AN IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOSYSTEMS OVER F(2)155

被引:104
|
作者
AGNEW, GB [1 ]
MULLIN, RC [1 ]
VANSTONE, SA [1 ]
机构
[1] UNIV WATERLOO,DEPT COMBINATOR & OPTIMIZAT,WATERLOO N2L 3G1,ONTARIO,CANADA
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1109/49.223883
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Since the introduction of the concept of public key cryptography by Diffie and Hellman in 1976, the potential for the use of the discrete logarithm problem in public key cryptosystems has been recognized. ElGamal gave an explicit methodology for using this problem to implement a fully functional public key cryptosystem, including digital signatures. This methodolgy has been refined and incorporated with various protocols to meet a variety of applications, and one of its extensions forms the basis for a proposed U.S. digital signature standard. Although the discrete logarithm problem, as first employed by Diffie and Hellman in their public key exchange algorithm, referred explicitly to the problem of finding logarithms with respect to a primitive element in the multiplicative group of the field of integers modulo a prime p, this idea can be extended to arbitrary groups (with the difficulty of the problem apparently varying with the representation of the group). In this paper, we describe how these protocols can be efficiently implemented using the group of an elliptic curve over a finite field. In particular, we will discuss a new VLSI implementation of F2(155) and the performance of elliptic curve systems over this ground field.
引用
收藏
页码:804 / 813
页数:10
相关论文
共 50 条
  • [1] Design and implementation of arithmetic processor F2(155) for elliptic curve cryptosystems
    Sutikno, Sarwono
    Effendi, Ronny
    Surya, Andy
    IEEE Asia-Pacific Conference on Circuits and Systems - Proceedings, 1998, : 647 - 650
  • [2] THE IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOSYSTEMS
    MENEZES, A
    VANSTONE, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 2 - 13
  • [3] ON THE IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOSYSTEMS
    BENDER, A
    CASTAGNOLI, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 186 - 192
  • [5] Implementation and Analysis of Elliptic Curve Cryptosystems over Polynomial basis and ONB
    Choi, Yong-Je
    Kim, Moo-Seop
    Lee, Hang-Rok
    Kim, Ho-Won
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 : 130 - 134
  • [6] Implementation of elliptic curve cryptosystems on a reconfigurable computer
    Nguyen, N
    Gaj, K
    Caliga, D
    El-Ghazawi, T
    2003 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2003, : 60 - 67
  • [7] Design and implementation of arithmetic processor F2155 for elliptic curve cryptosystems
    Sutikno, S
    Effendi, R
    Surya, A
    APCCAS '98 - IEEE ASIA-PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS: MICROELECTRONICS AND INTEGRATING SYSTEMS, 1998, : 647 - 650
  • [8] ELLIPTIC CURVE CRYPTOSYSTEMS
    KOBLITZ, N
    MATHEMATICS OF COMPUTATION, 1987, 48 (177) : 203 - 209
  • [9] Implementation of elliptic curve cryptosystems over GF(2n) in optimal normal basis on a reconfigurable computer
    Bajracharya, S
    Shu, C
    Gaj, K
    El-Ghazawi, T
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2004, 3203 : 1001 - 1005
  • [10] Key Generation in Elliptic Curve Cryptosystems over GF(2n)
    Lee, Tai-Chi
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, IMECS 2012, VOL I, 2012, : 326 - 331