Skip to main content

Table 3 Hash function encryption (example)

From: Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices

ASCII

a

b

c

5

8

CP

x1

y1

x2

y2

x3

y3

x4

y4

x5

y5

CP before Encryption

694,337,436

703,285,746

370,473,331

984,017,275

759,555,548

617,465,919

326,619,521

923,466,984

701,927,624

293,508,906

CP after Encryption

945,913,466

32,060,776

473,006,560

2,009,351,504

1,705,469,014

649,526,695

799,626,081

2,932,818,488

2,407,396,638

943,035,601

  1. CP (Curve Points) of characters are taken from Table 1 (Reference Table)
  2. Example can be redirected to Fig. 1