Elliptic curve coding technique application for digital signature

An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation CNG which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard AES technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Steven Hernandez Cissp Official (ISC)2 Guide to the CISSP CBK , 2012 .

[2]  Bart Preneel,et al.  Open problems in hash function security , 2015, Designs, Codes and Cryptography.

[3]  J. Vacca Public Key Infrastructure: Building Trusted Applications and Web Services , 2004 .

[4]  Xue Sun,et al.  An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography , 2009, 2009 International Conference on Computer and Communications Security.

[5]  Wei Shi,et al.  Implementation of elliptic curve Diffie-Hellman key agreement scheme on IRIS nodes , 2015, Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things.

[6]  A. B. Elmadani Digital signature forming and keys protection based on person's characteristics , 2012, 2012 International Conference on Information Technology and e-Services.

[7]  Hamid Sarbazi-Azad,et al.  A general mathematical performance model for wormhole-switched irregular networks , 2009, Cluster Computing.

[8]  Mahmoud T. El-Hadidi,et al.  A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[9]  Ivan Damgård,et al.  Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions , 2015, EUROCRYPT.

[10]  Thomas Shrimpton,et al.  Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.

[11]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[12]  Chengming Qi,et al.  A new threshold signature scheme based on ECC and factoring , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[13]  Massoud Masoumi,et al.  Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[14]  Jonathan Katz,et al.  Hash Functions from Defective Ideal Ciphers , 2015, CT-RSA.

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  Alexander Vasiliev,et al.  Cryptographic quantum hashing , 2014 .

[17]  F. Ahmad,et al.  Java Model of DSA (Digital Signature Algorithm) , 2002 .

[18]  O. O. Meleshko,et al.  ELLIPTIC CURVE CRYPTOGRAPHY , 2014 .