Find Jobs
Hire Freelancers

Python programming for an modified elliptic curve cryptography

$30-250 USD

Closed
Posted almost 6 years ago

$30-250 USD

Paid on delivery
Project Title: An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography There are two phases in protocol, setup yhase and authentication phase. Before giving details, I defined some notations used in the protocol. q A large prime number. G A additive group with order q consisting of points on an elliptic curve. P A generator of G Xi The identifier of the ith tag which is a random point in G. y The private key of the server. Y The public key of the server where Y=yP. r,k Two random numbers. h() A secure hash function. Setup Phase The server generates his private key and public key in the phase. He also generates the identifier of each tag. 1). The server generates a random number y ∈ Zq as his private key and computes his public key Y=yP. 2). The server chooses a random point Xi in G as the ith tag’s identifier. Then the server stores the ith tag’s identifier and related information in its database. The server also stores [Xi,Y,P] into the ith tag’s memory. Authentication Phase When interrogating a tag, the server starts the phase to authenticate each other. As show in the attached file, the details of the phase are presented as follows. 1). The server generates a random number r∈Zq, com- puters C0=rY and broads the message {C0} to the ith tag. 2). On receiving {C0}, the i th tag generates a random number k∈Zq, computes K=kP, C1=kC0, R=K+K,C2=Xi+R and C3=h(Xi,K). Then the i th tag sends the message {C1,C2,C3} to the server. 3). Upon receiving {C1,C2,C3}, the server computes K=y−1r−1C1, R=K+K and Xi=C2−R. Then the server checks whether C3 and h(Xi,K) are equal. If they are not equal, the server rejects the session; otherwise, the server searches its database for Xi. If succeeds, the server confirm that the tag is a legal one; otherwise, the server computes C4 = h(Xi, 3K) and the message {C4} to the ith tag. 4). Upon receiving {C4}, the ith tag checks whether C4 and h(Xi, 3K) are equal. If they are not equal, the ith tag rejects the session; otherwise, the ith tag confirms that the server is a legal one.
Project ID: 16793130

About the project

7 proposals
Remote project
Active 6 yrs ago

Looking to make some money?

Benefits of bidding on Freelancer

Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
7 freelancers are bidding on average $210 USD for this job
User Avatar
Hello, I have the good knowledge of Python programming for an modified elliptic curve cryptography . I have more than 5 years of experience in Python. We have worked on several similar projects before! We have worked on 300+ Projects. Please check the profile reviews. I can deliver your job with in your deadline. Please ping me for more discussion. I can assure the 100% job satisfaction. Thanks,
$250 USD in 3 days
4.9 (100 reviews)
7.0
7.0
User Avatar
I have extensive experience in Python graphin libraries and chartings including but not limited to matplotlib, pyplot, plotly, etc. Please contact me so that I can better understand the requirements. Regards,
$222 USD in 3 days
4.9 (64 reviews)
5.4
5.4
User Avatar
A proposal has not yet been provided
$150 USD in 5 days
5.0 (29 reviews)
5.2
5.2
User Avatar
Hello, I have read the details of the project and I complete it perfectly. Kindly check my profile https://www.freelancer.com/u/mzdesmag to see my past works and reviews. Thanks
$155 USD in 3 days
4.4 (9 reviews)
4.5
4.5
User Avatar
A proposal has not yet been provided
$222 USD in 4 days
5.0 (1 review)
2.3
2.3
User Avatar
Hi, I have more than 10 years of information security experience and have industry leading certifications like CISSP and CISM. I also have 2 IEEE research publications on ECC implementation. I can deliver your required code. However I would like you to discuss the details before assigning the project. Kind Regards Hammad
$222 USD in 5 days
5.0 (1 review)
0.8
0.8

About the client

Flag of UNITED STATES
United States
0.0
0
Member since Apr 26, 2018

Client Verification

Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.