Research Article Open Access

CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS-SIMULATION USING NS2

S. Shivkumar1 and G. Umamaheswari2
  • 1 1Research Scholar, Anna University, Chennai, India
  • 2 Assistant Professor (Sr Grade), Department of Electronics and Communication Engineering, PSG College of Technology, Coimbatore, India

Abstract

A PKI (public key infrastructure) enables users of a basically unsecure public network to securely and privately exchange data through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. The two major digital signature algorithms are Elliptic Curve Digital Signature Algorithm (ECDSA) which is the elliptic curve analogue of the Digital Signature Algorithm (DSA) and RSA algorithm. The two algorithms are used for generating the certificates exchanged between computer systems. Elliptic curve based systems can give better security compared to RSA with less key size. This study compares the performance of ECC based signature schemes and RSA schemes using NS2 simulation. It is observed that ECC based certificate authority schemes gives better speed and security. Elliptic curve based schemes are the best for time and resource constrained wireless applications.

American Journal of Applied Sciences
Volume 11 No. 2, 2014, 171-179

DOI: https://doi.org/10.3844/ajassp.2014.171.179

Submitted On: 16 September 2013 Published On: 18 December 2013

How to Cite: Shivkumar, S. & Umamaheswari, G. (2014). CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS-SIMULATION USING NS2. American Journal of Applied Sciences, 11(2), 171-179. https://doi.org/10.3844/ajassp.2014.171.179

  • 3,464 Views
  • 3,756 Downloads
  • 4 Citations

Download

Keywords

  • Integer Factorization
  • Discrete Logarithm Problem
  • Elliptic Curve Cryptography
  • Digital Signature
  • ECDSA
  • Public Key Cryptosystem