AN IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOSYSTEMS OVER F(2)155

被引:104
|
作者
AGNEW, GB [1 ]
MULLIN, RC [1 ]
VANSTONE, SA [1 ]
机构
[1] UNIV WATERLOO,DEPT COMBINATOR & OPTIMIZAT,WATERLOO N2L 3G1,ONTARIO,CANADA
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1109/49.223883
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Since the introduction of the concept of public key cryptography by Diffie and Hellman in 1976, the potential for the use of the discrete logarithm problem in public key cryptosystems has been recognized. ElGamal gave an explicit methodology for using this problem to implement a fully functional public key cryptosystem, including digital signatures. This methodolgy has been refined and incorporated with various protocols to meet a variety of applications, and one of its extensions forms the basis for a proposed U.S. digital signature standard. Although the discrete logarithm problem, as first employed by Diffie and Hellman in their public key exchange algorithm, referred explicitly to the problem of finding logarithms with respect to a primitive element in the multiplicative group of the field of integers modulo a prime p, this idea can be extended to arbitrary groups (with the difficulty of the problem apparently varying with the representation of the group). In this paper, we describe how these protocols can be efficiently implemented using the group of an elliptic curve over a finite field. In particular, we will discuss a new VLSI implementation of F2(155) and the performance of elliptic curve systems over this ground field.
引用
收藏
页码:804 / 813
页数:10
相关论文
共 50 条
  • [41] Over FP vs. over F2n and on Pentium vs. on Alpha in software implementation of hyperelliptic curve cryptosystems
    Sakai, Y
    Sakurai, K
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 82 - 101
  • [42] Some ways to secure elliptic curve cryptosystems
    Hedabou, Mustapha
    Beneteau, Lucien
    Pinel, Pierre
    ADVANCES IN APPLIED CLIFFORD ALGEBRAS, 2008, 18 (3-4) : 677 - 688
  • [43] Novel Precomputation Schemes for Elliptic Curve Cryptosystems
    Longa, Patrick
    Gebotys, Catherine
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 71 - 88
  • [44] Verifiable threshold cryptosystems based on elliptic curve
    Han, YL
    Yang, YY
    Sun, J
    Li, DL
    2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 334 - 337
  • [45] Exceptional procedure attack on elliptic curve cryptosystems
    Izu, T
    Takagi, T
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 224 - 239
  • [46] Differential fault attacks on elliptic curve cryptosystems
    Biehl, I
    Meyer, B
    Müller, V
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 131 - 146
  • [47] Some Ways to Secure Elliptic Curve Cryptosystems
    Mustapha Hedabou
    Lucien Bénéteau
    Pierre Pinel
    Advances in Applied Clifford Algebras, 2008, 18 : 677 - 688
  • [48] Voting protocol based on elliptic curve cryptosystems
    Liu, Shengli
    Yang, Bo
    Wang, Yumin
    Dianzi Kexue Xuekan/Journal of Electronics, 2000, 22 (01): : 84 - 89
  • [49] Multi-threading elliptic curve cryptosystems
    Kanniah, Uma S.
    Samsudin, Azman
    ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 134 - 139
  • [50] Parallel scalar multiplication for elliptic curve cryptosystems
    Ansari, B
    Wu, HP
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 71 - 73