Evaluation of Security Level of Cryptography HDEF - ECDH

نویسندگان

  • Dan Boneh
  • Phillip Rogaway
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Curve41417: Karatsuba Revisited

This paper introduces constant-time ARM Cortex-A8 ECDH software that (1) is faster than the fastest ECDH option in the latest version of OpenSSL but (2) achieves a security level above 2 using a prime above 2. For comparison, this OpenSSL ECDH option is not constant-time and has a security level of only 2. The new speeds are achieved in a quite different way from typical prime-field ECC softwar...

متن کامل

On Energy Efficiency of Elliptic Curve Cryptography for Wireless Sensor Networks

Energy efficiency is a primary concern in Wireless Sensor Networks (WSN). This is due to the fact that WSNs are powered battery, and hence the life of WSNs becomes limited by the battery life. Efforts to replace depleted batteries are not feasible if WSNs are often deployed with thousands of sensor nodes, possibly in inaccessible, hostile, hazardous, or remote territories. Though WSNs are energ...

متن کامل

Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze

Compared to other public key cryptography counterparts like Diffie-Hellman (DH) and Rivest Shamir Adleman (RSA), Elliptic Curve Cryptography (ECC) is known to provide equivalent level of security with lower number of bits used. Reduced bit usage implies less power and logic area are required to implement this cryptographic scheme. This is particularly important in wireless networks, where a hig...

متن کامل

Efficient modified elliptic curve diffie-hellman algorithm for VoIP networks

Security in Voice over Internet Protocol (VoIP) network has turned to be the most challenging issue in recent years. VoIP packets are easy to eavesdrop on by hackers due to the use of Diffie-Hellman (DH) algorithm for single common key exchange between two end-users. As a result the confidentiality of voice data turns to be a challenging issue. There is a need for strong key management algorith...

متن کامل

Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Elliptic Curve Diffie-Hellman (E...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001