AN IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOSYSTEMS OVER F(2)155

被引:104
|
作者
AGNEW, GB [1 ]
MULLIN, RC [1 ]
VANSTONE, SA [1 ]
机构
[1] UNIV WATERLOO,DEPT COMBINATOR & OPTIMIZAT,WATERLOO N2L 3G1,ONTARIO,CANADA
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1109/49.223883
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Since the introduction of the concept of public key cryptography by Diffie and Hellman in 1976, the potential for the use of the discrete logarithm problem in public key cryptosystems has been recognized. ElGamal gave an explicit methodology for using this problem to implement a fully functional public key cryptosystem, including digital signatures. This methodolgy has been refined and incorporated with various protocols to meet a variety of applications, and one of its extensions forms the basis for a proposed U.S. digital signature standard. Although the discrete logarithm problem, as first employed by Diffie and Hellman in their public key exchange algorithm, referred explicitly to the problem of finding logarithms with respect to a primitive element in the multiplicative group of the field of integers modulo a prime p, this idea can be extended to arbitrary groups (with the difficulty of the problem apparently varying with the representation of the group). In this paper, we describe how these protocols can be efficiently implemented using the group of an elliptic curve over a finite field. In particular, we will discuss a new VLSI implementation of F2(155) and the performance of elliptic curve systems over this ground field.
引用
收藏
页码:804 / 813
页数:10
相关论文
共 50 条
  • [31] Secure and Compact Elliptic Curve Cryptosystems
    Jin, Yaoan
    Miyaji, Atsuko
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 639 - 650
  • [32] Cryptosystems based on elliptic curve pairing
    Okamoto, E
    Okamoto, T
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2005, 3558 : 13 - 23
  • [33] Elliptic Curve Cryptosystems and Scalar Multiplication
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (01): : 27 - 34
  • [34] Elliptic curve cryptosystems on smart cards
    Mohammed, E
    Emarah, A
    Ei-Shennawy, K
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 311 - 322
  • [35] Elliptic curve cryptosystems on smart cards
    Mohammed, E
    Emarah, AE
    Ei-Shennawy, K
    35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 213 - 222
  • [36] Faster attacks on elliptic curve cryptosystems
    Wiener, MJ
    Zuccherato, RJ
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 190 - 200
  • [37] A reconfigurable arithmetic logic unit for elliptic curve cryptosystems over GF(2m)
    Schmalisch, M
    Timmermann, D
    PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 831 - 834
  • [38] Implementation of power attack analysis in ML algorithm circuit with elliptic curve cryptosystems
    Han, Yu
    Zou, Xuecheng
    Liu, Zhenglin
    Dan, Yongping
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2009, 37 (02): : 21 - 24
  • [39] Evolutionary hardware architecture for division in elliptic curve cryptosystems over GF(2n)
    Jeon, JC
    Kim, KW
    Yoo, KY
    ADVANCES IN NATURAL COMPUTATION, PT 3, PROCEEDINGS, 2005, 3612 : 348 - 355
  • [40] A small and fast software implementation of elliptic curve cryptosystems over GF(p) on a 16-bit micro computer
    Hasegawa, T
    Nakajima, J
    Matsui, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) : 98 - 106