1. Introduction:
With the proliferation of the Internet and the increasing number of users around the world is increasing security concern among users. In contrast, security solutions evolve so that users can feel safe and secure Internet environment and to use them and their dealings over the network safe from penetration. One of these security solutions known as (PKI).
2. Public Key Infrastructure (PKI):
PKI used to store information transmitted over the Internet, integrity and confidentiality, and to document the parties concerned electronic transactions, which is an integrated system consisting of software, programmers and hardware. It aims to know the identity of dealers across the network and encrypt information so that others…show more content… It is more likely to be breakthroughs ,problem with all single key systems is secure key distribution. The public key encryption uses two keys in the encryption and decryption process, which is stronger and less likely to be breakthroughs, but it is slower than traditional encryption. As a result of these advantages and disadvantages it has become modern systems using both methods, where they use the traditional method of encryption and the exchange of a single secret key between the multicast parties carried out through the use of public key encryption method....[2]
4. Digital certificates:
It is a digital document containing the collection of information that leads to the verification of the identity of the person, organization or Web site and encrypts information contained on a server device over SSL(Secure Socket Layer) technology.[3]
4.1 encryption process of Digital…show more content… Introduction:
Elliptic Curve Cryptography (ECC) was discovered by Victor Miller (IBM) and Neil Koblitz in 1985 as an alternative mechanism for implementing public-key cryptography.
2. What is Elliptic Curve Cryptography (ECC):
Elliptical curve cryptography is a public key encryption technique supported elliptic curve theory that can be used to create quicker, smaller, and efficient cryptographic keys. Elliptical curve cryptography generates keys through the properties of the elliptic curve equation rather than the traditional method of generation as the product of very large prime numbers
3. some technical details about Elliptic Curve Cryptography
In the earliest form of public-key cryptosystem, the chosen group comprised the set of integers from 1 … p-1, where p was a large prime number, and the group operation was multiplication of two integers modulo p. In elliptic-curve cryptosystems, the chosen group elements are points on an elliptic curve. And, the group operation is addition of two points.
Key Generation
Key generation is an important part where we have to generate both public key and private key. The sender will be encrypting the message with receiver’s public key and the receiver will decrypt its private