Realization of Elliptic Curve Cryptosystem Based on ECDSA
Journal: Current Trends in Technology and Sciences (Vol.1, No. 2)Publication Date: 2012-09-25
Authors : M. Ashkar Mohammed S Suresh Babu;
Page : 79-83
Keywords : Elliptic curve cryptography (ECC); Elliptic curve discrete logarithm problem (ECDLP); Karatsuba multiplication; message digest; Secure Hash Algorithm (SHA); Elliptic curve digital signature Algorithm (ECDSA).;
Abstract
The elliptic curve crypto systems are used for implementing protocols such as ECDSA digital signature scheme, EC Elgamal Encryption/ Decryption scheme, Diffie-Hellman key exchange scheme and so on. This paper analyzes the elliptic curve operations of the ECC protocol ECDSA. The steps involved in ECDSA are key-pair generation, signature generation and signature verification. The digital signature is typically created using the hash function. The transmitter sends the encrypted data along with the signature to the receiver. The receiver who knows about the senders public key can authenticate the signature using his private key. Thereby ECC ensures the secured data communication. The proposed algorithm is highly parallelizable and well adapted to VLSI implementation of elliptic curve crypto systems
Other Latest Articles
- Compactness in Countable Fuzzy Topological Space
- Impact of Information Technology to Enhance Human Skills
- An Empirical Study of Consumer Behaviour towards The Preference and Usage of Mobile Phone Services in Bhopal
- Mechanical Behaviour of Rubber Seed under Compressive Loading
- Simultaneous estimation of Losartan and Atenolol by UV Spectrophotometric Method
Last modified: 2013-10-21 16:08:41