ABSTRACT
In this research Elliptic Curve ElGamal (ECEG) cryptosystems was studied. The ElGamal signature algorithm is similar to the encryption algorithm in that the public-key and private-key have the same form; however, encryption is not the same as signature verification, nor is decryption the same as signature creation as in RSA. The DSA is based in part on the ElGamal signature algorithm.
PDF References Citation
How to cite this article
Kefa Rabah, 2005. Elliptic Curve ElGamal Encryption and Signature Schemes. Information Technology Journal, 4: 299-306.
DOI: 10.3923/itj.2005.299.306
URL: https://scialert.net/abstract/?doi=itj.2005.299.306
DOI: 10.3923/itj.2005.299.306
URL: https://scialert.net/abstract/?doi=itj.2005.299.306
REFERENCES
- Rabah, K., 2004. Data security and cryptographic techniques: A review. Inform. Technol. J., 3: 106-132.
CrossRefDirect Link - Rivest, R.L., A. Shamir and L. Adleman, 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM., 21: 120-126.
CrossRefDirect Link - Elgamal, T., 1985. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 31: 469-472.
Direct Link - Rabah, K., 2005. Theory and implementation of elliptic curve cryptography. J. Applied Sci., 5: 604-633.
CrossRefDirect Link - Pohlig, S. and M. Hellman, 1978. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory, 24: 106-110.
CrossRefDirect Link - Diffie, W., P.V. Oorschot and M. Wiener, 1992. Authentication and authenticated key exchanges. Des. Codes Cryptogr., 2: 107-125.
Direct Link - Rabah, K., 2004. Steganography-the art of hiding data. Inform. Technol. J., 3: 245-269.
CrossRefDirect Link