A scheme based on ECDSA and its implementation for information security
by G. Mallikharjuna Rao; K. Deergha Rao
International Journal of Engineering Systems Modelling and Simulation (IJESMS), Vol. 15, No. 4, 2024

Abstract: Cryptography methods are means of securing digital data on a network. Digital signature on a document today is trendy in the digital world for authentication, authorisation, integrity, and non-repudiation. The elliptical curve digital signature algorithm (ECDSA) has been implemented and proved that it requires a key size of small length as compared to the RSA. However, its implementation for image and audio security is lacking in the literature. Hence, this paper has proposed a scheme based on ECDSA for text, image, and audio security over networks. Further, the proposed method is implemented on text, image, and audio using both LabVIEW software and myRIO hardware and verified for authentication.

Online publication date: Thu, 04-Jul-2024

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Engineering Systems Modelling and Simulation (IJESMS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com