Implementation of Elliptic Curve Cryptography in Binary Field

被引:2
|
作者
Susantio, D. R. [1 ]
Muchtadi-Alamsyah, I. [1 ]
机构
[1] Inst Teknol Bandung, Fac Math & Nat Sci, Algebra Res Grp, Jalan Ganesha 10, Bandung 40132, Indonesia
关键词
D O I
10.1088/1742-6596/710/1/012022
中图分类号
O7 [晶体学];
学科分类号
0702 ; 070205 ; 0703 ; 080501 ;
摘要
Currently, there is a steadily increasing demand of information security, caused by a surge in information flow. There are many ways to create a secure information channel, one of which is to use cryptography. In this paper, we discuss the implementation of elliptic curves over the binary field for cryptography. We use the simplified version of the ECIES (Elliptic Curve Integrated Encryption Scheme). The ECIES encrypts a plaintext by masking the original message using specified points on the curve. The encryption process is done by separating the plaintext into blocks. Each block is then separately encrypted using the encryption scheme.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Fast software implementation of binary elliptic curve cryptography
    Bluhm, Manuel
    Gueron, Shay
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2015, 5 (03) : 215 - 226
  • [2] Software implementation of elliptic curve cryptography over binary fields
    Hankerson, D
    Hernandez, JL
    Menezes, A
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS-CHES 2000, PROCEEDINGS, 2001, 1965 : 1 - 24
  • [3] Issues in Elliptic Curve Cryptography Implementation
    Paryasto, Marisa W.
    Kuspriyanto
    Sutikno, Sarwono
    Sasongko, Arif
    [J]. INTERNETWORKING INDONESIA, 2009, 1 (01): : 29 - 33
  • [4] Optimal Implementation of Elliptic Curve Cryptography
    Lv, Hongqiang
    Li, Hui
    Yi, Junkai
    Lu, Hao
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 35 - 39
  • [5] High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields
    Liu, Shuai
    Ju, Lei
    Cai, Xiaojun
    Jia, Zhiping
    Zhang, Zhiyong
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 148 - 155
  • [6] Implementation of Pollard Rho Attack on Elliptic Curve Cryptography over Binary Fields
    Wienardo
    Yuliawan, Fajar
    Muchtadi-Alamsyah, Intan
    Rahardjo, Budi
    [J]. 5TH INTERNATIONAL CONFERENCE ON MATHEMATICS AND NATURAL SCIENCES (ICMNS 2014), 2015, 1677
  • [7] FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field
    Li, Hao
    Huang, Jian
    Sweany, Philip
    Huang, Dijiang
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2008, 54 (12) : 1077 - 1088
  • [8] FPGA Based Implementation of Elliptic Curve Cryptography
    Nawari, Mustafa
    Ahmed, Hazim
    Hamid, Aisha
    Elkhidir, Mohamed
    [J]. 2015 WORLD SYMPOSIUM ON COMPUTER NETWORKS AND INFORMATION SECURITY (WSCNIS), 2015,
  • [9] Software Implementation of Elliptic Curve Encryption over Binary Field
    ZHANG Xianfeng QIN Zhiguang ZHOU Shijie LIU Jinde(School of Computer Science and Engineering
    [J]. Journal of Electronic Science and Technology, 2003, (01) : 54 - 59
  • [10] Implementation of ElGamal Elliptic Curve Cryptography Over Prime Field Using C
    Boruah, Debabrat
    Saikia, Monjul
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,