Research Article
Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems
Algorithm 3
General digital signature procedure.
| Input: Sender: Hash function , secret key of sender, message . | | Output: Signed message | | (1) Compute hash value of . | | (2) Compute by encrypting the hash digest | | using the sender's secret key. | | (3) Send to receiver. | | Input: Receiver: Hash function , public key of sender, | | received packet . | | Output: Proof that Message originates from sender. | | (1) Compute by decrypting the received signature using | | the public key of sender. | | (2) Compute hash value of received message . | | (3) if then | | accept signature | | (4) else | | reject signature | | (5) end if |
|