Enhancing elliptic curve digital signature algorithm (ECDSA) for the implementation of digitally signed emails (Record no. 37373)

000 -LEADER
fixed length control field 01995nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field ft8898
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251218094625.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251218b ||||| |||| 00| 0 eng d
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title engtag
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9 A43 G36 2025
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number .
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Gangoso, Mikaella Reign L.; Macaraig, Ma. Corazon C.
245 ## - TITLE STATEMENT
Title Enhancing elliptic curve digital signature algorithm (ECDSA) for the implementation of digitally signed emails
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture .
Name of producer, publisher, distributor, manufacturer .
Date of production, publication, distribution, manufacture, or copyright notice c2025
300 ## - PHYSICAL DESCRIPTION
Other physical details Undergraduate Thesis: (Bachelor of Science in Computer Science) - Pamantasan ng Lungsod ng Maynila, 2025
336 ## - CONTENT TYPE
Source text
Content type term text
Content type code text
337 ## - MEDIA TYPE
Source unmediated
Media type term unmediated
Media type code unmediated
338 ## - CARRIER TYPE
Source volume
Carrier type term volume
Carrier type code volume
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note ABSTRACT: This study focused on enhancing the Elliptic Curve Digital Signature Algorithm (ECDSA) to improve the security of digitally signed emails. Despite its benefits, ECDSA faced vulnerabilities with its key generation and signature generation phases such as weak elliptic parameters, susceptibility to private key leakage, and insecure hash functions. The study proposed a three-pronged strategy: Firstly, it recommended strengthening elliptic curve parameters using Elliptic Curve NIST P-256 / SEC256RI to combat brute force attacks. Secondly, it suggested replacing the random number generation for the k value with a deterministic nonce mechanism to mitigate private key leakage risks. This adjustment aimed to enhance the security framework of ECDSA, preventing unauthorized access. Thirdly, the study advocated implementing SHA-256 for hash functions to resist collision attacks, crucial for maintaining the integrity of digitally signed documents. Conducted in a simulated Python environment, the research demonstrated a robust approach to overcoming ECDSA’s weaknesses. By enhancing security measures, the study established a more reliable framework for protecting email communication.
526 ## - STUDY PROGRAM INFORMATION NOTE
Classification Filipiniana
655 ## - INDEX TERM--GENRE/FORM
Genre/form data or focus term academic writing
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type Thesis/Dissertation
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent Location Current Location Shelving location Date acquired Fund Source Total Checkouts Full call number Barcode Date last seen Price effective from Item type
          Filipiniana-Thesis PLM PLM Filipiniana Section 2025-10-20 donation   QA76.9 A43 G36 2025 FT8898 2025-12-18 2025-12-18 Thesis/Dissertation

© Copyright 2024 Phoenix Library Management System - Pinnacle Technologies, Inc. All Rights Reserved.