2013
DOI: 10.5120/12118-8141
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture

Abstract: Communication security is one of the areas where research is highly required. The data used in communication is very sensitive and needs to be protected and made abstract from intruders of system. This research is all about securing the messages or data that is being communicated among two parties.The recent branch of Network security is Cryptography using Elliptic Curve Architectures which is based on the arithmetic of elliptic curves and discrete logarithmic problems. ECC schemes are public-key based mechani… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…The public blockchain in Bitcoin is a collection of everyday Bitcoin transactions. Every block in this group carries an SHA-256 hash of the previous block, therefore the chaining of blocks begins with the origin block [18]. Secure Shell (SSH) employs ECC for server/client selfauthentication by signing a replica of the exchange key, and ECDSA can be the key; clients can then use ECDSA as public keys for client authentication [18].…”
Section: Various Ecc Implementation and Applicationsmentioning
confidence: 99%
See 3 more Smart Citations
“…The public blockchain in Bitcoin is a collection of everyday Bitcoin transactions. Every block in this group carries an SHA-256 hash of the previous block, therefore the chaining of blocks begins with the origin block [18]. Secure Shell (SSH) employs ECC for server/client selfauthentication by signing a replica of the exchange key, and ECDSA can be the key; clients can then use ECDSA as public keys for client authentication [18].…”
Section: Various Ecc Implementation and Applicationsmentioning
confidence: 99%
“…Every block in this group carries an SHA-256 hash of the previous block, therefore the chaining of blocks begins with the origin block [18]. Secure Shell (SSH) employs ECC for server/client selfauthentication by signing a replica of the exchange key, and ECDSA can be the key; clients can then use ECDSA as public keys for client authentication [18]. Austrian e-ID is a way of granting access to users through the use of physical smart cards.…”
Section: Various Ecc Implementation and Applicationsmentioning
confidence: 99%
See 2 more Smart Citations
“…together. Hence it is called Integrated Encryption Scheme, since it is a hybrid scheme that uses a public key system to transport a session key for use by a symmetric cipher [15]. In ECIES, a Diffie-Hellman shared secret is used to derive two symmetric keys k1 and k2.…”
Section: Elliptic Curve Integrated Encryption Scheme (Ecies)mentioning
confidence: 99%