A Methodology for Elliptic Curve Cryptography-Based Digital Signature Scheme: A System with Enhanced Security

Authors

  • S. Senthil Kumar, K. Poongothai, M. K. Nivodhini, S. Nithyakalyani

Keywords:

Elliptic Curve Cryptography, Digital Signature Scheme, Encryption, Hypertext Transfer Protocol, Secured Socket Layer.

Abstract

To increment rural efficiency, accuracy horticulture incorporates robotization and the utilization of an assortment of IT devices. Here, shrewd contraptions accumulate an immense measure of information and speak with servers and different gadgets over open channels. Subsequently, a few attacks against shrewd cultivating are conceivable. These assaults can have unfavorable impacts since detected information is commonly handled to help assess the condition of horticultural fields and to support navigation. Regardless of the way that few security procedures have been proposed in the writing to resolve these issues, they are either ineffectual or powerless against interruptions. Understanding Diffie-Hellman key trade and utilizing elliptic bend highlights are the most important phases in the task. It finishes up with significant data about Elliptic Bend Cryptography, remembering its viability and productivity for little gadgets, more limited key length, transfer speed reserve funds, simplicity of key age during information encryption and decoding, and surefire quicker encryption and unscrambling.

Downloads

Download data is not yet available.

References

S. Komolov, Sh. Rakhmatov Fundamentals of Artificial Intelligence. Machine learning. Izhod NAShR Publishing House. p.104. Tashkent, Uzbekistan (2022)

V. Obuxov, Universum: technical sciences, (11-6 (116)), 55-56 (2023)

V.S. Miller, Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417-426). Berlin, Heidelberg: Springer Berlin Heidelberg (1985)

N. I. Koblitz, Moscow Mathematical Journal, 2(4), 693-715 (2002)

R. Afreen, S.C. Mehrotra, A review on elliptic curve cryptography for embedded systems. arXiv preprint arXiv:1107.3631. (2011).

O.N. Zhdanov, V. A. Chalkin, Elliptic Curves: Foundations of Theory and Cryptographic Applications. Moscow: LIBROCOM Book House, (2013).

T. Dostonbek, M. Jamshid, Central Asian Journal of Theoretical and Applied Science, 4(4), 93-98 (2023).

Z. Abdulkhaev, et.al.,AIP Conference Proceedings 2789, 1 (2023)

M. Madaliev, N. Qurbanova, X. Rustamova, Journal of Construction and Engineering Technology 1(1), 1-6 (2023)

Z.E. Abdulkhaev, et.al., E3S Web of Conferences 420, 07023 (2023).

Vangala, A.; Das, A.K.; Mitra, A.; Das, S.K.; Park, Y. Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks. IEEE Trans. Inf. Forensics Secur. 2022, 18, 904–919.

Shafi, U.; Mumtaz, R.; García-Nieto, J.; Hassan, S.A.; Zaidi, S.A.R.; Iqbal, N. Precision Agriculture Techniques and Practices: From Considerations to Applications. Sensors 2019, 19, 3796.

Shi, X.; An, X.; Zhao, Q.; Liu, H.; Xia, L.; Sun, X.; Guo, Y. State-of-the-Art Internet of Things in Protected Agriculture. Sensors 2019, 19, 1833.

Vangala, A.; Das, A.K.; Chamola, V.; Korotaev, V.; Rodrigues, J.J. Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges. Cluster Comput. 2022, 26, 879–902.

Bera, B.; Vangala, A.; Das, A.K.; Lorenz, P.; Khan, M.K. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Comput. Stand. Interfaces 2022.

Downloads

Published

26.03.2024

How to Cite

S. Senthil Kumar. (2024). A Methodology for Elliptic Curve Cryptography-Based Digital Signature Scheme: A System with Enhanced Security. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 4151 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6241

Issue

Section

Research Article