Improvement and Implementation of One Elliptic Curve Cryptography Algorithm

被引:0
|
作者
Kong, Qingyan [1 ]
机构
[1] Harbin Univ Commerce, Sch Comp & Informat Engn, Harbin 150028, Peoples R China
关键词
elliptic curve; discrete logarithm; Hashing function; big-step small-step algorithm;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Compared with the RSA, the elliptic curve cryptosystem has advantages of shorter key, efficient, high safety and so on. In the field of the network communication system security has increasingly gained concern and become a research focus. The security of elliptic curve algorithm was realized through the difficulty of solving the discrete logarithm problem. The algorithm of big-step small-step algorithm for solving the discrete logarithm was improved. Hashing function was introduced when establishing list. This not only reduced the list quantity but also reduced the storage space. Operation efficiency was improved significantly. At last the improved algorithm was implemented with C language.
引用
收藏
页码:2438 / 2440
页数:3
相关论文
共 50 条
  • [1] A GPU implementation of the Montgomery multiplication algorithm for elliptic curve cryptography
    Leboeuf, Karl
    Muscedere, Roberto
    Alunadi, Majid
    [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2013, : 2593 - 2596
  • [2] Issues in Elliptic Curve Cryptography Implementation
    Paryasto, Marisa W.
    Kuspriyanto
    Sutikno, Sarwono
    Sasongko, Arif
    [J]. INTERNETWORKING INDONESIA, 2009, 1 (01): : 29 - 33
  • [3] Security Improvement in Elliptic Curve Cryptography
    Abdullah, Kawther Esaa
    Ali, Nada Hussein M.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 122 - 131
  • [4] Optimal Implementation of Elliptic Curve Cryptography
    Lv, Hongqiang
    Li, Hui
    Yi, Junkai
    Lu, Hao
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 35 - 39
  • [5] Implementation of Elliptic Curve Cryptography in Binary Field
    Susantio, D. R.
    Muchtadi-Alamsyah, I.
    [J]. 4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710
  • [6] FPGA Based Implementation of Elliptic Curve Cryptography
    Nawari, Mustafa
    Ahmed, Hazim
    Hamid, Aisha
    Elkhidir, Mohamed
    [J]. 2015 WORLD SYMPOSIUM ON COMPUTER NETWORKS AND INFORMATION SECURITY (WSCNIS), 2015,
  • [7] Point choosing algorithm of elliptic curve cryptography
    [J]. Lu, Chen, 2000, Xi'an Jiaotong Univ, China (34):
  • [8] Research and Optimizing of the Algorithm of Elliptic Curve Cryptography
    Chen, Er-Yang
    Lei, Lin
    Luo, Jun-Yi
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 1219 - 1225
  • [9] Elliptic Curve Cryptography:: Java']Java implementation issues
    Martínez, VG
    Sánchez-Avila, C
    García, JE
    Encinas, LH
    [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 238 - 241
  • [10] EFFICIENT IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY IN WIRELESS SENSORS
    Aranha, Diego F.
    Dahab, Richardo
    Lopez, Julio
    Oliveira, Leonardo B.
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2010, 4 (02) : 169 - 187