{"title":"Performance of ECC Algorithm U sing Game Theory for Aadhaar Card","authors":"R. F. S. Lizy, V. Raj, K. Balasubramanian","doi":"10.1109/PECCON55017.2022.9851034","DOIUrl":null,"url":null,"abstract":"In the Aadhaar Card security is a crucial aspect. Hence it should be kept as private as possible, we will require some data-handling strategies. This document would be useful for data security. The advantage of this technique is in terms of text encryption and decryption security. Asymmetric algorithms like RSA (Rivest, Adi Shamir, and Leonard Adleman) and ECC (Elliptic Curve Cryptography) are used. The RSA algorithm is used to create a pair of keys: one is a public key and another one is a private key. In both smart cards and Aadhaar cards, the RSA algorithm is the most secure algorithm for data protection. The performance of the ECC algorithm with GT (Game Theory) Methods is examined in this research paper. Combining ECC and GT approaches improves the speed and security of this paper. The GT-ECC algorithm's performance is recommended to be improved by increasing the Speed, Avalanche Effect, Speed, power consumption and Throughput. The experimental findings of the GT -ECC technique show improved performance. There is also a detailed mathematical justification for the GT -ECC algorithm.","PeriodicalId":129147,"journal":{"name":"2022 International Virtual Conference on Power Engineering Computing and Control: Developments in Electric Vehicles and Energy Sector for Sustainable Future (PECCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Virtual Conference on Power Engineering Computing and Control: Developments in Electric Vehicles and Energy Sector for Sustainable Future (PECCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PECCON55017.2022.9851034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In the Aadhaar Card security is a crucial aspect. Hence it should be kept as private as possible, we will require some data-handling strategies. This document would be useful for data security. The advantage of this technique is in terms of text encryption and decryption security. Asymmetric algorithms like RSA (Rivest, Adi Shamir, and Leonard Adleman) and ECC (Elliptic Curve Cryptography) are used. The RSA algorithm is used to create a pair of keys: one is a public key and another one is a private key. In both smart cards and Aadhaar cards, the RSA algorithm is the most secure algorithm for data protection. The performance of the ECC algorithm with GT (Game Theory) Methods is examined in this research paper. Combining ECC and GT approaches improves the speed and security of this paper. The GT-ECC algorithm's performance is recommended to be improved by increasing the Speed, Avalanche Effect, Speed, power consumption and Throughput. The experimental findings of the GT -ECC technique show improved performance. There is also a detailed mathematical justification for the GT -ECC algorithm.