Publication:
Elliptic curve coding technique application for digital signature

dc.contributor.authorBULDU, ALİ
dc.contributor.authorYILDIZ, KAZIM
dc.contributor.authorsYildiz, Kazim; Buldu, Ali; Saritas, Hasan
dc.date.accessioned2022-03-14T08:15:07Z
dc.date.accessioned2026-01-11T07:23:25Z
dc.date.available2022-03-14T08:15:07Z
dc.date.issued2016-11-25
dc.description.abstractAn elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation (CNG) which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard (AES) technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright (C) 2016 John Wiley & Sons, Ltd.
dc.identifier.doi10.1002/sec.1601
dc.identifier.eissn1939-0122
dc.identifier.issn1939-0114
dc.identifier.urihttps://hdl.handle.net/11424/241299
dc.identifier.wosWOS:000389253400022
dc.language.isoeng
dc.publisherWILEY-HINDAWI
dc.relation.ispartofSECURITY AND COMMUNICATION NETWORKS
dc.rightsinfo:eu-repo/semantics/openAccess
dc.subjectcryptology
dc.subjectelliptic curve coding
dc.subjectdigital signature
dc.subjectsecurity
dc.titleElliptic curve coding technique application for digital signature
dc.typearticle
dspace.entity.typePublication
oaire.citation.endPage4254
oaire.citation.issue17
oaire.citation.startPage4242
oaire.citation.titleSECURITY AND COMMUNICATION NETWORKS
oaire.citation.volume9

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
file.pdf
Size:
1.47 MB
Format:
Adobe Portable Document Format