Hyper Elliptical Curve Cryptography (Hecc) For Cloud
G.S. Parimalam1, M.Gobi2
1G.S. PARIMALAM, Research Scholar, Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamilnadu, India.
2Dr. M. GOBI2, Asst. Professor, Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamilnadu, India.

Manuscript received on November 11, 2019. | Revised Manuscript received on November 20 2019. | Manuscript published on 30 November, 2019. | PP: 11771-11776 | Volume-8 Issue-4, November 2019. | Retrieval Number: D8309118419/2019©BEIESP | DOI: 10.35940/ijrte.D8309.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This system provides an insight into developing a distributed system which is secure, robust and user friendly. This thesis suggests a design and implementation of a digital envelope that combines the hashing algorithm of MD5, the symmetric key algorithm of AES and the asymmetric key algorithm of Hyper Elliptic Curve. A hybrid algorithm is designed, combining the best of both AES and ECC over GF(p) cryptography. The MD5 hash algorithm is adopted to ensure integrity of the data. Cryptography (HECC). This paper discusses securing the data in clouds through implementing the key for encryption and decryption using hyper elliptical curve cryptography. The focus is on Advanced Encryption Standard (AES), the most commonly used secret key cryptographic algorithm, and Hyper Elliptic Curve Cryptography (HECC), public key cryptographic algorithms which have gained popularity in the recent years and are replacing traditional public key cryptosystems, such as RSA and ECC. Such techniques are necessary in order to use high security cryptographic algorithms in real world applications.
Keywords: Cloud Computing Technology, Data Computing, Elliptical Curve Cryptography, File Distribution Model, Hyper Elliptical Curve Cryptography, Reduced Service Cost, Security Model
Scope of the Article: Cloud Computing.