Implementing Elliptic Curve Cryptography on Pc and Smart Card
نویسندگان
چکیده
Elliptic Curve Cryptography (ECC) is a relatively new branch of public key cryptography. Its main advantage is that it can provide the same level of security as RSA with significantly shorter keys, which is beneficial for a smart card based implementation. It is also important as a possible alternative of RSA. This paper presents the authors’ research concerning ECC and smart cards. The authors introduce their ECC prototype implementation that relies on Java Card technology and is capable of running on smart cards. Test results with various cards are attached. It is also analyzed in what extent algorithms with the complexity of ECC can be executed in smart card environment with limited resources.
منابع مشابه
Implementing an efficient elliptic curve cryptosystem over GF(p) on a smart card
Elliptic curve cryptosystems (eccs) are becoming more popular because of the reduced number of key bits required in comparison to other cryptosystems (for example, a 160 bit ecc has roughly the same security as 1024 bit rsa). Eccs are especially suited to smart cards because of the limited memory and computational power available on these devices. ∗Information Security Research Centre, Queensla...
متن کاملA Signing Message Architecture Development for Smart Card Chip Based on Open Sources
In this paper we present an architecture development to be used in smart card. The architecture is dedicated for digital signature and it is based in the use of the open hard and soft sources. The development of the digital signature is based on the elliptic curve digital signature algorithm (ECDSA) and uses an open source cryptographic library named Miracl. The hardware development of the arch...
متن کاملRobust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
In 2014, Yeh et al. proposed a robust smart card secured authentication scheme on SIP using elliptic curve cryptography to conquer many forms of attacks in previous protocols. Yeh et al. claimed that their proposed protocol is more efficient than Diffie-Hellman’s concept authentication protocols for SIP and performs secured mutual authentication, which can be implemented on different real netwo...
متن کاملCan Elliptic Curve Cryptography Be Trusted?
Many smart card, cell phone, Internet of Things (IoT) and Bitcoin businesses have already implemented elliptic curve cryptography (ECC), and for good reason. This asymmetric encryption and decryption method is shown by the US National Institute of Standards and Technology (NIST) and third-party studies to significantly outperform its biggest competitors, offering significantly shorter keys, low...
متن کاملResistance against Differential Power Analysis for Elliptic Curve Cryptosystems
Differential Power Analysis, first introduced by Kocher et al. in [14], is a powerful technique allowing to recover secret smart card information by monitoring power signals. In [14] a specific DPA attack against smart-cards running the DES algorithm was described. As few as 1000 encryptions were sufficient to recover the secret key. In this paper we generalize DPA attack to elliptic curve (EC)...
متن کامل