Research Article
Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems
Algorithm 3
General digital signature procedure.
Input: Sender: Hash function , secret key of sender, message . | Output: Signed message | (1) Compute hash value of . | (2) Compute by encrypting the hash digest | using the sender's secret key. | (3) Send to receiver. | Input: Receiver: Hash function , public key of sender, | received packet . | Output: Proof that Message originates from sender. | (1) Compute by decrypting the received signature using | the public key of sender. | (2) Compute hash value of received message . | (3) if then | accept signature | (4) else | reject signature | (5) end if |
|