GOOD AND BAD USES OF ELLIPTIC CURVES IN CRYPTOGRAPHY

被引:3
|
作者
Koblitz, Neal [1 ]
机构
[1] Univ Washington, Dept Math, Seattle, WA 98195 USA
关键词
Public key cryptography; elliptic curve cryptography; discrete logarithm; digital signature; global elliptic curve; index calculus; canonical height; torsion group; uniform boundedness;
D O I
10.17323/1609-4514-2002-2-4-693-715
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In the first part of this article I describe the construction of cryptosystems using elliptic curves, discuss the Elliptic Curve Discrete Logarithm Problem (upon which the security of all elliptic curve cryptosystems rests), and survey the different types of elliptic curves that can be chosen for cryptographic applications. In the second part I describe three unsuccessful approaches to breaking various cryptosystems by means of liftings to global elliptic curves. I explain how the failure of these attacks is caused by fundamental properties of the global curves.
引用
收藏
页码:693 / 715
页数:23
相关论文
共 50 条
  • [1] Elliptic curves and cryptography
    Silverman, JH
    [J]. Public-Key Cryptography, 2005, 62 : 91 - 112
  • [2] Elliptic curves and cryptography
    Jurisic, A
    Menezes, AJ
    [J]. DR DOBBS JOURNAL, 1997, 22 (04): : 26 - +
  • [3] Study on elliptic curves in cryptography
    Eier, R.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2005, 122 (1-2): : 7 - 27
  • [4] Supersingular elliptic curves in cryptography
    Menezes, Alfred
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007, 2007, 4575 : 293 - 293
  • [5] Arithmatic of elliptic curves and use in cryptography
    Yerlikaya, Tarik
    Bulus, Ercan
    Bulus, Nusret
    [J]. 2006 IEEE 14TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS, VOLS 1 AND 2, 2006, : 273 - +
  • [6] CRYPTOGRAPHY BASED ON CURVES (ELLIPTIC AND HYPERELLIPTIC)
    Durcheva, Mariana
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2015, 7 (01): : 33 - 44
  • [7] USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY
    MILLER, VS
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 417 - 426
  • [8] Are they good? Are they bad? Uses of stereotypes
    Crowley, P
    [J]. FRENCH STUDIES, 2003, 57 (03) : 433 - 434
  • [9] Are they good? Are they bad? Uses of stereotypes
    Paissa, P
    [J]. STUDI FRANCESI, 2003, 47 (03) : 675 - 678
  • [10] The application of elliptic curves cryptography in embedded systems
    Wang, QX
    [J]. ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 527 - 530