Implementation of Elliptic Curve Cryptography in Binary Field

被引:2
|
作者
Susantio, D. R. [1 ]
Muchtadi-Alamsyah, I. [1 ]
机构
[1] Inst Teknol Bandung, Fac Math & Nat Sci, Algebra Res Grp, Jalan Ganesha 10, Bandung 40132, Indonesia
关键词
D O I
10.1088/1742-6596/710/1/012022
中图分类号
O7 [晶体学];
学科分类号
0702 ; 070205 ; 0703 ; 080501 ;
摘要
Currently, there is a steadily increasing demand of information security, caused by a surge in information flow. There are many ways to create a secure information channel, one of which is to use cryptography. In this paper, we discuss the implementation of elliptic curves over the binary field for cryptography. We use the simplified version of the ECIES (Elliptic Curve Integrated Encryption Scheme). The ECIES encrypts a plaintext by masking the original message using specified points on the curve. The encryption process is done by separating the plaintext into blocks. Each block is then separately encrypted using the encryption scheme.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Hardware Implementation of Text Encryption using Elliptic Curve Cryptography over 192 bit Prime Field
    Jaiswal, Mohita
    Lata, Kusum
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 343 - 349
  • [32] Efficient implementation of cancelable face recognition based on elliptic curve cryptography
    Rania A. Eltaieb
    Ghada M. El-Banby
    Walid El-Shafai
    Fathi E. Abd El-Samie
    Alaa M. Abbas
    [J]. Optical and Quantum Electronics, 2023, 55
  • [33] Efficient hardware implementation of elliptic curve cryptography over GF(pm)
    Lee, MK
    Kim, KT
    Kim, H
    Kim, DK
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 207 - 217
  • [34] Elliptic Curve Cryptography in Practice
    Bos, Joppe W.
    Halderman, J. Alex
    Heninger, Nadia
    Moore, Jonathan
    Naehrig, Michael
    Wustrow, Eric
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 157 - 175
  • [35] Elliptic-curve cryptography
    Fernandes, AD
    [J]. DR DOBBS JOURNAL, 1999, 24 (12): : 56 - +
  • [36] The State of Elliptic Curve Cryptography
    Neal Koblitz
    Alfred Menezes
    Scott Vanstone
    [J]. Designs, Codes and Cryptography, 2000, 19 : 173 - 193
  • [37] A survey of elliptic curve cryptography
    Istanbul University, Engineering Faculty, Computer Engineering Dept., 34320 Avcilar, Istanbul, Turkey
    [J]. Istanb. Univ. J. Electr. Electron. Eng., 2006, 2 (211-221):
  • [38] Research on elliptic curve cryptography
    Qiu, QZ
    Xiong, QX
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 698 - 701
  • [39] A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY
    Aydin, M. Ali
    Aydin, G. Zeynep
    [J]. ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2006, 6 (02): : 211 - 221
  • [40] Investigation into the Elliptic Curve Cryptography
    Fang, Xianjin
    Wu, Yanting
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 412 - 415