IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 9    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 9,September 2012
Make a Secure Connection Using Elliptic Curve Digital Signature[
Full Text(PDF, )  PP.163‐170  
H. Modares, M. T. Shahgoli, H. Keshavarz, A. Moravejosharieh, R. Salleh
—RSA, Elliptic Curve Cryptography (ECC), public key cryptography (PKC), Elliptic Curve Digital Signature (ECDSA), Hashing
It is generally accepted that data encryption is the key role in current and future technologies. Many Public key cryptography schemes were presented, divided into different classes depending on a specific mathematical problem. Cryptography plays an important task in accomplishing information security. It is used for encrypting or signing data at the source before transmission, and then decrypting or validating the signature of the received message at the destination. Since the introduction of public-key cryptography by Dif?e and Hellman in 1976, the potential for using the discrete logarithm problem in public-key cryptosystems has been recognized. There are several public key cryptography, such as RSA and El-Gamal and Elliptic curve cryptography. Elliptic Curve Cryptography (ECC) is considered more suitable than other public key cryptography algorithms because of its small key size. ECC is chosen in this work because of its advantages over other public key cryptography. Generally, to produce private keys and elliptic curve cryptography domain parameters, a random generator is used. 
Untitled Page