key: cord-0764515-z2mtzjse authors: Sethi, Purna Chandra; Sahu, Neelima; Behera, Prafulla Kumar title: Group security using ECC date: 2021-02-28 journal: Int J Inf Technol DOI: 10.1007/s41870-021-00613-1 sha: 75a5e43350ad5ba8b3c3c2cff0f4b1193b7614f0 doc_id: 764515 cord_uid: z2mtzjse Nowadays security is main issue during transmission of data. Among many cryptographic methods, ECC is the public key asymmetric cryptosystem which provides faster computation over smaller size in comparison to other asymmetric key cryptosystems. In this paper, we have proposed a group security algorithm using the ECC cryptography algorithm. The group security is applied to ECC in terms of m-gram selection called ECC m-gram selection. Due to the group security implementation in terms of common grams, processing speed will be faster in comparison to individual item security. We have also made the comparison study between the traditional ECC algorithm with the proposed group security algorithm using generalized frequent-common gram selection for depicting lesser time requirements to achieve better security for the whole process. The use of computers as well as computer-related activities over the internet growing exponentially day by day. With the growth of internet users, the threats, as well as the attacks to personal and organization information, is also growing exponentially. According to a survey done by ITU at the end of 2019, 53.6% of global populations are using the Internet which is less than 1% in 1999 for their day to day activities. These increasing populations towards Internet-related activities attracted the cybercriminals for imparting various crimes. To protect personal data as well as organization information, large numbers of researchers are motivated towards research in information security that not only includes data security but also network security. According to industrial Ethernet book, the global revenue for protecting from industrial cyber security threats and attacks are becoming doubled between 2013 and 2019 (approximately 600 million dollar to 1200 million dollars). To provide information security, various symmetric keys, as well as asymmetric key cryptography algorithms, are used by researchers. In case of symmetric key cryptosystem, a common private key is shared among the sender and receiver with proper security whereas, in case of asymmetric key cryptosystem, a public key is used by the sender for encryption and a private key owned the receiver for decryption. Due to two independent keys implementation for cryptography algorithm implementation, asymmetric key cryptography algorithms are becoming more popular with respect to private key cryptography algorithms [1] . There are several asymmetric key cryptography algorithms present which differ by their functionality. The algorithms are defined according to the numbers of bits used for each key. If a cryptography algorithm uses less number of key bits then and incurs longer time for decryption, then it is becomes more secure in comparison to other cryptography algorithms that involve more number of key and requires nearly same or more time for decryption. Each cryptography algorithm has its pros and cons and each has its application field [1] . To provide enhance the security features, many researchers proposed different hybrid cryptography algorithms [2] . In contrast, we have proposed a technique called group security in which the cryptography algorithm is applied to a group of items instead of individual ones. The algorithm applied to a set of suspicious elements that undergoes security algorithm implementation. The suspicious elements are generated using generalized frequent-common gram selection (GFGS). The suspicious elements are the set of elements which are frequently occurring among the items to be stored [3] . Since ECC algorithm provides better security with less key size in comparison to various famous cryptography techniques namely RSA, AES, DES, etc. [4] , are used in this research work. The whole research paper organization is specified as: Sect. 2 deals with the survey of literature containing a brief insight into the research work made by different researchers various popular cryptography algorithms for achieving information security. Section 3 focuses on a brief overview of the GFGS algorithm which is used in our research work. Section 4 provides a basic idea about ECC and its implementation steps. The proposed work is explained in Sect. 5 of this paper. Section 6 contains the proposed algorithm and its description. The experimental result is provided in Sect. 7 followed by performance analysis of the proposed method in Sect. 8 of the paper. The conclusion is specified in Sect. 9 followed by future scope in Sect. 10 of this paper. The current day to day activities starting from entertainment to business is highly dependent on the internet. All these activities are made over the network. According to a survey done by Hootsuite in January 2020, out of 7.76 billion of the total population, 5.18 unique mobile phone users are there which nearly 67% of the total population is. Among the mobile phone users, 4.54 billion are using the internet which is nearly 59% of the total population and approximately 3.81 billion are active social media users which are nearly 49% of the total population. During this Covid-19 pandemic, the online and digital activities over the internet are increased significantly. Online video conferencing, on classes for education, social media, online video calls, online transaction, etc. were became highly adopted by almost all users. Due to all these activities, the information is becoming public and hence the chance of accessing information increased significantly. Hence to secure these data, cryptography algorithm implementation is highly demanded. Cryptography algorithms are mainly used to achieve confidentiality in terms of hiding the information from unauthorized access, integrity in terms of protection from unauthorized change, authentication in terms of ownership for accessing the data and non-repudiation in terms of restricting the users from deny in future from sending or receiving message. There is large number of security algorithms present which differ by the scalability, encryption, and decryption speed and security feature. Since the number of internet users increases exponentially, the maintenance, as well as processing time for cryptography algorithms, are comparatively high. So in [9] , the authors proposed an efficient method for managing the traffic incurred during networking considering bandwidth on demand approach in a run time environment for faster processing and performing better utilization of bandwidth. Paper [10] is the extension of [9] which not only provides faster data transmission but also provides security to information using double ECC algorithm. The efficiency of cryptography algorithm depends on many factors out of which length key plays a vital role. The key is an important factor for cryptography which is required for encryption and decryption. But as the key size increases, it becomes more difficult to break the algorithm. Hence, the cryptography algorithm that involves lesser key size and providing better security is becoming more popular. Out of the cryptography algorithms, ECC provides faster key generation, faster key agreement along with better information security through reduced key size in comparison to the other cryptography algorithms. The basic comparison between RSA and ECC according to experimental complexity during the implementation of different cryptography method is depicted in Table 1 [4, 8] : Elliptic curve cryptosystem is an asymmetric key cryptosystem that is described in finite field. The elliptic curve algebraic structure is primarily used for various implementations. As compared to other cryptosystem ECC provides us strong security with smaller bits that refer to faster performance to reduce storage and transmission requirements. It is a non-trivial method i.e. it involves a combination of ECC cryptography along with ECDH key exchange and symmetric encryption algorithm for implementation. Here, ECDH shared a symmetric secret key that helps both encryption and decryption. Security provided by a public key of 256 bit is compared to the security provided by the public key of RSA having 3072 bits. In this paper, we are encrypting messages by applying the ECC algorithm. We are also applying an m-gram method to provide minimum searching time and faster processing speed. Previously data are encrypted individually and also decrypted individually which takes comparatively more time. Here we are applying the pattern matching process. So that words having a common element will be accessed at a time which will mainly reduce our searching time. By searching the common element we can access all the words that refer to that particular common element. That also will require less external memory. For the frequently used data, the no. of collision point can be calculated from the frequency of that particular data that how many times a particular data is used. In general, each information is considered separately during data transmission and processing. Individual information selection and processing involve more searching time as well as processing time. So, instead of processing individual elements, a set of commonly occurring elements called m-grams are identified and all the operations are applied to the common grams. The frequent common grams nominated behave as the representatives for the set of items. We have considered a 2-gram method in which a set of two bits called di-bits is searched for the set of elements [3, 5] . Here, we have applied the ECC algorithm on the set of di-bits instead of individual elements so that group security can be achieved and processing time would be relatively less. The 2-gram selection methodology can be depicted using an example as shown in Fig. 1 . It is represented by the wholesalers dataset of UCI repository. The flowchart for finding the GFGS character identification is depicted in Fig. 2 as shown below. An elliptic curve can be defined using the finite field called a Galois field comprises of points for the equation: ''y 2-= x 3 ? ax ? b'' where ''4a 3 ? 27b 2 = 0'' with a condition for point of infinity denoted by 'O'. ECC is an asymmetric key cryptosystem where each user owns one public and private key pair. Let Eq(a,b) is the elliptic curve having parameter a, b, and q, for any prime number q or an integer which can be represented in terms of 2 to the power n. G be a point on the elliptic curve that satisfy for a large value of n. The steps involved in ECC algorithm [6, 11] are depicted in Fig. 3 as: A. Key generation (at sender) B. Signature generation (at sender side) The message 'M' needs to be signed by the sender for authentication. The steps that are followed for signature generation are: C. Encryption algorithm using public key of receiver D. Decryption algorithm using private key receiver Fig. 3 Steps of ECC algorithm Int. j. inf. tecnol. E. Signature verification (at receiver side) For sender's signature authenticate, the receiver need to identify its public key 'PA'. In comparison to other cryptography algorithms, ECC involves reduced key length for encryption as well as decryption. Adopting the same security features of ECC, we have tried to reduce the processing time. To reduce the processing time, we have applied ECC using generalized frequent-common gram (GFGS) method. GFGS algorithm involves searching for suspicious elements for a set of times. These suspicious elements are called as common grams. Hence, the frequently occurring items are called as the common grams among the set of elements. We have adopted 2-gram techniques in which set of di-bits (double bits occurring sequentially) are finally obtained for the set of items. The set of di-bits undergoes ECC implementation to provide group security [7, 9] . After identifying the common grams in the first layer, the elements are concerning the common gram in the second layer. Finally, ECC is applied in the third layer of the proposed model on the common grams instead of the elements itself. The whole process is depicted in Fig. 4 (present at the last page of the paper). The proposed model operation can be represented using the following flow diagram depicted in Fig. 5 . In brief, from earlier ECC algorithm implementation, it is observed that time taken for encryption and decryption of individual items is comparatively more as compared to our paper. By implementation of group encryption on common grams, group security could be achieved bearing the same flavor of ECC algorithm in reduced time processing time. As the security algorithm is applied to common grams, less external memory is also needed as compared to the normal ECC algorithm (Fig. 6 ). Let 'M' be the message that is to be sent to the receiver. Cluster the elements according to the common elements present Find the set of common grams (di-grams) Apply the ECC algorithm on the selected common grams (di-grams) Store the elements concerning the common grams Stop Fig. 4 Flow diagram of the proposed model Int. j. inf. tecnol. We have used MatLab-2015 tool for implementation of the proposed algorithm within Intel core Celeron(R), 1.61 GHz speed processor, 4-GB RAM and with Windows operating system (64-bit). The msnbc dataset of the UCI repository is used for the whole process implementation. We have considered 24 numbers of elements that undergo the GFGS algorithm producing 09 number of 2-grams which is shown in Table 2 . These 2-grams undergo ECC implementation to represent group security. The time needed for encryption and decryption for each element along with the identified 2-grams is depicted in Table 3 given below. Now we can aggregate the time needed for encryption and decryption using ECC for the set of elements having a single common gram to show the comparison among the traditional approach and the proposed approach. This is depicted in Table 4 given below. The contents of Table 4 showing the comparison between the traditional ECC and the proposed group security using ECC can be represented using the bar chart as shown in Fig. 5. The performance of the suggested algorithm is specified by the comparison between different time incurred for various processes. Table 5 depicts the total time needed for each element encryption, decryption, the sum of total time incurred for encryption as well as decryption, along with the total time for encryption, decryption, and the sum of encryption as well as the decryption for the generated 2-grams. The values are retrieved from Table 4 . By considering the Table 5 contents, the efficiency of the proposed approach can be specified. • The encryption efficiency would be = 0.0212/ 0.0184 = 1.1521. So, the encryption efficiency would increase approximately by 15.21%. Based on the above implementation and review of performance the following conclusions could be made: • The efficiency of the proposed method is completely dependent on the dataset. So, it will differ from one dataset to another. • The efficiency of the proposed method is more in comparison to the existing methods. • Each common gram behaves as the representative for the group elements. So, if more number of elements is stored in each group, then the time of encryption as well as decryption will reduce significantly. • In the worst condition, i.e. if there would be no common grams present, the processing time will comparatively reduce due to the cryptography algorithm implementation on the common gram instead of individual elements. Future applications will demand a more secure and faster cryptography method. Though this group security will provide a faster and secure approach, a reduced key size algorithm containing the same flavour for implementation is highly demanded. So, we will focus on two aspects such as reduced key size and lower on-chip memory space for the implementation of security algorithms in the future. Also, we will focus on optimizing the worst situation where no common grams are present so that successful data transmission can be done by using less external memory, without any unauthorized access. Methods of network security and improving the quality of service-a survey Design of new security algorithm: using hybrid Cryptography architecture In-depth packet inspection using a hierarchical pattern matching algorithm Cryptography and network security-principle and practices, elliptic curve cryptography Secure packet inspection using hierarchical pattern matching implemented using incremental clustering algorithm A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem SALE: smartly allocating low-cost many-bit ECC for mitigating read and write errors in STT-RAM caches RSA cryptography algorithm using linear congruence class Network traffic management using dynamic bandwidth on demand Group security using ECC A new authentication scheme with elliptical curve cryptography for internet of things (IoT) environments