Efficient elliptic curve cryptosystems

Authors

  • Kamal Darweesh Applied Mathematics Department, Palestine Technical University--Kadoorie, Tulkarm, Palestine
  • Mohammad Saleh Mathematics Department, Birzeit University, P.O. Box 14, Palestine
Abstract:

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation, which allow efficient implementations of ECC. In this paper, we improve efficient algorithm for exponentiation on elliptic curves defined over Fp in terms of affine coordinates. The algorithm computes directly from random points P and Q on an elliptic curve, without computing the intermediate points. Moreover, we apply the algorithm to exponentiation on elliptic curves with width-w Mutual Opposite Form (wMOF) and analyze their computational complexity. This algorithm can speed up the wMOF exponentiation of elliptic curves of size 160-bit about (21.7 %) as a result of its implementation with respect to affine coordinates.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Efficient Algorithms for Elliptic Curve Cryptosystems

Elliptic curves are the basis for a relative new class of public-key schemes. It is predicted that elliptic curves will replace many existing schemes in the near future. It is thus of great interest to develop algorithms which allow efficient implementations of elliptic curve crypto systems. This thesis deals with such algorithms. Efficient algorithms for elliptic curves can be classified into ...

full text

Elliptic Curve Cryptosystems

We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of a finite field. These elliptic curve cryptosystems may be more secure, because the analog of the discrete logarithm problem on elliptic curves is likely to be harder than the classical discrete logarithm problem, especially over GF(2"). We discuss the question of prim...

full text

Implementing Elliptic Curve Cryptosystems

In 1987 Neil Koblitz first suggested the use of Elliptic curves for Public Key Cryptosystems. This has triggered publications about ECC (Elliptic Curve Cryptography) in recent years as well as the appearance of first University textbooks about that topic. Some Mathematicians and Computer Scientists have focused their studies of Elliptic curves on efficiency and security of ECC. Questions arise ...

full text

Implementation of Elliptic Curve Cryptosystems

During the last few years, a considerable effort has been devoted to the development of reconfigurable computers, machines that are based on the close interoperation of traditional microprocessors and Field Programmable Gate Arrays (FPGAs). Several prototype machines of this type have been designed, and demonstrated significant speedups compared to conventional workstations for computationally ...

full text

Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems

A method is proposed that allows each individual party to an elliptic curve cryptosystem to quickly determine its own unique pair of finite field and Weierstraß equation, in such a way that the resulting pair provides adequate security. Although the choice of Weierstraß equations allowed by this proposal is limited, the number of possible finite fields is unlimited. The proposed method allows e...

full text

Miyaji : on Elliptic Curve Cryptosystems

From a practical point of view, a cryptosystem should require a small key size and less running time. For this purpose, we often select its definition field in such a way that the arithmetic can be implemented fast. But it often brings attacks which depend on the definition field. In this paper, we investigate the definition field F on which elliptic curve cryptosystems can be implemented fast,...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 9  issue 1

pages  161- 174

publication date 2018-08-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023