Elliptic Curves and Cryptography
نویسندگان
چکیده
results in more than 30.000 hits, ranging from articles in mathematics and computer science to books and implementations and applications of the algorithms. There are a lot of different algorithms and also different ways to attack them, many of them involving a huge amount of theory. Moreover, the fact that still there is not an accepted standard on elliptic curve cryptography benefits the existence of a myriad of different implementations. Thus, the final destination of this work is to just introduce the necessary terms and definitions to understand a very concrete example of public key cryptography using elliptic curves. We also want to sketch some of the possible vulnerabilities and ways to break the system, which is in fact what motivates most of the research on the field. Naturally, there are a lot of important points that are not touched here, and the general tone of the exposition is somewhat colloquial. However, the information is enough to actually understand and execute successfully a real-world cryptographic example. The outline of the exposition is as follows. The first and second sections are the general introduction to elliptic curves over arbitrary fields. Most of the proofs are not done, but some of them are sketched. We are primarily concerned with introducing the group structure on the points of an elliptic curve. Section 3 presents some results in the particular case of a finite field, which is the case used in the practice. Section 4 shows some generalities about public key cryptography and then the particular case about using elliptic curves. Finally, the last session is an example of signature using a free and open source implementation.
منابع مشابه
Efficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملElliptic Curves and Cryptography
This paper begins by discussing the foundations of the study of elliptic curves and how a the points on an elliptic curve form an additive group. We then explore some of the interesting features of elliptic curves, including the fact that elliptic curves are complex tori. At the end we briefly discuss how elliptic curves can be used in cryptography.
متن کاملApplications of Elliptic Curves in Cryptography
This paper will examine the role of elliptic curves in the field of cryptography. The applicability of an analogous discrete logarithm problem to elliptic curve groups provides a basis for the security of elliptic curves. Two cryptographic protocols which implement elliptic curves are examined as well as two popular methods to solve the elliptic curve discrete logarithm problem. Finally, a comp...
متن کاملApplication of Elliptic Curves Cryptography In Wireless Communications Security
This paper provides an overview of elliptic curves and their use in cryptography. The focus of the paper is on the performance advantages obtained in the wireless environments by using elliptic curve cryptography instead of traditional cryptosystems such as RSA. Specific applications to secure messaging and identity-based encryption are also discussed. keywords: elliptic curves, wireless, Digit...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کامل