Elliptic curve coding technique application for digital signature

An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# wit...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2016-11, Vol.9 (17), p.4242-4254
Hauptverfasser: Yildiz, Kazim, Buldu, Ali, Saritas, Hasan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 4254
container_issue 17
container_start_page 4242
container_title Security and communication networks
container_volume 9
creator Yildiz, Kazim
Buldu, Ali
Saritas, Hasan
description An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation (CNG) which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard (AES) technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright © 2016 John Wiley & Sons, Ltd. An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes message between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation that brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques.
doi_str_mv 10.1002/sec.1601
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1864577985</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4277510681</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3261-1116cedf3e7fbed8cce65b48d611aacadb2265bcb7b70430adada7a0e46e7fd3</originalsourceid><addsrcrecordid>eNp1kE9LAzEQxYMoWKvgR1jw4mVrZjdNtsdS6h8oeLD3kE1ma0q6WZNdpd_e1IqCIAMzw_Cbx-MRcg10ApQWdxH1BDiFEzKCWTnLKRTF6c8O7JxcxLillAMTbETmS-ds11ud6SG8Y6a9se0m61G_tvZtwEx1nbNa9da3WeNDZuzG9spl0W5a1Q8BL8lZo1zEq-85Juv75XrxmK-eH54W81Wuy4JDDgBco2lKFE2NptIa-bRmleEASmll6qJIB12LWlBWUmVSCUWR8fRhyjG5Pcp2wSdfsZc7GzU6p1r0Q5RQcTYVYlZNE3rzB936IbTJXKJYqiK1X0EdfIwBG9kFu1NhL4HKQ5QyRSkPUSY0P6If1uH-X06-LBdf_CeYC3We</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1848482484</pqid></control><display><type>article</type><title>Elliptic curve coding technique application for digital signature</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Yildiz, Kazim ; Buldu, Ali ; Saritas, Hasan</creator><creatorcontrib>Yildiz, Kazim ; Buldu, Ali ; Saritas, Hasan</creatorcontrib><description>An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation (CNG) which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard (AES) technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright © 2016 John Wiley &amp; Sons, Ltd. An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes message between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation that brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.1601</identifier><language>eng</language><publisher>London: Hindawi Limited</publisher><subject>Asymmetry ; Channels ; Coding ; Consoles ; cryptology ; digital signature ; elliptic curve coding ; Encryption ; Receiving ; Screens ; Security</subject><ispartof>Security and communication networks, 2016-11, Vol.9 (17), p.4242-4254</ispartof><rights>Copyright © 2016 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3261-1116cedf3e7fbed8cce65b48d611aacadb2265bcb7b70430adada7a0e46e7fd3</citedby><cites>FETCH-LOGICAL-c3261-1116cedf3e7fbed8cce65b48d611aacadb2265bcb7b70430adada7a0e46e7fd3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Yildiz, Kazim</creatorcontrib><creatorcontrib>Buldu, Ali</creatorcontrib><creatorcontrib>Saritas, Hasan</creatorcontrib><title>Elliptic curve coding technique application for digital signature</title><title>Security and communication networks</title><description>An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation (CNG) which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard (AES) technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright © 2016 John Wiley &amp; Sons, Ltd. An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes message between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation that brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques.</description><subject>Asymmetry</subject><subject>Channels</subject><subject>Coding</subject><subject>Consoles</subject><subject>cryptology</subject><subject>digital signature</subject><subject>elliptic curve coding</subject><subject>Encryption</subject><subject>Receiving</subject><subject>Screens</subject><subject>Security</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kE9LAzEQxYMoWKvgR1jw4mVrZjdNtsdS6h8oeLD3kE1ma0q6WZNdpd_e1IqCIAMzw_Cbx-MRcg10ApQWdxH1BDiFEzKCWTnLKRTF6c8O7JxcxLillAMTbETmS-ds11ud6SG8Y6a9se0m61G_tvZtwEx1nbNa9da3WeNDZuzG9spl0W5a1Q8BL8lZo1zEq-85Juv75XrxmK-eH54W81Wuy4JDDgBco2lKFE2NptIa-bRmleEASmll6qJIB12LWlBWUmVSCUWR8fRhyjG5Pcp2wSdfsZc7GzU6p1r0Q5RQcTYVYlZNE3rzB936IbTJXKJYqiK1X0EdfIwBG9kFu1NhL4HKQ5QyRSkPUSY0P6If1uH-X06-LBdf_CeYC3We</recordid><startdate>20161125</startdate><enddate>20161125</enddate><creator>Yildiz, Kazim</creator><creator>Buldu, Ali</creator><creator>Saritas, Hasan</creator><general>Hindawi Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20161125</creationdate><title>Elliptic curve coding technique application for digital signature</title><author>Yildiz, Kazim ; Buldu, Ali ; Saritas, Hasan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3261-1116cedf3e7fbed8cce65b48d611aacadb2265bcb7b70430adada7a0e46e7fd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Asymmetry</topic><topic>Channels</topic><topic>Coding</topic><topic>Consoles</topic><topic>cryptology</topic><topic>digital signature</topic><topic>elliptic curve coding</topic><topic>Encryption</topic><topic>Receiving</topic><topic>Screens</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yildiz, Kazim</creatorcontrib><creatorcontrib>Buldu, Ali</creatorcontrib><creatorcontrib>Saritas, Hasan</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yildiz, Kazim</au><au>Buldu, Ali</au><au>Saritas, Hasan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Elliptic curve coding technique application for digital signature</atitle><jtitle>Security and communication networks</jtitle><date>2016-11-25</date><risdate>2016</risdate><volume>9</volume><issue>17</issue><spage>4242</spage><epage>4254</epage><pages>4242-4254</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation (CNG) which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard (AES) technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright © 2016 John Wiley &amp; Sons, Ltd. An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in today's world. The application codes message between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation that brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques.</abstract><cop>London</cop><pub>Hindawi Limited</pub><doi>10.1002/sec.1601</doi><tpages>13</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2016-11, Vol.9 (17), p.4242-4254
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_miscellaneous_1864577985
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection
subjects Asymmetry
Channels
Coding
Consoles
cryptology
digital signature
elliptic curve coding
Encryption
Receiving
Screens
Security
title Elliptic curve coding technique application for digital signature
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T19%3A14%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Elliptic%20curve%20coding%20technique%20application%20for%20digital%20signature&rft.jtitle=Security%20and%20communication%20networks&rft.au=Yildiz,%20Kazim&rft.date=2016-11-25&rft.volume=9&rft.issue=17&rft.spage=4242&rft.epage=4254&rft.pages=4242-4254&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.1601&rft_dat=%3Cproquest_cross%3E4277510681%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1848482484&rft_id=info:pmid/&rfr_iscdi=true