Skip to main content

Table 3 Hash function encryption (example)

From: Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices

ASCII a b c 5 8
CP x1 y1 x2 y2 x3 y3 x4 y4 x5 y5
CP before Encryption 694,337,436 703,285,746 370,473,331 984,017,275 759,555,548 617,465,919 326,619,521 923,466,984 701,927,624 293,508,906
CP after Encryption 945,913,466 32,060,776 473,006,560 2,009,351,504 1,705,469,014 649,526,695 799,626,081 2,932,818,488 2,407,396,638 943,035,601
  1. CP (Curve Points) of characters are taken from Table 1 (Reference Table)
  2. Example can be redirected to Fig. 1