Modern elliptic curve cryptography

نویسنده

  • Ivo Kubjas
چکیده

Elliptic curve cryptography has raised attention as it allows for having shorter keys and ciphertexts. For example, to obtain similar security levels with 2048 bit RSA key, it is necessary to use only 256 bit keys using over elliptic curve cryptography. Additionally, developments in the index calculus method for solving a discrete logarithm problem increases the sizes of the keys to keep the security requirements. However, these methods do not apply to points on the elliptic curves, allowing better estimations for security levels over longer period of time. Up to now, only a small family of elliptic curves have been widely used for cryptographic purposes. However, as the construction of these curves have been lead by large intelligence agencies, skepticism has been rising against using these families for different purposes as the may contain unknown backdoors. These concerns can be understood as getting arithmetic right on these families is difficult and developer can add security bugs inadvertently. In this report we study different elliptic curve formulas, concentrating on Edward curve. Furthermore, we study the feasibility of implementing such curves on embedded hardware devices and discuss optimization methods for obtaining reasonable performance rates.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

An Elliptic Curve Cryptography approach for Digital Signature in PDA devices

1. ABSTRACT-The problem undertaken for this paper is “An Elliptic Curve Cryptography approach for Digital Signature in PDA devices”. Digital transaction have become common place and in some cases inextricably linked to modern life. This technological dependency requires that information be unaltered and confidential. So in this paper, problem is to search a good secure technique, which ensures ...

متن کامل

Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem

The Diffie-Hellman problem as a cryptographic primitive plays an important role in modern cryptology. The Bit Security or Hard-Core Bits of Diffie-Hellman problem in arbitrary finite cyclic group is a long-standing open problem in cryptography. Until now, only few groups have been studied. Hyperelliptic curve cryptography is an alternative to elliptic curve cryptography. Due to the recent crypt...

متن کامل

Efficient Techniques for High-Speed Elliptic Curve Cryptography

In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report new speed records on modern x86-64 based processors. Our different implementations include elliptic curves using Jacobian coordinates, extended Twisted Edwards coordinates and the recently proposed Galbraith-Lin-Scott...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015