• Improving Network Security Using Elliptic Curve Cryptosystem

  • CHAPTER THREE -- [Total Page(s) 8]

    Page 4 of 8

    Previous   1 2 3 4 5 6 7 8    Next
    • Advantages of ECC
      Thus, the ECC offered remarkable advantages over other cryptographic system.
      ➢    It provides greater security for a given key size.
      ➢    It provides effective and compact implementations for cryptographic operations requiring smaller chips.
      ➢    Due to smaller chips less heat generation and less power consumption.
      ➢    It is mostly suitable for machines having low bandwidth, low computing power, less memory.
      ➢    It has easier hardware implementations
      ➢    So far no drawback of ECC had been reported
      2. Diffie–Hellman key exchange (D–H)
      Is a specific method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as originally conceptualized by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.D–H is one of the earliest practical examples of public key exchange implemented within the field of cryptography.
      Traditionally, secure encrypted communication between two parties required that they first exchange keys by some secure physical channel, such as paper key lists transported by a trusted courier. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.
      Diffie–Hellman is used to secure a variety of Internet services. However, research published in October 2015 suggests that the parameters in use for many D–H Internet applications at that time are not strong enough to prevent compromise by very well-funded attackers, such as the security services of large governments.
      The scheme was first published by Whitfield Diffie and Martin Hellman in 1976, but in 1997 it was revealed that James H. Ellis,Clifford Cocks and Malcolm J. Williamson of GCHQ, the British signals intelligence agency, had previously shown how public-key cryptography could be achieved.
      Although Diffie–Hellman key agreement itself is a non-authenticated key-agreement protocol, it provides the basis for a variety of authenticated protocols, and is used to provideforward secrecy in Transport Layer Security's ephemeral modes (referred to as EDH or DHE depending on the cipher suite).The method was followed shortly afterwards by RSA, an implementation of public-key cryptography using asymmetric algorithms. U.S. Patent 4,200,770, from 1977, is now expired and describes the now-public domain algorithm. It credits Hellman, Diffie, and Merkle as inventors.
      Figure 5: OVERVIEW OF DIFFIE–HELLMAN



  • CHAPTER THREE -- [Total Page(s) 8]

    Page 4 of 8

    Previous   1 2 3 4 5 6 7 8    Next
    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTSecuring a network wired or wireless for network administrator has been a big challenges for network administrators in the present day of Internet usage. This project presents ECDSA Cryptosystem as a solution to the problem been faced by network administrators and Engineers. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA) with the attractiveness that there is no sub exponential algorithm known to solve the ell ... Continue reading---

         

      TABLE OF CONTENTS - [ Total Page(s): 1 ]TABLE OF CONTENTTittle Page    Declaration    Certification    Dedication    Acknowledgements   Abstract    Tables of contents    Table of Content1.0    CHAPTER ONE (INTRODUCTION)1.1    BACKGROUND TO THE WORK    1.2    PROBLEM DEFINITION    1.3    PROJECT JUSTIFICATION    1.4    OBJECTIVES    2.0    CHAPTER TWO (LITERATURE REVIEW)2.1    NETWORK SECURITY    2.2    CHARACTERISTICS OF NETWORK SECURITY   2.3    MAIN THREATS TO NETWORK S ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]CHAPTER ONE1.0    INTRODUCTION1.1    BACKGROUND TO THE WORKThe fast development of the modern Internet technology and information technology cause the individual, enterprise, school and government department joining the Internet, Which cause more illegal users to attack and destroy the network by using the fake websites, fake mail, Trojan horse and backdoor virus at the same time. The target of the attacks and intrusion on the network are computers, so once the intruders succeed, it will c ... Continue reading---

         

      CHAPTER TWO - [ Total Page(s): 11 ]Simple packet filters selectively controls the flow of packets in/out of a network or between networks. Control is based and enforced through a series of rules. These rules are based on information stored in the IP and TCP/UDP/ICMP headers.Rule criteria can be based on the following characteristics of the IP packet:➢    Source and/or destination addresses➢    Protocol including TCP, UDP, ICMP, or all IP➢    TCP or UDP source and/or destination ports➢    ICMP messa ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 10 ]Step 3: verifying the signatureAt this stage the program try to verify the signature weather it’s correct or not. It will display VALID or INVALID to ascertain the validity.Result:The result above what gotten using Secp256kr1 algorithm as shown above, the private and public key was gotten based on previous work inculcated into the database for the key generation and FRANCIS was used as the message string in other to get a signature value. ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVESUMMARY, CONCLUSION, AND RECOMMENDATIONElliptic Curve Digital Signature Algorithm (ECDSA) which is one of the variants of Elliptic Curve Cryptography (ECC) proposed as an alternative to established public key systems such as Digital Signature Algorithm (DSA) and Rivest Shamir Adleman (RSA), have recently gained a lot of attention in industry and academia.The main reason for the attractiveness of ECDSA is the fact that there is no sub exponential algorith known to solve the elliptic c ... Continue reading---