| 000 -LEADER |
| fixed length control field |
01995nam a22002417a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
ft8898 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20251218094625.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
251218b ||||| |||| 00| 0 eng d |
| 041 ## - LANGUAGE CODE |
| Language code of text/sound track or separate title |
engtag |
| 050 ## - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9 A43 G36 2025 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
. |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Gangoso, Mikaella Reign L.; Macaraig, Ma. Corazon C. |
| 245 ## - TITLE STATEMENT |
| Title |
Enhancing elliptic curve digital signature algorithm (ECDSA) for the implementation of digitally signed emails |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
. |
| Name of producer, publisher, distributor, manufacturer |
. |
| Date of production, publication, distribution, manufacture, or copyright notice |
c2025 |
| 300 ## - PHYSICAL DESCRIPTION |
| Other physical details |
Undergraduate Thesis: (Bachelor of Science in Computer Science) - Pamantasan ng Lungsod ng Maynila, 2025 |
| 336 ## - CONTENT TYPE |
| Source |
text |
| Content type term |
text |
| Content type code |
text |
| 337 ## - MEDIA TYPE |
| Source |
unmediated |
| Media type term |
unmediated |
| Media type code |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
volume |
| Carrier type term |
volume |
| Carrier type code |
volume |
| 505 ## - FORMATTED CONTENTS NOTE |
| Formatted contents note |
ABSTRACT: This study focused on enhancing the Elliptic Curve Digital Signature Algorithm (ECDSA) to improve the security of digitally signed emails. Despite its benefits, ECDSA faced vulnerabilities with its key generation and signature generation phases such as weak elliptic parameters, susceptibility to private key leakage, and insecure hash functions. The study proposed a three-pronged strategy: Firstly, it recommended strengthening elliptic curve parameters using Elliptic Curve NIST P-256 / SEC256RI to combat brute force attacks. Secondly, it suggested replacing the random number generation for the k value with a deterministic nonce mechanism to mitigate private key leakage risks. This adjustment aimed to enhance the security framework of ECDSA, preventing unauthorized access. Thirdly, the study advocated implementing SHA-256 for hash functions to resist collision attacks, crucial for maintaining the integrity of digitally signed documents. Conducted in a simulated Python environment, the research demonstrated a robust approach to overcoming ECDSA’s weaknesses. By enhancing security measures, the study established a more reliable framework for protecting email communication. |
| 526 ## - STUDY PROGRAM INFORMATION NOTE |
| Classification |
Filipiniana |
| 655 ## - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
academic writing |
| 942 ## - ADDED ENTRY ELEMENTS |
| Source of classification or shelving scheme |
|
| Item type |
Thesis/Dissertation |