Abstract
Today, commercial structures can no longer run their business without using the Internet and cloud technologies. Electronic transactions conducted through the global Internet play an increasing role in the modern global economy, and their importance is rapidly increasing every year. However, the reality is the Internet is quite vulnerable in the terms of threats of most diverse types. Facing reality makes commercial organizations increasingly focus on Web security. In this article we are focuses on encryption of Web pages using encryption based on elliptical curves. We examined the algorithm of this approach and engagements are possible protecting information by transforming data from a distortion by an attacker. Even a simple transformation of information is a very effective means, making it possible to hide its meaning from the majority of unskilled offenders. We also considered an algorithm of constructing an electronic-digital message signature based on encryption using elliptic curves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Petrov, A.A., Karpinski, M., Petrov, O.S.: Development of methodological basis of management of information protection in the segment of corporate information systems. In: 18th International Multidisciplinary Scientific Geoconference: Informatics, SGEM 2018. Informatics, go Informatics and Remote Sensing, Conference Proceedings, STEF92 Technology, no. 2.1, vol. 18, pp. 317–324 (2018)
Kamboj, D., Gupta, D.K., Kumar, A.: Efficient scalar multiplication over elliptic curve. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 8(4), 56–61 (2016). https://doi.org/10.5815/ijcnis.2016.04.07
Federal Information Processing Standards Publication 46-2. Data Encryption Standard (DES). NIST, US Department of Commerce, Washington D.C. (1993)
FIPS PUB 186-4. Federal Information Processing Standards Publication. Digital Signature Standard (DSS). National Institute of Standard and Technology (2013)
Mousa, H.M.: Chaotic genetic-fuzzy encryption technique. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 10(4), 10–19 (2018). https://doi.org/10.5815/ijcnis.2018.04.02
Jacobson, M., Menezes, A.: Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent. University of Illinois (2001)
Agarkhed, J., Ashalatha, R.: Security and privacy for data storage service scheme in cloud computing. Int. J. Inf. Eng. Electron. Bus. (IJIEEB) 9(4), 7–12 (2017). https://doi.org/10.5815/ijieeb.2017.04.02
Koblitz, N.: Random Curves. Journeys of a Mathematician, pp. 312–313. Springer, Heidelberg (2009). ISBN 9783540740780
Akomolafe, O.P., Abodunrin, M.O.: A hybrid cryptographic model for data storage in mobile cloud computing. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(6), 53–60 (2017). https://doi.org/10.5815/ijcnis.2017.06.06
Al-Haija, Q.A., Asad, M.M., Marouf, I.: A systematic expository review of schmidt-samoa cryptosystem. Int. J. Math. Sci. Comput. (IJMSC) 4(2), 12–21 (2018). https://doi.org/10.5815/ijmsc.2018.02.02
Alimoradi, R.: A study of hyperelliptic curves in cryptography. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 8(8), 67–72 (2016). https://doi.org/10.5815/ijcnis.2016.08.08
Rivest, R.L.: The RC5 Encryption Algorithm. Crypto bytes, RSA Laboratories, vol. 1, no. 1, pp. 9–11 (1995)
Gaur, T., Sharma, D.: A secure and efficient client-side encryption scheme in cloud computing. Int. J. Wirel. Microwave Technol. (IJWMT) 6(1), 23–33 (2016). https://doi.org/10.5815/ijwmt.2016.01.03
Kumar, T., Chauhan, S.: Image cryptography with matrix array symmetric key using chaos based approach. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 10(3), 60–66 (2018). https://doi.org/10.5815/ijcnis.2018.03.07
Olorunfemi, T.O.S., Alese, B.K., Falaki, S.O., Fajuyigbe, O.: Implementation of elliptic curve digital signature algorithms. J. Softw. Eng. 1, 1–12 (2007)
Wiener, M.J., Zuccherato, R.J.: Faster attacks on elliptic curve cryptosystems. In: Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 1556, pp. 252–266. Springer, Heidelberg (1999)
Hu, Z., Dychka, I., Onai, M., Ivaschenko, M., Su, J.: Improved method of López-Dahab-Montgomery scalar point multiplication in binary elliptic curve cryptography. Int. J. Intell. Syst. Appl. (IJISA) 10(12), 27–34 (2018). https://doi.org/10.5815/ijisa.2018.12.03
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Belej, O. (2020). The Cryptography of Elliptical Curves Application for Formation of the Electronic Digital Signature. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education II. ICCSEEA 2019. Advances in Intelligent Systems and Computing, vol 938. Springer, Cham. https://doi.org/10.1007/978-3-030-16621-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-16621-2_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16620-5
Online ISBN: 978-3-030-16621-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)