Abstract
This paper try to introduce the advantages and disadvantages of the Elliptical Curve Digital Signature Algorithm that could be put in consideration for future usage through applications and future scalability depending on improvement levels of elliptical curve Digital Signature Algorithm starting from The elliptical Curve Cryptography that it was extracted from till showing, elliptical curve Digital Signature Algorithm's security power, performance quality, memory usage rate, applications, challenges, and last improvement. To help in the future in evading some problems like forgery, worse usage of memory because of big sized keys that cause the need for high processing power that reduces the performance quality, and considering it as a level in a new algorithm to reduce the tries of attacking and hacking specific messages between specific parties, after explaining the Elliptical Curve Cryptography and how the scientists reached from the Elliptical Curve Cryptography to the Elliptical Curve Digital Signature Algorithm and why they developed Elliptical Curve Digital Signature Algorithm, the paper will explain its advantages and disadvantages of the Elliptical Curve Digital Signature Algorithm, then the paper will explain what is the differences happen in a new type of the Elliptical Curve Digital Signature Algorithm called Multiple Elliptical Curve Digital Signature Algorithm, trying to show what is the improvement stages was happened in the Elliptical Curve Digital Signature Algorithm, how that affected the nowadays applications, and how that participated in improving the security performance and increasing the security strength, there fore what was included in the paper could be used as a nucleus for more and more improving of the Elliptical Curve Digital Signature Algorithm, and evading its defects.
Highlights
An elliptical curve is represented by the form y2 = p(x), where p(x) is a mix of cubic parameters and polynomial with different roots. elliptical curve appeared for the first time in the second century after date of birth
In the late 1990s,ANSI, IEEE, ISO, NIST are examples of where ECC was standardized[ 5,6,7,8,9,10], it began to receive commercial conformance. It is prevailed, as it is being used in different fields such as wireless networks fields, and mobile networks fields.it is a direction that old public-key cryptography rules are gradually replaced with ECC rules
Bailey in Sep'2000 with Paar[11] produced mathematical infinite or prime field extensions with implementation in ECC. there many of researches that depend on the elliptical curve Digital Signature Algorithm as MECDSA that try to decrease the size of the signature and avoid secp256k1 [14], The relative to standards implicate requirements that break the least requirement for PDF signatures
Summary
In the late 1990s,ANSI, IEEE, ISO, NIST are examples of where ECC was standardized[ 5,6,7,8,9,10], it began to receive commercial conformance Today, it is prevailed, as it is being used in different fields such as wireless networks fields, and mobile networks fields.it is a direction that old public-key cryptography rules are gradually replaced with ECC rules. There many of researches that depend on the elliptical curve Digital Signature Algorithm as MECDSA that try to decrease the size of the signature and avoid secp256k1 [14], The relative to standards implicate requirements that break the least requirement for PDF signatures.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Innovative Technology and Exploring Engineering
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.