• Improving Network Security Using Elliptic Curve Cryptosystem

  • CHAPTER FOUR -- [Total Page(s) 10]

    Page 1 of 10

    1 2 3 4 5    Next
    • CHAPTER FOUR
      4.0    IMPLEMENTATION
      This research was carried out using elliptic curve digital signature algorithm using Java to develop the program.
      4.1    SYSTEM HARDWARE REQUIREMENT
      Pentium 4 512M Ram
      260Hdd Window xp
      4.2    SYSTEM SOFTWARE REQUIREMENT
      Internet Explorer Java IDE
      4.3    IMPLEMENTATION PROCEDURE
      Step 1: Choose supported EC Curve name & generate pair key This step has three algorithm to select from which include: Secp256k1
      Secp256r1 Secp384r1
      After selecting the preferred algorithm, click generate EC key pair as shown below

      This will automatically generate the EC private key and the Ec public key. Result:
      The result above what gotten using Secp356r1 algorithm as shown above, the private and public key was gotten based on previous work inculcated into the database for the key generation.
      Step 2: Sign of message
      This step comprise of signature which could either be SHARwithECDSA or SHA256withECDSA.
      It also has the message string to be signed, at this stage you could input the preferred string name eg LAWANI,FRANCIS,ADETOMIWA, FELIX etc and click the sign message.


  • CHAPTER FOUR -- [Total Page(s) 10]

    Page 1 of 10

    1 2 3 4 5    Next
    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTSecuring a network wired or wireless for network administrator has been a big challenges for network administrators in the present day of Internet usage. This project presents ECDSA Cryptosystem as a solution to the problem been faced by network administrators and Engineers. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA) with the attractiveness that there is no sub exponential algorithm known to solve the ell ... Continue reading---

         

      TABLE OF CONTENTS - [ Total Page(s): 1 ]TABLE OF CONTENTTittle Page    Declaration    Certification    Dedication    Acknowledgements   Abstract    Tables of contents    Table of Content1.0    CHAPTER ONE (INTRODUCTION)1.1    BACKGROUND TO THE WORK    1.2    PROBLEM DEFINITION    1.3    PROJECT JUSTIFICATION    1.4    OBJECTIVES    2.0    CHAPTER TWO (LITERATURE REVIEW)2.1    NETWORK SECURITY    2.2    CHARACTERISTICS OF NETWORK SECURITY   2.3    MAIN THREATS TO NETWORK S ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]CHAPTER ONE1.0    INTRODUCTION1.1    BACKGROUND TO THE WORKThe fast development of the modern Internet technology and information technology cause the individual, enterprise, school and government department joining the Internet, Which cause more illegal users to attack and destroy the network by using the fake websites, fake mail, Trojan horse and backdoor virus at the same time. The target of the attacks and intrusion on the network are computers, so once the intruders succeed, it will c ... Continue reading---

         

      CHAPTER TWO - [ Total Page(s): 11 ]Simple packet filters selectively controls the flow of packets in/out of a network or between networks. Control is based and enforced through a series of rules. These rules are based on information stored in the IP and TCP/UDP/ICMP headers.Rule criteria can be based on the following characteristics of the IP packet:➢    Source and/or destination addresses➢    Protocol including TCP, UDP, ICMP, or all IP➢    TCP or UDP source and/or destination ports➢    ICMP messa ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 8 ]CHAPTER THREE3.0    METHODOLOGY3.1    BACKGROUND OF ELLIPTIC CURVE CRYPROGRAPHYElliptic curve cryptography provides a methodology for obtaining high-speed, efficient, and scalable implementations of network security protocols. The security of these protocols depends on the difficulty of computing elliptic curve discrete logarithm in the elliptic curve group.The group operations utilize the arithmetic of points which are elements of the set of solutions of an elliptic curve equation d ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVESUMMARY, CONCLUSION, AND RECOMMENDATIONElliptic Curve Digital Signature Algorithm (ECDSA) which is one of the variants of Elliptic Curve Cryptography (ECC) proposed as an alternative to established public key systems such as Digital Signature Algorithm (DSA) and Rivest Shamir Adleman (RSA), have recently gained a lot of attention in industry and academia.The main reason for the attractiveness of ECDSA is the fact that there is no sub exponential algorith known to solve the elliptic c ... Continue reading---