• Improving Network Security Using Elliptic Curve Cryptosystem

  • TABLE OF CONTENTS -- [Total Page(s) 1]

    Page 1 of 1

    • TABLE OF CONTENT
      Tittle Page   
      Declaration   
      Certification   
      Dedication   
      Acknowledgements  
      Abstract   
      Tables of contents   
      Table of Content
      1.0    CHAPTER ONE (INTRODUCTION)
      1.1    BACKGROUND TO THE WORK   
      1.2    PROBLEM DEFINITION   
      1.3    PROJECT JUSTIFICATION   
      1.4    OBJECTIVES   
      2.0    CHAPTER TWO (LITERATURE REVIEW)
      2.1    NETWORK SECURITY   
      2.2    CHARACTERISTICS OF NETWORK SECURITY  
      2.3    MAIN THREATS TO NETWORK SECURITY  
      2.4    SOLUTION OF NETWORK SECURITY PROBLEM   
      2.5    CATEGORIES OF SECURITY THREATS   
      2.6    PHYSICAL INSTALLATION ATTACK   
      2.7    DEVICE COMMUNICATION ATTACK   
      2.8    RECONNAISSANCE ATTACKS   
      2.9    ACCESS ATTACK   
      2.9.1    DENIAL OF SEVICE ATTACKS   
      2.9.2    WORM, VIRUS AND TROJAN HORSE ATTACKS   
      3.0    CHAPTER THREE (METHODOLOGY)
      3.1    BACKGROUND OF ELLIPTIC CURVE CRYPROGRAPHY   
      3. 2    ADVANTAGES OF ECC   
      3.3    WHAT IS ELLIPTIC CURVE CRYPTOGRAPHY?   
      3.4    HISTORY OF ELLIPTIC CURVE CRYPTOGRAPHY   
      3.5    RELATED WORK ON ELLIPTIC CURVE CRYPTOSYSTEM   
      3.5.1.    RSA (RIVEST, SHAMIR, AND ADLEMAN)   
      3.5.4.    SECURE SHELL   
      3.5.5.    DIGITAL SIGNATURE   
      4.0.    CHAPTER FOUR (IMPLEMENTATION)
      4.1.    SYSTEM HARDWARE REQUIREMENT   
      4.2.    SYSTEM SOFTWARE REQUIREMENT   
      4.3.    IMPLEMENTATION PROCEDURE   
      4.4.    IMPLEMETATION OF OUTPUT SNAPSHOT   
      4.5.    SNAPSHOT OF INVALID OUTPUT   
      CHAPTER FIVE (SUMMARY, CONCLUSION AND RECOMMENDATION)
      5.0. SUMMARY, CONCLUSION AND RECOMMENDATION   
      REFERENCE   
      Source Code   
      List of Figures   
  • TABLE OF CONTENTS -- [Total Page(s) 1]

    Page 1 of 1

    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTSecuring a network wired or wireless for network administrator has been a big challenges for network administrators in the present day of Internet usage. This project presents ECDSA Cryptosystem as a solution to the problem been faced by network administrators and Engineers. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA) with the attractiveness that there is no sub exponential algorithm known to solve the ell ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]CHAPTER ONE1.0    INTRODUCTION1.1    BACKGROUND TO THE WORKThe fast development of the modern Internet technology and information technology cause the individual, enterprise, school and government department joining the Internet, Which cause more illegal users to attack and destroy the network by using the fake websites, fake mail, Trojan horse and backdoor virus at the same time. The target of the attacks and intrusion on the network are computers, so once the intruders succeed, it will c ... Continue reading---

         

      CHAPTER TWO - [ Total Page(s): 11 ]Simple packet filters selectively controls the flow of packets in/out of a network or between networks. Control is based and enforced through a series of rules. These rules are based on information stored in the IP and TCP/UDP/ICMP headers.Rule criteria can be based on the following characteristics of the IP packet:➢    Source and/or destination addresses➢    Protocol including TCP, UDP, ICMP, or all IP➢    TCP or UDP source and/or destination ports➢    ICMP messa ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 8 ]CHAPTER THREE3.0    METHODOLOGY3.1    BACKGROUND OF ELLIPTIC CURVE CRYPROGRAPHYElliptic curve cryptography provides a methodology for obtaining high-speed, efficient, and scalable implementations of network security protocols. The security of these protocols depends on the difficulty of computing elliptic curve discrete logarithm in the elliptic curve group.The group operations utilize the arithmetic of points which are elements of the set of solutions of an elliptic curve equation d ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 10 ]Step 3: verifying the signatureAt this stage the program try to verify the signature weather it’s correct or not. It will display VALID or INVALID to ascertain the validity.Result:The result above what gotten using Secp256kr1 algorithm as shown above, the private and public key was gotten based on previous work inculcated into the database for the key generation and FRANCIS was used as the message string in other to get a signature value. ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVESUMMARY, CONCLUSION, AND RECOMMENDATIONElliptic Curve Digital Signature Algorithm (ECDSA) which is one of the variants of Elliptic Curve Cryptography (ECC) proposed as an alternative to established public key systems such as Digital Signature Algorithm (DSA) and Rivest Shamir Adleman (RSA), have recently gained a lot of attention in industry and academia.The main reason for the attractiveness of ECDSA is the fact that there is no sub exponential algorith known to solve the elliptic c ... Continue reading---