Elliptic curve cryptographic systems
نویسنده
چکیده
Remark 3 To resist generic attacks on the discrete logarithm problem, elliptic curve cryptosystems are implemented in the prime order cyclic subgroup of maximal cardinality n inside E(Fq). For representing group elements with the minimum number of bits, it is desirable that the curve order itself be prime. Except for special cases (see Section 1.3 and [59, 61, 65]), only generic attacks are known on the elliptic curve discrete logarithm problem (ECDLP), with a running time on the order of √ n. A security level of m bits, corresponding to a symmetric-key cryptosystem with 2m keys, thus requires an order n of 2m bits. Extrapolating the theoretical subexponential complexity for factoring or the DLP in finite fields allows to derive heuristic security estimates for the corresponding public key cryptosystems. Several studies have been carried out in the literature, taking added heuristics on technological progress into account, see [36]. They are summarized in the following table; the figures for the factorization based RSA system essentially
منابع مشابه
GF(2) Elliptic Curve Cryptographic Processor Architecture Based On Bit Level Pipelined Digit Serial Multiplication
New processor architecture for elliptic curve encryption is proposed in this paper. The architecture exploits projective coordinates to convert GF(2) division needed in elliptic point operations into several multiplication steps. The processor has three GF(2) multipliers implemented using bit-level pipelined digit serial computation. It is shown that this results in a faster operation than usin...
متن کاملImplementation of Fault Attacks on Elliptic Curve Cryptosystems
The main motivation behind Elliptic Curve Cryptography is to find a Public Key Family which provides the same level of security as Discrete Log Systems or RSA but with shorter operands. Through Fault Attacks, the adversary disturbs the computation of Cryptographic device to obtain information about Secret Key. This paper uses Elliptic Curve Point Multiplication Algorithm based on a binary seque...
متن کاملHigh radix parallel architecture for GF(p) elliptic curve processor
A new GF(p) cryptographic processor architecture for elliptic curve encryption/decryption is proposed in this paper. The architecture takes advantage of projective coordinates to convert GF(p) inversion needed in elliptic point operations into several multiplication steps. Unlike existing sequential designs, we show that projecting into (X/Z,Y/Z) leads to a much better improved performance than...
متن کاملECE 842 Report Implementation of Elliptic Curve Cryptography
The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic system. Before doing the implementation, I will review group operation defined on elliptic curve over finite field. From that perspective, the efficiency of elliptic curve cryptographic system can be improved in two steps. The first step is to find a good representation of field element s...
متن کاملAn Elliptic Curve Cryptography based Authentication and Key Agreement Protocol for Wireless Communication
We propose an authentication and key agreement protocol for wireless communication based on elliptic curve cryptographic techniques. The proposed protocol requires signi cantly less bandwidth than the Aziz-Di e and Beller-Chang-Yacobi protocols, and furthermore, it has lower computational burden and storage requirements on the user side. The use of elliptic curve cryptographic techniques provid...
متن کاملCryptography By Karatsuba Multiplier with ASCII Codes
In this paper we describe Cryptography by using Karatsuba multipliers and ASCII codes implementing through coordinate geometry for data encryption and decryption with its code in matlab. Elliptic curve cryptography is an asymmetric key cryptography. It includes (i) public key generation on the elliptic curve and its declaration for data encryption and (ii) private key generation and its use in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013