A Comparative Study on Digital Signatures Based on Elliptic Curves in High Speed Ad Hoc Networks

Article history: Background: Cryptographic primitives need to be applied to networks which aim security and protection of data in its first place. Digital signature is one such method that can be efficiently developed for providing authenticity and integrity of the message. The progression of elliptic curve in mathematics has complemented the cryptographic field which led to the development of Elliptic Curve Cryptography in public key cryptosystems. Results: Although a number of elliptic curve authentication algorithms are present in literature, we discuss the elliptic curve digital signature algorithm and elliptic curve Pinstov and Vanstone signature schemes in this paper. The analysis of these signatures shows that the computational overhead is very low compared to the traditional asymmetric key algorithms. Conclusion: A very small signature payload is an interesting factor for their use in high speed networks.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[3]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[4]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[5]  Rainer A. Rueppel,et al.  A new signature scheme based on the DSA giving message recovery , 1993, CCS '93.

[6]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[7]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[8]  R. A. Rueppel,et al.  Message recovery for signature schemes based on the discrete logarithm problem , 1994, EUROCRYPT.

[9]  Dan Boneh,et al.  Digital Signature Standard , 2005, Encyclopedia of Cryptography and Security.

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  Amir Hossein Jahangir,et al.  Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .

[12]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  S. Vanstone,et al.  Elliptic Curve Cryptosystems , 1993 .

[15]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .