Publication:
Elliptic curve coding technique application for digital signature

dc.contributor.authorBULDU, ALİ
dc.contributor.authorsYildiz, Kazim; Buldu, Ali; Saritas, Hasan
dc.date.accessioned2022-03-14T08:15:07Z
dc.date.available2022-03-14T08:15:07Z
dc.date.issued2016-11-25
dc.description.abstractAn elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation (CNG) which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard (AES) technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright (C) 2016 John Wiley & Sons, Ltd.
dc.identifier.doi10.1002/sec.1601
dc.identifier.eissn1939-0122
dc.identifier.issn1939-0114
dc.identifier.urihttps://hdl.handle.net/11424/241299
dc.identifier.wosWOS:000389253400022
dc.language.isoeng
dc.publisherWILEY-HINDAWI
dc.relation.ispartofSECURITY AND COMMUNICATION NETWORKS
dc.rightsinfo:eu-repo/semantics/openAccess
dc.subjectcryptology
dc.subjectelliptic curve coding
dc.subjectdigital signature
dc.subjectsecurity
dc.titleElliptic curve coding technique application for digital signature
dc.typearticle
dspace.entity.typePublication
local.avesis.id2fe8107f-a82a-4392-989f-9ffe4e09b5f2
local.import.packageSS16
local.indexed.atWOS
local.indexed.atSCOPUS
local.journal.numberofpages13
local.journal.quartileQ4
oaire.citation.endPage4254
oaire.citation.issue17
oaire.citation.startPage4242
oaire.citation.titleSECURITY AND COMMUNICATION NETWORKS
oaire.citation.volume9
relation.isAuthorOfPublicationa612edf1-56eb-4753-9c24-8b3f663749f1
relation.isAuthorOfPublication.latestForDiscoverya612edf1-56eb-4753-9c24-8b3f663749f1

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Yildiz et al. - 2016 - Elliptic curve coding technique application for di.pdf
Size:
1.47 MB
Format:
Adobe Portable Document Format

Collections