The Arithmetic Of elliptic Curve for Prime Curve Secp-384r1 Using One Variable Polynomial Division for Security of Transport Layer Protocol
Santoshi Pote1, B.K. Lande2 

1Santoshi Pote, Electronics Engineering, Ramrao Adik Institute of Technology, Mumbai University, Mumbai, India.
2B.K. Lande, Electronics and Telecommunication, Datta Meghe College of Engineering, Mumai University, Mumbai, India.

Manuscript received on 07 March 2019 | Revised Manuscript received on 14 March 2019 | Manuscript published on 30 July 2019 | PP: 4770-4774 | Volume-8 Issue-2, July 2019 | Retrieval Number: B1875078219/19©BEIESP | DOI: 10.35940/ijrte.B1875.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this paper, we present a new method for solving multivariate polynomial elliptic curve equations over a finite field. The arithmetic of elliptic curve is implemented using the mathematical function trace of finite fields. We explain the approach which is based on one variable polynomial division. This is achieved by identifying the plane p with the extension of and transforming elliptic curve equations as well as line equations arising in point addition or point doubling into one variable polynomial. Hence the intersection of the line with the curve is analogous to the roots of the division between these polynomials. Hence this is the different way of computing arithmetic of elliptic curve.Transport layer security provides end-to-end security services for applications that use a reliable transport layer protocol such as TCP. Two Protocols are dominant today for providing security at the transport layer, the secure socket layer (SSL) protocol and transport layer security (TLS) protocol. One of the goals of these protocols is to provide server and client authentication, data confidentiality and data integrity. The above goals are achieved by establishing the keys between server and client, the algorithm is called elliptic curve digital signature algorithm (ECDSA) and elliptic curve Diffie-Hellman (ECDH). These algorithms are implemented using standard for efficient cryptography (SEC) prime field elliptic curve secp-384r1 currently specified in NSA Suite B Cryptography. The algorithm is verified on elliptic curve secp-384r1and is shown to be adaptable to perform computation.
Key words: Transport Layer, Elliptic Curve Arithmetic, Polynomial Division.

Scope of the Article: Security, Trust and Privacy