Virtual Private Networks powered by Elliptic Curve Cryptography

نویسندگان

  • Eugen Petac
  • Tudor Udrescu
چکیده

Elliptic Curve Cryptography (ECC) is fast becoming a viable alternative to traditional public-key cryptosystems (RSA, DSA, DH). Although ECC algorithms have been available for quite some time, most of the work in this field has been theoretical in nature, with few actual implementations. This situation has changed because of two factors. One is that processing power itself is increasing and hackers have more resources available to them than ever before. Although 1024-bit RSA keys are the most commonly used keys today, employment of 2048-bit keys is becoming more and more widespread. With the current rate of development for the IT infrastructure and machines, 10.000-bit keys are going to be needed in order to maintain the same level of security. The increase in key size, makes it impracticable to integrate traditional public-key cryptosystems into mobile/wireless devices, which are typically limited in terms of computational power, memory or network connectivity. The alternative is to use encryption based on elliptic curves. One of the major advantages of ECC is that it offers equivalent security with RSA but uses smaller key sizes. For example, a 224-bit ECC key offers the same level of protection as a 2048-bit RSA key. This leads to increased performance in Internet communication because of faster computation times and less bandwidth being used[1]. Another reason is growing acceptance of ECC as an industry standard, which has been reflected in the work of the Internet Engineering Task Force (IETF). Elliptic Curve Cryptography can now be found in the RFCs for all the key Internet security protocols: SSL/TLS, IPSec, PKIX and S/MIME. This paper focuses on the support for ECC present in Secure Sockets Layer protocol, particularly in the OpenSSL toolkit.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

GSM Security

Mobile wireless networks are more vulnerable to unauthorised access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission of signals through open-air and the requirement of low power consumption by a mobile user. This paper focuses on the security techniques used within the GSM standard. First, current GSM security system vulner...

متن کامل

Implementation of Pseudo-Random Route-Driven ECDH Scheme for Heterogeneous Sensor Networks

Most of the research work has shown that homogeneous ad hoc networks have poor performance, connectivity and scalability. The feasibility of implementing Elliptic Curve Cryptography (ECC) in HSN is simulated in this approach. It utilizes Elliptic Curve Diffie-Hellman (ECDH) by using pseudo-random polynomial function to design an energy efficient key management scheme for HSN. The work implement...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006