SECURE ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM
2
Author(s):
SAKSHI CHAUHAN , NIDHI GULATI
Vol - 6, Issue- 1 ,
Page(s) : 4 - 11
(2016 )
DOI : https://doi.org/10.32804/RJSET
Abstract
Various techniques are available for cryptography. One such technique is elliptic curve cryptography which is based on elliptic curves over finite fields. Several variations of ECC are available such as Elliptic Curve Integrated Encryption Scheme, Elliptic Curve Diffie -Hellman, Elliptic Curve Digital Signature Algorithm etc. In this paper, ECDSA and its implementation details are surveyed. ECDSA has gained a lot of popularity recently because of its ability to provide good security and shorter key size. We have proposed various improvements that can be incorporated in the existing algorithm in order to increase its efficiency in terms of security. The existing algorithm and suggested work are both implemented in Java and results are obtained.
- Michal Varchola, Milos Drutarovsky, Marek Repka, Pavol Zajac, “Side Channel Attack on Multiprecision Multiplier Used in Protected ECDSA Implementation”, 978-1-4673-9406-2/15/$31.00 c 2015 European Union
- V. Gayoso Martinez and L. Hernandez Encinas, “Implementing ECC with Java Standard Edition 7”, International Journal of Computer Science and Artificial Intelligence, Dec. 2013, Vol. 3 Iss. 4, PP. 134-142
- S. Shivkumar, G. Umamaheswari, “Certificate Authority Schemes Using Elliptic Curve Cryptography, RSA And Their Variants- Simulation Using NS2”, American Journal of Applied Sciences 11 (2): 171-179, 2014
- Alese, B. K., Philemon E. D., Falaki, S. O, “Comparative Analysis of Public-Key Encryption Schemes”, International Journal of Engineering and Technology Volume 2 No. 9, September, 2012
- Maryam Savari, Mohammad Montazerolzohour, Yeoh Eng Thiam, “Comparion of ECC and RSA algorithm in Multipurpose Smartcard Application”, International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012
- Dridi Manel, Ouni Raouf, Haddaji Ramzi and Abdellatif Mtibaa, “Hash Function and Digital Signature based on Elliptic Curve”, 14th international conference on Sciences and Techniques of Automatic control & computer engineering, 2013
- Aqeel Khalique, Kuldip Singh, Sandeep Sood, “Implementation of Elliptic Curve Digital Signature Algorithm”, International Journal of Computer Applications (0975-8887) Volume 2 – No.2, May 2010
- Abdessalem Abidi, Belgacem Bouallegue, Fatma Kahri, “Implementation of Elliptic Curve Digital Signature Algorithm (ECDSA)”, Global Summit on Computer & Information Technology (GSCIT’ 2014)
- Leonidas Deligiannidis, “Implementing Elliptic Curve Cryptography”, Int'l Conf. Frontiers in Education: CS and CE | FECS'15 |
- Hu Junru, “The Improved Elliptic Curve Digital Signature Algorithm,” 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
- Pritam Gajkumar Shah, “Investigating Effects of Co-ordinate System on Execution Time of Elliptical Curve Protocol in Wireless Sensor Networks”, International Conference on Future Communication Networks (IEEE), 2012
- Nicholas Jansma and Brandon Arrendondo, “Performance Comparison of Elliptic Curve and RSA Digital Signatures”, April 28, 2004
- Nabil Ghanmy, Lamia Chaari Fourati, Lotfi Kamoun, “Enhancement Security Level and Hardware Implementation of ECDSA”, 978-1-4799-3755-4/13/$31.00 ©2013 IEEE
- Hui Li, Ruixia Zhang, Junkai Yi, Hongqiang Lv, “A Novel Algorithm for Scalar Multiplication in ECDSA”, 2013 International Conference on Computational and Information Sciences
- M. Prabu, Dr. R.Shanmugalakshmi, “A Comparative Analysis of Signature Schemes in A New Approach to Variant on ECDSA”, 2009 International Conference on Information and Multimedia Technology
- Jin-Hee Han, Young-Jin Kim, Sung-Ik Jun, Kyo-II Chung, Chang-Ho Seo, “Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card”, Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW’02) 0-7695 1588-6/02 $17.00 © 2002 IEEE
|