Utvidet returrett til 31. januar 2025

SOFTWARE IMPLEMENTATION OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

Om SOFTWARE IMPLEMENTATION OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

The Elliptic Curve Digital Signature Algorithm (ECDSA) consists of two modules: one is the signing algorithm used by a signer and the second one is the verification algorithm used by public to verify the signer¿s identity. A person who wants to sign a message digitally uses the signing algorithm, which first makes a message digest (hash) of the message using a suitable hash function (SHA-1) and then the message digest is encrypted using the signer¿s private key. The encrypted message digest is the ¿Digital Signature¿ of the sender on that message. Anyone can verify whether that ¿Digital Signature¿ is authentic or not by using verification algorithm. At first a message digest of the signer¿s message is created using the identical hash function (SHA-1). The verifier then decrypts the ciphered hash output using the signer¿s public key. If the ciphered hash output and the message digest created by the verifier are found to be identical, the signer¿s authenticity is proved. During the period of project duration, a java application program has been written in which the ECDSA functionality of both signing and verification is provided.

Vis mer
  • Språk:
  • Engelsk
  • ISBN:
  • 9786206148111
  • Bindende:
  • Paperback
  • Sider:
  • 80
  • Utgitt:
  • 1. mars 2023
  • Dimensjoner:
  • 150x5x220 mm.
  • Vekt:
  • 137 g.
  • BLACK NOVEMBER
  Gratis frakt
Leveringstid: 2-4 uker
Forventet levering: 12. desember 2024

Beskrivelse av SOFTWARE IMPLEMENTATION OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

The Elliptic Curve Digital Signature Algorithm (ECDSA) consists of two modules: one is the signing algorithm used by a signer and the second one is the verification algorithm used by public to verify the signer¿s identity. A person who wants to sign a message digitally uses the signing algorithm, which first makes a message digest (hash) of the message using a suitable hash function (SHA-1) and then the message digest is encrypted using the signer¿s private key. The encrypted message digest is the ¿Digital Signature¿ of the sender on that message. Anyone can verify whether that ¿Digital Signature¿ is authentic or not by using verification algorithm. At first a message digest of the signer¿s message is created using the identical hash function (SHA-1). The verifier then decrypts the ciphered hash output using the signer¿s public key. If the ciphered hash output and the message digest created by the verifier are found to be identical, the signer¿s authenticity is proved. During the period of project duration, a java application program has been written in which the ECDSA functionality of both signing and verification is provided.

Brukervurderinger av SOFTWARE IMPLEMENTATION OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM



Finn lignende bøker
Boken SOFTWARE IMPLEMENTATION OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM finnes i følgende kategorier:

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.