INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 314    Submit Your Rating     Cite This   Download        Certificate

SECURE ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

    2 Author(s):  SAKSHI CHAUHAN , NIDHI GULATI

Vol -  6, Issue- 1 ,         Page(s) : 4 - 11  (2016 ) DOI : https://doi.org/10.32804/RJSET

Abstract

Various techniques are available for cryptography. One such technique is elliptic curve cryptography which is based on elliptic curves over finite fields. Several variations of ECC are available such as Elliptic Curve Integrated Encryption Scheme, Elliptic Curve Diffie -Hellman, Elliptic Curve Digital Signature Algorithm etc. In this paper, ECDSA and its implementation details are surveyed. ECDSA has gained a lot of popularity recently because of its ability to provide good security and shorter key size. We have proposed various improvements that can be incorporated in the existing algorithm in order to increase its efficiency in terms of security. The existing algorithm and suggested work are both implemented in Java and results are obtained.

  1. Michal Varchola, Milos Drutarovsky, Marek Repka, Pavol Zajac, “Side Channel Attack on Multiprecision Multiplier Used in Protected ECDSA Implementation”, 978-1-4673-9406-2/15/$31.00 c 2015 European Union
  2. V. Gayoso Martinez and L. Hernandez Encinas, “Implementing ECC with Java Standard Edition 7”, International Journal of Computer Science and Artificial Intelligence, Dec. 2013, Vol. 3 Iss. 4, PP. 134-142
  3. S. Shivkumar, G. Umamaheswari, “Certificate Authority Schemes Using Elliptic Curve Cryptography, RSA And Their Variants- Simulation Using NS2”, American Journal of Applied Sciences 11 (2): 171-179, 2014
  4. Alese, B. K., Philemon E. D., Falaki, S. O, “Comparative Analysis of Public-Key Encryption Schemes”, International Journal of Engineering and Technology Volume 2 No. 9, September, 2012
  5. Maryam Savari, Mohammad Montazerolzohour, Yeoh Eng Thiam, “Comparion of ECC and RSA algorithm in Multipurpose Smartcard Application”, International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012
  6. Dridi Manel, Ouni Raouf, Haddaji Ramzi and Abdellatif Mtibaa, “Hash Function and Digital Signature based on Elliptic Curve”, 14th international conference on Sciences and Techniques of Automatic control & computer engineering, 2013
  7. Aqeel Khalique, Kuldip Singh, Sandeep Sood, “Implementation of Elliptic Curve Digital Signature Algorithm”, International Journal of Computer Applications (0975-8887) Volume 2 – No.2, May 2010
  8. Abdessalem Abidi, Belgacem Bouallegue, Fatma Kahri, “Implementation of Elliptic Curve Digital Signature Algorithm (ECDSA)”, Global Summit on Computer & Information Technology (GSCIT’ 2014)
  9. Leonidas Deligiannidis, “Implementing Elliptic Curve Cryptography”, Int'l Conf. Frontiers in Education: CS and CE | FECS'15 |
  10. Hu Junru, “The Improved Elliptic Curve Digital Signature Algorithm,” 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
  11. Pritam Gajkumar Shah, “Investigating Effects of Co-ordinate System on Execution Time of Elliptical Curve Protocol in Wireless Sensor Networks”, International Conference on Future Communication Networks (IEEE), 2012
  12. Nicholas Jansma and Brandon Arrendondo, “Performance Comparison of Elliptic Curve and RSA Digital Signatures”, April 28, 2004
  13. Nabil Ghanmy, Lamia Chaari Fourati, Lotfi Kamoun, “Enhancement Security Level and Hardware Implementation of ECDSA”, 978-1-4799-3755-4/13/$31.00 ©2013 IEEE
  14. Hui Li, Ruixia Zhang, Junkai Yi, Hongqiang Lv, “A Novel Algorithm for Scalar Multiplication in ECDSA”, 2013 International Conference on Computational and Information Sciences
  15. M. Prabu, Dr. R.Shanmugalakshmi, “A Comparative Analysis of Signature Schemes in A New Approach to Variant on ECDSA”, 2009 International Conference on Information and Multimedia Technology
  16. Jin-Hee Han, Young-Jin Kim, Sung-Ik Jun, Kyo-II Chung, Chang-Ho Seo, “Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card”, Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW’02) 0-7695 1588-6/02 $17.00 © 2002 IEEE

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details