Make a Secure Connection Using Elliptic Curve Digital Signature[

Full Text(PDF, ) PP.163‐170


Author(s) 
H. Modares, M. T. Shahgoli, H. Keshavarz, A. Moravejosharieh, R. Salleh 

KEYWORDS 
—RSA, Elliptic Curve Cryptography (ECC), public key cryptography (PKC), Elliptic Curve Digital Signature (ECDSA), Hashing 

ABSTRACT 
It is generally accepted that data encryption is the key role in current and future technologies. Many Public key cryptography schemes were presented, divided into different classes depending on a specific mathematical problem. Cryptography plays an important task in accomplishing information security. It is used for encrypting or signing data at the source before transmission, and then decrypting or validating the signature of the received message at the destination. Since the introduction of publickey cryptography by Dif?e and Hellman in 1976, the potential for using the discrete logarithm problem in publickey cryptosystems has been recognized. There are several public key cryptography, such as RSA and ElGamal and Elliptic curve cryptography. Elliptic Curve Cryptography (ECC) is considered more suitable than other public key cryptography algorithms because of its small key size. ECC is chosen in this work because of its advantages over other public key cryptography. Generally, to produce private keys and elliptic curve cryptography domain parameters, a random generator is used. 
