Research Article

Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems

Algorithm 3

General digital signature procedure.
Input:  Sender:  Hash function , secret key of sender, message .
Output:  Signed message
(1)  Compute hash value of .
(2)  Compute by encrypting the hash digest
using the sender's secret key.
(3)  Send to receiver.
Input:  Receiver:  Hash function , public key of sender,
  received packet .
Output:  Proof that Message originates from sender.
(1)  Compute by decrypting the received signature using
   the public key of sender.
(2)  Compute hash value of received message .
(3)  if   then
    accept signature
(4)  else
    reject signature
(5)  end if