Skip to main content

The Cryptography of Elliptical Curves Application for Formation of the Electronic Digital Signature

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 938))

Abstract

Today, commercial structures can no longer run their business without using the Internet and cloud technologies. Electronic transactions conducted through the global Internet play an increasing role in the modern global economy, and their importance is rapidly increasing every year. However, the reality is the Internet is quite vulnerable in the terms of threats of most diverse types. Facing reality makes commercial organizations increasingly focus on Web security. In this article we are focuses on encryption of Web pages using encryption based on elliptical curves. We examined the algorithm of this approach and engagements are possible protecting information by transforming data from a distortion by an attacker. Even a simple transformation of information is a very effective means, making it possible to hide its meaning from the majority of unskilled offenders. We also considered an algorithm of constructing an electronic-digital message signature based on encryption using elliptic curves.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Petrov, A.A., Karpinski, M., Petrov, O.S.: Development of methodological basis of management of information protection in the segment of corporate information systems. In: 18th International Multidisciplinary Scientific Geoconference: Informatics, SGEM 2018. Informatics, go Informatics and Remote Sensing, Conference Proceedings, STEF92 Technology, no. 2.1, vol. 18, pp. 317–324 (2018)

    Google Scholar 

  2. Kamboj, D., Gupta, D.K., Kumar, A.: Efficient scalar multiplication over elliptic curve. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 8(4), 56–61 (2016). https://doi.org/10.5815/ijcnis.2016.04.07

    Article  Google Scholar 

  3. Federal Information Processing Standards Publication 46-2. Data Encryption Standard (DES). NIST, US Department of Commerce, Washington D.C. (1993)

    Google Scholar 

  4. FIPS PUB 186-4. Federal Information Processing Standards Publication. Digital Signature Standard (DSS). National Institute of Standard and Technology (2013)

    Google Scholar 

  5. Mousa, H.M.: Chaotic genetic-fuzzy encryption technique. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 10(4), 10–19 (2018). https://doi.org/10.5815/ijcnis.2018.04.02

    Article  Google Scholar 

  6. Jacobson, M., Menezes, A.: Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent. University of Illinois (2001)

    Google Scholar 

  7. Agarkhed, J., Ashalatha, R.: Security and privacy for data storage service scheme in cloud computing. Int. J. Inf. Eng. Electron. Bus. (IJIEEB) 9(4), 7–12 (2017). https://doi.org/10.5815/ijieeb.2017.04.02

    Article  Google Scholar 

  8. Koblitz, N.: Random Curves. Journeys of a Mathematician, pp. 312–313. Springer, Heidelberg (2009). ISBN 9783540740780

    Google Scholar 

  9. Akomolafe, O.P., Abodunrin, M.O.: A hybrid cryptographic model for data storage in mobile cloud computing. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(6), 53–60 (2017). https://doi.org/10.5815/ijcnis.2017.06.06

    Article  Google Scholar 

  10. Al-Haija, Q.A., Asad, M.M., Marouf, I.: A systematic expository review of schmidt-samoa cryptosystem. Int. J. Math. Sci. Comput. (IJMSC) 4(2), 12–21 (2018). https://doi.org/10.5815/ijmsc.2018.02.02

    Article  Google Scholar 

  11. Alimoradi, R.: A study of hyperelliptic curves in cryptography. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 8(8), 67–72 (2016). https://doi.org/10.5815/ijcnis.2016.08.08

    Article  Google Scholar 

  12. Rivest, R.L.: The RC5 Encryption Algorithm. Crypto bytes, RSA Laboratories, vol. 1, no. 1, pp. 9–11 (1995)

    Google Scholar 

  13. Gaur, T., Sharma, D.: A secure and efficient client-side encryption scheme in cloud computing. Int. J. Wirel. Microwave Technol. (IJWMT) 6(1), 23–33 (2016). https://doi.org/10.5815/ijwmt.2016.01.03

    Article  Google Scholar 

  14. Kumar, T., Chauhan, S.: Image cryptography with matrix array symmetric key using chaos based approach. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 10(3), 60–66 (2018). https://doi.org/10.5815/ijcnis.2018.03.07

    Article  Google Scholar 

  15. Olorunfemi, T.O.S., Alese, B.K., Falaki, S.O., Fajuyigbe, O.: Implementation of elliptic curve digital signature algorithms. J. Softw. Eng. 1, 1–12 (2007)

    Article  Google Scholar 

  16. Wiener, M.J., Zuccherato, R.J.: Faster attacks on elliptic curve cryptosystems. In: Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 1556, pp. 252–266. Springer, Heidelberg (1999)

    Google Scholar 

  17. Hu, Z., Dychka, I., Onai, M., Ivaschenko, M., Su, J.: Improved method of López-Dahab-Montgomery scalar point multiplication in binary elliptic curve cryptography. Int. J. Intell. Syst. Appl. (IJISA) 10(12), 27–34 (2018). https://doi.org/10.5815/ijisa.2018.12.03

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Olexander Belej .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Belej, O. (2020). The Cryptography of Elliptical Curves Application for Formation of the Electronic Digital Signature. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education II. ICCSEEA 2019. Advances in Intelligent Systems and Computing, vol 938. Springer, Cham. https://doi.org/10.1007/978-3-030-16621-2_5

Download citation

Publish with us

Policies and ethics