Efficient Ephemeral Elliptic Curve Cryptographic Keys

被引:3
|
作者
Miele, Andrea [1 ]
Lenstra, Arjen K. [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
来源
关键词
Elliptic curve cryptography; Complex multiplication method; ATTACKS; POLLARD; POINTS; TRACE;
D O I
10.1007/978-3-319-23318-5_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show how any pair of authenticated users can on-the-fly agree on an elliptic curve group that is unique to their communication session, unpredictable to outside observers, and secure against known attacks. Our proposal is suitable for deployment on constrained devices such as smartphones, allowing them to efficiently generate ephemeral parameters that are unique to any single cryptographic application such as symmetric key agreement. For such applications it thus offers an alternative to long term usage of standardized or otherwise pre-generated elliptic curve parameters, obtaining security against cryptographic attacks aimed at other users, and eliminating the need to trust elliptic curves generated by third parties.
引用
收藏
页码:524 / 547
页数:24
相关论文
共 50 条
  • [1] A Compact and Efficient Architecture for Elliptic Curve Cryptographic Processor
    Yi, Su-Wen
    Li, Wei
    Dai, Zi-Bin
    Liu, Lun-Wei
    [J]. 2016 13TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2016, : 1276 - 1280
  • [2] Efficient Algorithm and Architecture for Elliptic Curve Cryptographic Processor
    Tuy Tan Nguyen
    Lee, Hanho
    [J]. JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, 2016, 16 (01) : 118 - 125
  • [3] A Hardware Efficient Elliptic Curve Accelerator for FPGA Based Cryptographic Applications
    Kashif, Muhammad
    Cicek, Ihsan
    Imran, Malik
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ELECO 2019), 2019, : 362 - 366
  • [4] Elliptic curve cryptographic watermark technique
    Yang, J
    Liu, Q
    Tan, GZ
    Ming, HF
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON MULTISPECTRAL IMAGE PROCESSING AND PATTERN RECOGNITION, PTS 1 AND 2, 2003, 5286 : 155 - 158
  • [5] A Hardware-Efficient Elliptic Curve Cryptographic Architecture over GF (p)
    Cui, Chao
    Zhao, Yun
    Xiao, Yong
    Lin, Weibin
    Xu, Di
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [6] Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications
    Iyengar, Vinay S.
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 531 - 536
  • [7] VLSI Architecture for an Area Efficient Elliptic Curve Cryptographic Processor for Embedded Systems
    Bobade, Sunil Devidas
    Mankar, Vijay R.
    [J]. 2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INSTRUMENTATION AND CONTROL (ICIC), 2015, : 1038 - 1043
  • [8] Efficient Hardware Implementation of Elliptic-Curve Diffie-Hellman Ephemeral on Curve25519
    Nguyen, Hung
    Hoang, Trang
    Tran, Linh
    [J]. ELECTRONICS, 2023, 12 (21)
  • [9] Validation of elliptic curve public keys
    Antipa, A
    Brown, D
    Menezes, A
    Struik, R
    Vanstone, S
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 211 - 223
  • [10] The Design of High Performance Elliptic Curve Cryptographic
    Hong, Jin-Hua
    Wu, Wei-Chung
    [J]. 2009 52ND IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2009, : 527 - 530