Elliptic Curves and Cryptography

نویسندگان

  • WALTER MOREIRA
  • W. MOREIRA
چکیده

results in more than 30.000 hits, ranging from articles in mathematics and computer science to books and implementations and applications of the algorithms. There are a lot of different algorithms and also different ways to attack them, many of them involving a huge amount of theory. Moreover, the fact that still there is not an accepted standard on elliptic curve cryptography benefits the existence of a myriad of different implementations. Thus, the final destination of this work is to just introduce the necessary terms and definitions to understand a very concrete example of public key cryptography using elliptic curves. We also want to sketch some of the possible vulnerabilities and ways to break the system, which is in fact what motivates most of the research on the field. Naturally, there are a lot of important points that are not touched here, and the general tone of the exposition is somewhat colloquial. However, the information is enough to actually understand and execute successfully a real-world cryptographic example. The outline of the exposition is as follows. The first and second sections are the general introduction to elliptic curves over arbitrary fields. Most of the proofs are not done, but some of them are sketched. We are primarily concerned with introducing the group structure on the points of an elliptic curve. Section 3 presents some results in the particular case of a finite field, which is the case used in the practice. Section 4 shows some generalities about public key cryptography and then the particular case about using elliptic curves. Finally, the last session is an example of signature using a free and open source implementation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

Elliptic Curves and Cryptography

This paper begins by discussing the foundations of the study of elliptic curves and how a the points on an elliptic curve form an additive group. We then explore some of the interesting features of elliptic curves, including the fact that elliptic curves are complex tori. At the end we briefly discuss how elliptic curves can be used in cryptography.

متن کامل

Applications of Elliptic Curves in Cryptography

This paper will examine the role of elliptic curves in the field of cryptography. The applicability of an analogous discrete logarithm problem to elliptic curve groups provides a basis for the security of elliptic curves. Two cryptographic protocols which implement elliptic curves are examined as well as two popular methods to solve the elliptic curve discrete logarithm problem. Finally, a comp...

متن کامل

Application of Elliptic Curves Cryptography In Wireless Communications Security

This paper provides an overview of elliptic curves and their use in cryptography. The focus of the paper is on the performance advantages obtained in the wireless environments by using elliptic curve cryptography instead of traditional cryptosystems such as RSA. Specific applications to secure messaging and identity-based encryption are also discussed. keywords: elliptic curves, wireless, Digit...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005