Cipherion is an Elliptic Curve Cryptography-based system designed for secure and efficient file transmission. While traditional methods like RSA provide security, they often impose high computational demands. Cipherion addresses this by utilizing Elliptic Curve Cryptography (ECC), which offers equivalent security to RSA with significantly lower overhead. The system employs a hybrid encryption approach: file contents are encrypted using symmetric algorithms (AES, DES, or ChaCha), while ECC facilitates the secure exchange of symmetric keys via the Elliptic Curve Diffie–Hellman (ECDH) protocol. Implemented in Python, the system features a modular design including file validation, key generation, and secure transfer components. Optimized for resource-limited environments such as IoT and mobile platforms, Cipherion provides a lightweight, scalable solution for robust file security.
Introduction
Cipherion is a secure file transmission system designed to protect sensitive data during transfer using Elliptic Curve Cryptography. It addresses the limitations of traditional encryption methods like RSA algorithm, which require high computational resources, by offering equivalent security with smaller key sizes and faster performance.
The system uses a hybrid encryption approach, combining symmetric algorithms such as AES encryption and ChaCha for fast data encryption, while ECC secures the encryption keys. This ensures both efficiency and strong security. It also incorporates Elliptic Curve Diffie–Hellman for secure key exchange and ECDSA for authentication and integrity verification.
The system is implemented in Python using frameworks like Django and cryptographic libraries. Its modular architecture includes components for file validation, key management, encryption, and secure transmission, making it scalable and user-friendly.
The literature review supports ECC’s advantages over RSA, highlighting smaller key sizes, faster computation, and suitability for mobile and IoT environments. It also emphasizes hybrid encryption models and advanced security techniques.
The system workflow includes:
Secure key exchange using ECDH
File encryption using symmetric algorithms
Digital signing for authentication
Decryption and validation by the receiver
Mathematically, ECC is based on elliptic curve equations and the difficulty of the Elliptic Curve Discrete Logarithm Problem, ensuring strong security.
Experimental results show that Cipherion performs efficiently across various file types and sizes, offering a lightweight, fast, and secure solution for modern file sharing.
Overall, Cipherion provides a scalable and high-performance cryptographic system that enhances secure communication while reducing computational overhead.
Conclusion
This research successfully designed and implemented Cipherion, a robust hybrid cryptographic framework for secure file sharing. By leveraging ECC for key management and symmetric ciphers for bulk encryption, the system achieves high-level security without the computational overhead of traditional RSA models [2, 10]. The integration of ECDH ensures secure local derivation of shared secrets, while ECDSA provides verifiable authenticity and non-repudiation [4, 8]. Experimental results confirm that the modular architecture reduces latency and maintains stable throughput across file formats, satisfying the requirements of confidentiality, integrity, and availability.
References
[1] H. N. AlMajed and A. S. Almogren, “Se-enc: A secure and efficient encoding scheme using elliptic curve cryptography,” IEEE Access, vol. 7, pp. 175865–175878, 2019.
[2] A. A. Alhaj, A. Alarbea, and M. Jawabreh, “Efficient and secure data transmission cryptography techniques using ecc,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 36, pp. 486–492, Sep. 2024.
[3] P. Kiran, S. S. Kumar, and N. P. Kavya, “A novel framework using elliptic curve cryptography for extremely secure transmission in distributed privacy preserving data mining,” International Journal of Computer Applications, vol. 32, no. 10, pp. 85–95, 2012.
[4] A. P. Shaikh, V. Kaul, and S. K. Narayankhedkar, “Security enhancement algorithm for data transmission using elliptic curve diffie-hellman key exchange,” in Proc. Int. Conf. and Workshop on Advanced Computing (ICWAC), 2014.
[5] X. Fang and Y. Wu, “Investigation into the elliptic curve cryptography,” in Proc. 3rd Int. Conf. on Information Management (ICIM), pp. 412–415, 2017.
[6] H. Sibal, H. Hasija, and S. Gupta, “Secure transmission of data by elliptic curve cryptography,” Int. Journal of Engineering Research Technology (IJERT), vol. 5, no. 10, pp. 1–5, Oct. 2016.
[7] Q. H. Bai, W. B. Zhang, P. Jiang, and X. Lu, “Research on design principles of elliptic curve public key cryptography and its implementation,” in Proc. 2nd Int. Conf. on Intelligent Computation Technology and Automation (ICICTA), pp. 880–883, 2009.
[8] J. R. Shaikh, M. Nenova, G. Iliev, and Z. Valkova-Jarvis, “Analysis of standard elliptic curves for the implementation of elliptic curve cryptography in resource-constrained e-commerce applications,” in Proc. IEEE Int. Conf. on Microwaves, Antennas, Communications and Electronic Systems (COMCAS), pp. 1–6, 2017.
[9] P. Zhou and Q. Ding, “Key exchange research of chaotic encryption chip based on elliptic curve cryptography algorithm,” in Proc. 2nd Int. Conf. on Intelligent Computation Technology and Automation (ICICTA), pp. 687–691, 2009.
[10] P. G. Shah, X. Huang, and D. Sharma, “Analytical study of implementation issues of elliptical curve cryptography for wireless sensor networks,” in Proc. IEEE 24th Int. Conf. on Advanced Information Networking and Applications Workshops (WAINA), pp. 589–592, 2010.
[11] V. Sharma, S. Chaudhary, and K. Singh, “Secure file sharing in cloud using elliptic curve cryptography,” Int. Journal of Advanced Computer Science and Applications (IJACSA), vol. 13, no. 3, pp. 458–463, 2022.