Implementing Network Security Protocols based on Elliptic Curve Cryptography
نویسندگان
چکیده
Elliptic curve cryptography provides a methodology for obtaining high-speed, efficient, and scalable implementations of network security protocols. In this paper, we describe in detail three protocols based on elliptic curve cryptographic techniques, and the results of our implementation of the elliptic curve cryptography over the Galois field GF (2k), where k is a composite number. 1 Elliptic Curve Cryptography Elliptic curve cryptography [9, 5, 8, 6] provides a methodology for obtaining high-speed, efficient, and scalable implementations of network security protocols. The security of these protocols depends on the difficulty of computing elliptic curve discrete logarithm in the elliptic curve group. The group operations utilize the arithmetic of points which are elements of the set of solutions of an elliptic curve equation defined over a finite field. The arithmetic of elliptic curve operations depend on the arithmetic on the underlying finite field. The standards suggest the use of GF (p) and GF (2). Below, we define the nomenclature and then provide a general overview of security protocols based on elliptic curve cryptography. • Scalar: An element belonging to either one of the fields GF (p) or GF (2) is called a scalar. Scalars are named with lowercase letters: r, s, t, etc. • Scalar Addition: Two or more scalar can be added to obtain another scalar. In the GF (p) case, this is the ordinary integer addition modulo p. When GF (2) is used, this is equivalent to polynomial addition modulo an irreducible polynomial of degree k, generating the field GF (2). We will denote the scalar addition of r and s giving the result e by e = r + s. ∗This research was supported in part by Secured Information Technology, Inc. †Proceedings of the Fourth Symposium on Computer Networks, S. Oktuǧ, B. Örencik, and E. Harmancı, editors, pages 130–139, Istanbul, Turkey, May 20-21, 1999.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملTitle: Eecient Wireless Security Protocols Based on Elliptic Curve Cryptography All Rights Reserved Eecient Wireless Security Protocols Based on Elliptic Curve Cryptography
approved: C etin K. Ko c In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increased security with smaller key size which brings the advantage of less storage area and less bandwidth. Elliptic curve cryptography provides a methodology for obtaining high-speed, e cient, and scalable implementations of network security protocols. In addition low power co...
متن کاملDiffie-Hellman type key exchange protocols based on isogenies
In this paper, we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves. The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $, is a straightforward generalization of elliptic curve Diffie-Hellman key exchange. The method uses commutativity of the endomorphism ring $ End(E) $. Then using dual isogenies, we propose...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کامل