT Asymmetric encryption is used by many applications to provide secure communication between two parties. Asymmetric encryption uses more memory and require more computation. Elliptic Curve Cryptography (ECC) is an asymmetric cryptographic technique that is widely in use on small computational devices because it has the effect of using a strong cryptographic mechanism to generate small keys. ECC is used in a variety of devices, like sensors, Internet of Things (IoT), etc., [3], to reduce power consumption and improve device performance. ECC is strong to implement for the secure communication, if the information is encoded on an Elliptic curve. Equally important is ensuring that ECC maps the message on to the elliptic curve which can be used for encryption. The goal of this work is to provide authenticated encryption for encoding message and map the message on to the curve. Keywords: Elliptic Curve, Elliptic Curve Cryptography, Authentication --------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 12-04-2022 Date of Acceptance: 29-04-2022 --------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Asymmetric encryption is used by many applications to provide secure communication between two parties. Asymmetric encryption uses more memory and require more computation. Elliptic Curve Cryptography (ECC) [2] is an asymmetric cryptographic that is widely in use on small computational devices because it has the effect of using a strong cryptographic mechanism to generate small key size. ECC is used in a variety of devices, from sensors to Internet of Things (IoT) devices, to reduce power consumption and improve device performance. ECC requires a strong implementation to ensure secure communication, especially if the message is to be encoded on an elliptic curve [4]. Equally important is ensuring that ECC maps the message to the curve used for encryption. The goal of this work is to propose a reliable scheme that provides authenticated encryption for both message encoding and map it on to the curve. Another name for public key cryptography is asymmetric cryptography, which uses two keys public and private. Public key is used by sender for encryption of the data. In other words, this key should be available to all parties. Private key is used to decrypt the encrypted data and only the recipient needs to know about this. This protocol solves the need for a secure key exchange between two parties [3]. However, there are drawbacks to using asymmetric encryption: like the size of the key and the required number of calculations. Elliptic Curve Cryptography (ECC) is often used to solve key size and computational problems when low-end devices need to maintain performance. The amount of security provided by ECC is the same as RSA compared to the key size. Cryptography is at risk to many known attacks that jeopardize the cryptographic process. II. MOTIVATION The motivation behind this task is a security vulnerability that can make use of many attacks presented in the previous section. Many articles do not explain how to perform the encoding of the message on to a curve. Many security issues need to be understood for providing authenticated cryptographic encryption. The core of this work is to provide a authenticated scheme using ECC as follows: Describes a vulnerability in the ECC to encode and map. Protect the message by applying a block cipher mode to encode that is resistant to some attacks. RESEARCH ARTICLE OPEN ACCESS