A scheme based on ECDSA and its implementation for information security Online publication date: Thu, 04-Jul-2024
by G. Mallikharjuna Rao; K. Deergha Rao
International Journal of Engineering Systems Modelling and Simulation (IJESMS), Vol. 15, No. 4, 2024
Abstract: Cryptography methods are means of securing digital data on a network. Digital signature on a document today is trendy in the digital world for authentication, authorisation, integrity, and non-repudiation. The elliptical curve digital signature algorithm (ECDSA) has been implemented and proved that it requires a key size of small length as compared to the RSA. However, its implementation for image and audio security is lacking in the literature. Hence, this paper has proposed a scheme based on ECDSA for text, image, and audio security over networks. Further, the proposed method is implemented on text, image, and audio using both LabVIEW software and myRIO hardware and verified for authentication.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Engineering Systems Modelling and Simulation (IJESMS):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com