Author:
Mohamed* Mustafa Hussien, ,Sobky Wageda I. El,Hamdy Sara, ,
Abstract
This paper try to introduce the advantages and disadvantages of the Elliptical Curve Digital Signature Algorithm that could be put in consideration for future usage through applications and future scalability depending on improvement levels of elliptical curve Digital Signature Algorithm starting from The elliptical Curve Cryptography that it was extracted from till showing, elliptical curve Digital Signature Algorithm's security power, performance quality, memory usage rate, applications, challenges, and last improvement. To help in the future in evading some problems like forgery, worse usage of memory because of big sized keys that cause the need for high processing power that reduces the performance quality, and considering it as a level in a new algorithm to reduce the tries of attacking and hacking specific messages between specific parties, after explaining the Elliptical Curve Cryptography and how the scientists reached from the Elliptical Curve Cryptography to the Elliptical Curve Digital Signature Algorithm and why they developed Elliptical Curve Digital Signature Algorithm, the paper will explain its advantages and disadvantages of the Elliptical Curve Digital Signature Algorithm, then the paper will explain what is the differences happen in a new type of the Elliptical Curve Digital Signature Algorithm called Multiple Elliptical Curve Digital Signature Algorithm, trying to show what is the improvement stages was happened in the Elliptical Curve Digital Signature Algorithm, how that affected the nowadays applications, and how that participated in improving the security performance and increasing the security strength, there fore what was included in the paper could be used as a nucleus for more and more improving of the Elliptical Curve Digital Signature Algorithm, and evading its defects.
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Subject
Electrical and Electronic Engineering,Mechanics of Materials,Civil and Structural Engineering,General Computer Science
Reference51 articles.
1. Sklavos, Nicolas. "Book Review: Stallings, W. Cryptography and Network Security: Principles and Practice: Upper Saddle River, NJ: Prentice Hall, 2013, 752p., $142.40. ISBN: 13: 978-0133354690." (2014): 49-50, p308.
2. Hoffstein, Jeffrey, et al. An introduction to mathematical cryptography. Vol. 1. New York: Springer, 2008, p301.
3. Koblitz, Neal. "elliptical curve cryptosystems." Mathematics of computation 48.177 (1987): 203-209.
4. Miller, Victor S. "Use of elliptical curves in cryptography." Conference on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg, 1985 ,p417.
5. ANSI, X9. "62: public key cryptography for the financial services industry: the elliptical curve digital signature algorithm (ecdsa)." Am. Nat'l Standards Inst (1999).
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献