Elliptic curve coding technique application for digital signature
An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# wit...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2016-11, Vol.9 (17), p.4242-4254 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 4254 |
---|---|
container_issue | 17 |
container_start_page | 4242 |
container_title | Security and communication networks |
container_volume | 9 |
creator | Yildiz, Kazim Buldu, Ali Saritas, Hasan |
description | An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation (CNG) which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard (AES) technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright © 2016 John Wiley & Sons, Ltd.
An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes message between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation that brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. |
doi_str_mv | 10.1002/sec.1601 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1864577985</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4277510681</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3261-1116cedf3e7fbed8cce65b48d611aacadb2265bcb7b70430adada7a0e46e7fd3</originalsourceid><addsrcrecordid>eNp1kE9LAzEQxYMoWKvgR1jw4mVrZjdNtsdS6h8oeLD3kE1ma0q6WZNdpd_e1IqCIAMzw_Cbx-MRcg10ApQWdxH1BDiFEzKCWTnLKRTF6c8O7JxcxLillAMTbETmS-ds11ud6SG8Y6a9se0m61G_tvZtwEx1nbNa9da3WeNDZuzG9spl0W5a1Q8BL8lZo1zEq-85Juv75XrxmK-eH54W81Wuy4JDDgBco2lKFE2NptIa-bRmleEASmll6qJIB12LWlBWUmVSCUWR8fRhyjG5Pcp2wSdfsZc7GzU6p1r0Q5RQcTYVYlZNE3rzB936IbTJXKJYqiK1X0EdfIwBG9kFu1NhL4HKQ5QyRSkPUSY0P6If1uH-X06-LBdf_CeYC3We</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1848482484</pqid></control><display><type>article</type><title>Elliptic curve coding technique application for digital signature</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Yildiz, Kazim ; Buldu, Ali ; Saritas, Hasan</creator><creatorcontrib>Yildiz, Kazim ; Buldu, Ali ; Saritas, Hasan</creatorcontrib><description>An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation (CNG) which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard (AES) technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright © 2016 John Wiley & Sons, Ltd.
An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes message between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation that brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.1601</identifier><language>eng</language><publisher>London: Hindawi Limited</publisher><subject>Asymmetry ; Channels ; Coding ; Consoles ; cryptology ; digital signature ; elliptic curve coding ; Encryption ; Receiving ; Screens ; Security</subject><ispartof>Security and communication networks, 2016-11, Vol.9 (17), p.4242-4254</ispartof><rights>Copyright © 2016 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3261-1116cedf3e7fbed8cce65b48d611aacadb2265bcb7b70430adada7a0e46e7fd3</citedby><cites>FETCH-LOGICAL-c3261-1116cedf3e7fbed8cce65b48d611aacadb2265bcb7b70430adada7a0e46e7fd3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Yildiz, Kazim</creatorcontrib><creatorcontrib>Buldu, Ali</creatorcontrib><creatorcontrib>Saritas, Hasan</creatorcontrib><title>Elliptic curve coding technique application for digital signature</title><title>Security and communication networks</title><description>An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation (CNG) which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard (AES) technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright © 2016 John Wiley & Sons, Ltd.
An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes message between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation that brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques.</description><subject>Asymmetry</subject><subject>Channels</subject><subject>Coding</subject><subject>Consoles</subject><subject>cryptology</subject><subject>digital signature</subject><subject>elliptic curve coding</subject><subject>Encryption</subject><subject>Receiving</subject><subject>Screens</subject><subject>Security</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kE9LAzEQxYMoWKvgR1jw4mVrZjdNtsdS6h8oeLD3kE1ma0q6WZNdpd_e1IqCIAMzw_Cbx-MRcg10ApQWdxH1BDiFEzKCWTnLKRTF6c8O7JxcxLillAMTbETmS-ds11ud6SG8Y6a9se0m61G_tvZtwEx1nbNa9da3WeNDZuzG9spl0W5a1Q8BL8lZo1zEq-85Juv75XrxmK-eH54W81Wuy4JDDgBco2lKFE2NptIa-bRmleEASmll6qJIB12LWlBWUmVSCUWR8fRhyjG5Pcp2wSdfsZc7GzU6p1r0Q5RQcTYVYlZNE3rzB936IbTJXKJYqiK1X0EdfIwBG9kFu1NhL4HKQ5QyRSkPUSY0P6If1uH-X06-LBdf_CeYC3We</recordid><startdate>20161125</startdate><enddate>20161125</enddate><creator>Yildiz, Kazim</creator><creator>Buldu, Ali</creator><creator>Saritas, Hasan</creator><general>Hindawi Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20161125</creationdate><title>Elliptic curve coding technique application for digital signature</title><author>Yildiz, Kazim ; Buldu, Ali ; Saritas, Hasan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3261-1116cedf3e7fbed8cce65b48d611aacadb2265bcb7b70430adada7a0e46e7fd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Asymmetry</topic><topic>Channels</topic><topic>Coding</topic><topic>Consoles</topic><topic>cryptology</topic><topic>digital signature</topic><topic>elliptic curve coding</topic><topic>Encryption</topic><topic>Receiving</topic><topic>Screens</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yildiz, Kazim</creatorcontrib><creatorcontrib>Buldu, Ali</creatorcontrib><creatorcontrib>Saritas, Hasan</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yildiz, Kazim</au><au>Buldu, Ali</au><au>Saritas, Hasan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Elliptic curve coding technique application for digital signature</atitle><jtitle>Security and communication networks</jtitle><date>2016-11-25</date><risdate>2016</risdate><volume>9</volume><issue>17</issue><spage>4242</spage><epage>4254</epage><pages>4242-4254</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation (CNG) which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard (AES) technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright © 2016 John Wiley & Sons, Ltd.
An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes message between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation that brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques.</abstract><cop>London</cop><pub>Hindawi Limited</pub><doi>10.1002/sec.1601</doi><tpages>13</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2016-11, Vol.9 (17), p.4242-4254 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_miscellaneous_1864577985 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection |
subjects | Asymmetry Channels Coding Consoles cryptology digital signature elliptic curve coding Encryption Receiving Screens Security |
title | Elliptic curve coding technique application for digital signature |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T19%3A14%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Elliptic%20curve%20coding%20technique%20application%20for%20digital%20signature&rft.jtitle=Security%20and%20communication%20networks&rft.au=Yildiz,%20Kazim&rft.date=2016-11-25&rft.volume=9&rft.issue=17&rft.spage=4242&rft.epage=4254&rft.pages=4242-4254&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.1601&rft_dat=%3Cproquest_cross%3E4277510681%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1848482484&rft_id=info:pmid/&rfr_iscdi=true |