Elliptic curve encryption

Assignment Help JAVA Programming
Reference no: EM13103396

In this project you need to write a program called "ECC.java"to implement Elliptic Curve encryption/decryption.

Specifically, your program will read parameters, plaintext and ciphertextfrom a file named "input.txt" (under the same directory).Then your program needs tocreate a file named "output.txt" (under the same directory) and prints the public key, private key, encryption and decryption results to "output.txt". (Please check the attached sample files "input.txt" and "output.txt".)

In "input.txt":

1. First line is aprime number q. Thus GF(q) is the ground field.

2. Second line are two integers a and b,separated by one blank space. Thus the elliptic curve Eq(a, b) is: y2 = x3 + ax + b.

3. Thirdline are two integers x1 and y1,separated by one blank space. Thus the base point is: G = (x1, y1).

4. Fourth line is an integer nA. Thus private key is nA.

5. Fifth line are two integers m1 and m2,separated by one blank space. Thus the point of the plaintext is Pm = (m1, m2).

6. Sixth line is the randomly generated positive integer k.

7. Seventh line arefour integers c11, c12,c21, and c22, separated by one blank space. Thus the point of the ciphertext is Cm = (c1=(c11, c12),c2=(c21,c22)).

In "output.txt":

1. First line (two integers) is the public key.

2. Second line (one integer) is the private key.

3. Third line (four integers)is the point of the ciphertextencrypted fromPmusing public key and k in input.txt. Suppose the point of the ciphertext Cm = (kG, Pm+kPB), then the first two integers are the coordinates ofkG and the latter two integers are the coordinates ofPm+kPB.

4. Fourth line (two integers)is the point of the plaintext decrypted fromCmusing private key in input.txt.
Download:- Ecc.rar

Reference no: EM13103396

Questions Cloud

Illustrate what degree do you think iger''s calmer approach : illustrate what degree do you think Iger's calmer and less confrontational approach to running Disney has helped the company position itself to survive a major economic recession?
How many days does it take for a perfect blackbody cube : How many days does it take for a perfect blackbody cube (0.0206 m on a side, 66.9 °C) to radiate the same amount of energy that a one-hundred-watt light bulb uses in one hour?
Explain maintain a high level of external monitoring : When the competition is intense as well as the environment is changing rapidly it is especially significant to do which 1. Maintain a high level of external monitoring
Collectively exhaustive event : If two events are collectively exhaustive, what is the probability that both occur at the same time?
Elliptic curve encryption : write a program to implement Elliptic Curve encryption/decryption and program will read parameters, plaintext and ciphertextfrom a file named "input.txt" (under the same directory).
Explain how market structure influences strategic options : Explain how market structure influences strategic options. Explain how fast-moving environments are best approached.
What is the final temperature of the coffee : A thermos contains 159 cm3 of coffee at 93.7 °C. To cool the coffee, you drop two 13.2-g ice cubes into the thermos. The ice cubes are initially at 0 °C and melt completely. What is the final temperature of the coffee in degrees Celsius? Treat the..
Discuss business law to boardwalk : Press Publishers sold 100 copies of an original hardback book entitled Business Law to Boardwalk ____. The contract among Press Publishing and Boardwalk Books provides, in relevant part that Boardwalk may return to Press any unused copies of the b..
Computing probability for exponential distribution : Suppose a worker needs to process 400 items. The time to process each item is exponentially distributed with a mean of 2 minutes, and the processing times are independent.

Reviews

Write a Review

JAVA Programming Questions & Answers

  Develop a reliable transfer protocol over udp

Develop a reliable transfer protocol over UDP. Focus on a Stop- and-Wait protocol.

  Implement security so that all users can view the informatio

Implement security so that all users can view the information about the projects, but only authenticated users

  Write java application to input three integers from user

Write Java application that inputs three integers from user and displays sum, average, product, smallest, and largest of the numbers.

  Write a class array that encapsulates an array

Write a class Array that encapsulates an array and provides bounds-checked access. The private instance variables should be int index and inarray[10]. The public members should be a default constructor and methods (signatures shown below) to provide ..

  Write a recursive program

Write a recursive program to compute the number of ways in which an integer k can be written as sum

  Plot pois on a graph

Write a JAVA program that would get the locations of all the POIs from the file and plot them on a map.

  Create a secure parts inventory catalog system

You will create a secure Parts Inventory Catalog system using Model 2 architecture. The application will require a user to have the proper access right to enter the system, and when satisfied, presents the catalog of items currently available in t..

  Write java program to store employee id number

Use employee data file called employees.txt should comprise at least 5 employee records. Each record stores employee ID number (six digits) last name, first name, middle inital,gender(m or f).

  Implement the finite field gf

Write a program called "GF2.java" to implement the finite field GF(p n )where p is a prime number andn is a positive integer.You also need to write four methodsto realize.

  Sorted list adt and the binary search tree adt

Explain the differences between our specifications of the Sorted List ADT and the Binary Search Tree ADT.

  Write program in java-calculate and display mortgage payment

Write the program in Java (with a graphical user interface) and have it calculate and display the mortgage payment amount from user input of the amount of the mortgage.

  Sequence of method in vector class

Construct a Vector class implementing a number of vector operations as methods along with a testing program to verify the class is working.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd