z-logo
open-access-imgOpen Access
An Approach for Security of Images over Elliptical Curve Cryptography and Digital Signature
Author(s) -
Dhanashree Toradmalle,
S Varsha,
Singh Kiran,
Kakade Omkar,
Panigrahy Krishnachandra
Publication year - 2016
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2016912203
Subject(s) - computer science , digital signature , computer security , signature (topology) , cryptography , elliptic curve digital signature algorithm , elliptic curve cryptography , public key cryptography , encryption , mathematics , hash function , geometry
Nowadays, the need of transferring data over a network has increased. Some of these data is confidential and requires to be transferred securely. The type of data can be a Text, Image or any other multimedia. It is essential to provide security to the data that one wants to share over a network. The goals of security are Confidentiality, Integrity and Authentication. Cryptography plays a major role in providing security to the data. Cryptography is the study of techniques for secure communication in the presence of third parties called adversaries. The most popular asymmetric cryptography techniques are RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). RSA is based on Factorization Problem and ECC is based on Elliptic Curve arithmetic and Discrete Logarithm Problem. ECC provides same level of security or comparatively better security with smaller key size (bit lengths) than traditional cryptosystems like RSA, thereby requiring less storage and processing time.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom