Analysis of Standard Elliptic Curves for the Implementation of Elliptic Curve Cryptography in Resource-Constrained E-commerce Applications

被引:0
|
作者
Shaikh, Javed R. [1 ]
Nenova, Maria [1 ]
Iliev, Georgi [1 ]
Valkova-Jarvis, Zlatka [1 ]
机构
[1] Tech Univ Sofia, Sofia, Bulgaria
关键词
E-commerce; ECC; ECDH; ECDSA; RSA; Safe Elliptic Curves;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the public key cryptography infrastructure of electronic commerce (E-commerce), use of the Rivest, Shamir, and Adleman (RSA) algorithm is very common. Due to the security requirements, the necessary key size of RSA is increasing exponentially. Because of this large key size, it is not convenient to use RSA in resource-constrained applications where computational speed, storage and bandwidth are limited. Elliptic Curve Cryptography (ECC) is the best alternative to the traditional RSA. ECC provides the same level of security as RSA but with reduced key size. The most important factor in the use of ECC is the selection of the correct elliptic curve. There are different types of elliptic curves suggested by various standards. The selection of the curve is dependent on various parameters, such as prime field size, the shape of the curve, etc. In this paper, sets of elliptic curves recommended by different standards for cryptography are selected, and the selected curves are analysed, focusing on the performance and security features. The performance of each curve is measured in terms of computation time. The analysis is performed by considering each curve for the implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm and the Elliptic Curve Digital Signature Algorithm (ECDSA). The comparative table of selected curves is arranged according to the computation time taken by each curve to perform various operations when used for the ECC algorithms
引用
下载
收藏
页码:532 / 535
页数:4
相关论文
共 26 条
  • [1] Elliptic Curve Cryptography on SET for E-Commerce
    Huang, Po-Hsian
    Deng, Der-Jiunn
    Lin, Whe-Dar
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (05): : 827 - 834
  • [2] Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce
    Shen, Guicheng
    Zheng, Xuefeng
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 288 - 291
  • [3] Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications
    Hoeller, Andrea
    Druml, Norbert
    Kreiner, Christian
    Steger, Christian
    Felicijan, Tomaz
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [4] An Optimized Point Multiplication Strategy in Elliptic Curve Cryptography for Resource-Constrained Devices
    Sabbry, Nawras H.
    Levina, Alla B.
    MATHEMATICS, 2024, 12 (06)
  • [5] Enhancing Security of One-Time Password using Elliptic Curve Cryptography with Biometrics for E-Commerce Applications
    Mahto, Dindayal
    Yadav, Dilip Kumar
    2015 THIRD INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT), 2015,
  • [6] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133
  • [7] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    Journal of Systems Architecture, 2022, 133
  • [8] Comparing AI Algorithms for Optimizing Elliptic Curve Cryptography Parameters in e-Commerce Integrations: A Pre-Quantum Analysis
    Tellez, Felipe
    Ortiz, Jorge
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 1539 - 1553
  • [9] Performance Analysis of Various Optimization Techniques for Elliptic Curve Cryptosystems on Resource-Constrained Devices
    Bhatta, Jagdish
    Pandey, Lok Prakash
    2015 9TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA), 2015,
  • [10] Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor
    Kieu-Do-Nguyen, Binh
    Pham-Quoc, Cuong
    Tran, Ngoc-Thinh
    Pham, Cong-Kha
    Hoang, Trong-Thuc
    IEEE ACCESS, 2023, 11 : 4879 - 4894