Loading...
Please wait, while we are loading the content...
Similar Documents
Make a Secure Connection Using Elliptic Curve Digital Signature
| Content Provider | Semantic Scholar |
|---|---|
| Author | Salleh, Rosli |
| Copyright Year | 2012 |
| Abstract | It is generally accepted that data encryption is the key role in current and future technologies. Many Public key cryptography schemes were presented, divided into different classes depending on a specific mathematical problem. Cryptography plays an important task in accomplishing information security. It is used for encrypting or signing data at the source before transmission, and then decrypting or validating the signature of the received message at the destination. Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the potential for using the discrete logarithm problem in public-key cryptosystems has been recognized. There are several public key cryptography, such as RSA and El-Gamal and Elliptic curve cryptography. Elliptic Curve Cryptography (ECC) is considered more suitable than other public key cryptography algorithms because of its small key size. ECC is chosen in this work because of its advantages over other public key cryptography. Generally, to produce private keys and elliptic curve cryptography domain parameters, a random generator is used. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.ijser.org/researchpaper/Make-a-Secure-Connection-Using-Elliptic-Curve-Digital-Signature.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |