ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Realization of Elliptic Curve Cryptosystem Based on ECDSA

Journal: Current Trends in Technology and Sciences (Vol.1, No. 2)

Publication Date:

Authors : ;

Page : 79-83

Keywords : Elliptic curve cryptography (ECC); Elliptic curve discrete logarithm problem (ECDLP); Karatsuba multiplication; message digest; Secure Hash Algorithm (SHA); Elliptic curve digital signature Algorithm (ECDSA).;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The elliptic curve crypto systems are used for implementing protocols such as ECDSA digital signature scheme, EC Elgamal Encryption/ Decryption scheme, Diffie-Hellman key exchange scheme and so on. This paper analyzes the elliptic curve operations of the ECC protocol ECDSA. The steps involved in ECDSA are key-pair generation, signature generation and signature verification. The digital signature is typically created using the hash function. The transmitter sends the encrypted data along with the signature to the receiver. The receiver who knows about the senders public key can authenticate the signature using his private key. Thereby ECC ensures the secured data communication. The proposed algorithm is highly parallelizable and well adapted to VLSI implementation of elliptic curve crypto systems

Last modified: 2013-10-21 16:08:41