Upgrade of GSM Security Using Elliptic Curve Cryptography Algorithm
M. S. N. G. K. Mounika1, Arvind Yadav2, S. Lokesh Anand3, P. Satyannarayana4

1M. S. N. G. K. Mounika, Department of Electronics and Computer Science, Koneru Lakshmaiah University, Vaddeswaram (Andhra Pradesh), India.
2Arvind Yadav, Assistant Professor, Department of Electronics and Computer Science, Koneru Lakshmaiah University, Vaddeswaram (Andhra Pradesh), India.
3S. Lokesh Anand, Department of Electronics and Computer Science, Koneru Lakshmaiah University, Vaddeswaram (Andhra Pradesh), India.
4Dr. Penke Satyannarayana, Professor, Department of Electronics and Computer Science, Koneru Lakshmaiah University, Vaddeswaram (Andhra Pradesh), India.

Manuscript received on 01 May 2019 | Revised Manuscript received on 15 May 2019 | Manuscript published on 30 May 2019 | PP: 487-491 | Volume-8 Issue-7, May 2019 | Retrieval Number: G3671058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As of late, the versatile business has practiced an outrageous rise in the total of its users. The Global system for mobile organize with the best overall number of users capitulates to a large number of safety susceptibilities. Safekeeping is a consuming and clever problem. It will dependably stay constant for what it’s worth imperative in an extremely wide range of uses. Global system for mobile Security defects have been distinguished quite a long while back. A portion of these blemishes have been fixed however others are left to discourse. The vast majority of the RSA– kind equipment and program writing items furthermore, models require enormous key size for higher safekeeping level. In this research work we will concentrate about the inspection of functioning practice on RSA’s algorithm and ECC calculation in system of Global System for Mobile to how it’s a higher promise for a quicker and progressively protected technique for encryption in correlation to the present benchmarks in the open key cryptographic calculations of RSA cryptographic technique.
Keyword: Cryptography, ECC, Public- Key, Global System for Mobile.
Scope of the Article: Graph Algorithms and Graph Drawing.