Elliptic Curves and their use in Cryptography
نویسنده
چکیده
The security of many cryptographic protocols depends on the diiculty of solving the so-called \discrete logarithm" problem, in the multiplica-tive group of a nite eld. Although, in the general case, there are no polynomial time algorithms for this problem, constant improvements are being made { with the result that the use of these protocols require much larger key sizes, for a given level of security, than may be convenient. An abstraction of these protocols shows that they have analogues in any group. The challenge presents itself: nd some other groups for which there are no good attacks on the discrete logarithm, and for which the group operations are suuciently economical. In 1985, the author suggested that the groups arising from a particular mathematical object known as an \elliptic curve" might ll the bill. In this paper I review the general cryptographic protocols which are involved, brieey describe el-liptic curves and review the possible attacks against such cryptosystems. Finally, I mention other applications that elliptic curves have had upon the analysis of other cryptosystems not involving them.
منابع مشابه
Efficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملApplication of Elliptic Curves Cryptography In Wireless Communications Security
This paper provides an overview of elliptic curves and their use in cryptography. The focus of the paper is on the performance advantages obtained in the wireless environments by using elliptic curve cryptography instead of traditional cryptosystems such as RSA. Specific applications to secure messaging and identity-based encryption are also discussed. keywords: elliptic curves, wireless, Digit...
متن کاملApplications of Elliptic Curves in Cryptography
This paper will examine the role of elliptic curves in the field of cryptography. The applicability of an analogous discrete logarithm problem to elliptic curve groups provides a basis for the security of elliptic curves. Two cryptographic protocols which implement elliptic curves are examined as well as two popular methods to solve the elliptic curve discrete logarithm problem. Finally, a comp...
متن کاملHyperelliptic Curve Cryptography
The use of elliptic-curve groups in cryptography, suggested by Miller [1] and Koblitz [2] three decades ago,provides the same level of security for the Discrete Logarithm Problem as multiplicative groups, with much smallerkey sizes and parameters. The idea was refined two years later by Koblitz, who worked with the group formed bythe points of the Jacobian of hyperelliptic curve...
متن کاملAttacks on Elliptic Curve Cryptography Discrete Logarithm Problem ( EC - DLP )
This paper provides an overview of elliptic curves and their use in cryptography. The purpose of this paper is an in-depth examination of the Elliptic Curve Discrete Logarithm (ECDLP) including techniques in attacking cryptosystems dependent on the ECDLP. The paper includes properties of elliptic curve and methods for various attacks.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997