-
Improving Network Security Using Elliptic Curve Cryptosystem
-
-
-
Step 3: verifying the signature
At this stage the program try to verify the signature weather it’s correct or not. It will display VALID or INVALID to ascertain the validity.Result:
The result above what gotten using Secp256kr1 algorithm as shown above, the private and public key was gotten based on previous work inculcated into the database for the key generation and FRANCIS was used as the message string in other to get a signature value.
-
-
-
ABSRACT - [ Total Page(s): 1 ]ABSTRACTSecuring a network wired or wireless for network administrator has been a big challenges for network administrators in the present day of Internet usage. This project presents ECDSA Cryptosystem as a solution to the problem been faced by network administrators and Engineers. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA) with the attractiveness that there is no sub exponential algorithm known to solve the ell ... Continue reading---
-
ABSRACT - [ Total Page(s): 1 ]ABSTRACTSecuring a network wired or wireless for network administrator has been a big challenges for network administrators in the present day of Internet usage. This project presents ECDSA Cryptosystem as a solution to the problem been faced by network administrators and Engineers. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA) with the attractiveness that there is no sub exponential algorithm known to solve the ell ... Continue reading---