Study on elliptic curves in cryptography

被引:0
|
作者
Eier, R. [1 ]
机构
[1] Tech Univ Wien, Inst Comp Tech, Gusshausstr 25-29-384, A-1040 Vienna, Austria
来源
ELEKTROTECHNIK UND INFORMATIONSTECHNIK | 2005年 / 122卷 / 1-2期
关键词
graphs of elliptic curves; solution to the tangential problem; Identification of the generating polynomial; doubling and bisection of elliptic curve-points; synthesis and analysis of multiples of points; comparison of elliptic curves and exponential functions; cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Elliptic curves (ECs) based on finite fields are becoming increasingly important in modern cryptographic systems. An elementary introduction to ECs is provided, in the domain of the real numbers. The problem of obtaining a tangential line from a point on the curve onto the graph itself is resolved for the general case, by evaluating the zeros of a polynomial of degree 4. The polynomial generating the EC is derived from three points on the curve. The point arithmetic for ECs by means of graphical addition of EC points is explained in a traditional way, and the importance of integer multiples of EC points for cryptography is pointed out. The synthesis program for multiples of EC points is complemented by a program for analysis that yields the applied factor of multiplicity by exploiting the solution of the tangential problem. The operation of both programs is demonstrated in the domain of rational numbers where the analysis program always gives a unique solution in a straight forward manner. In order to confine the length of numbers and to restrict the runtimes of the programs, two different mechanisms are investigated for application to any intermediate rational numbers in the course of the computation. In the first case all rational numbers are reduced to integers according to residual classes of finite fields. These measures cover all the relevant occurrences of traditional EC- applications. This approach is greatly supported by the well established fundamentals of finite fields. In the other case the numerator and denominator of rational numbers are independently mapped onto integer residue classes, however, the fundamentally rational character of all numbers is deliberately maintained. By this approach it is expected to benefit from the straight forward solutions of the analysis program in the format of rational numbers. However, additional research is needed to substantiate this adequately. Results obtained from ECs are briefly compared to exponential functions. All programs in this article have been implemented on the Mathematica software platform, and can be readily executed. Runtimes for programs were obtained by means of Mathematica, though no effort was made to optimize programs.
引用
收藏
页码:7 / 27
页数:21
相关论文
共 50 条
  • [1] Elliptic curves and cryptography
    Silverman, JH
    [J]. Public-Key Cryptography, 2005, 62 : 91 - 112
  • [2] Elliptic curves and cryptography
    Jurisic, A
    Menezes, AJ
    [J]. DR DOBBS JOURNAL, 1997, 22 (04): : 26 - +
  • [3] Supersingular elliptic curves in cryptography
    Menezes, Alfred
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007, 2007, 4575 : 293 - 293
  • [4] Arithmatic of elliptic curves and use in cryptography
    Yerlikaya, Tarik
    Bulus, Ercan
    Bulus, Nusret
    [J]. 2006 IEEE 14TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS, VOLS 1 AND 2, 2006, : 273 - +
  • [5] USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY
    MILLER, VS
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 417 - 426
  • [6] CRYPTOGRAPHY BASED ON CURVES (ELLIPTIC AND HYPERELLIPTIC)
    Durcheva, Mariana
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2015, 7 (01): : 33 - 44
  • [7] The application of elliptic curves cryptography in embedded systems
    Wang, QX
    [J]. ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 527 - 530
  • [8] Elliptic Curves Suitable for Pairing Based Cryptography
    Friederike Brezing
    Annegret Weng
    [J]. Designs, Codes and Cryptography, 2005, 37 : 133 - 141
  • [9] GOOD AND BAD USES OF ELLIPTIC CURVES IN CRYPTOGRAPHY
    Koblitz, Neal
    [J]. MOSCOW MATHEMATICAL JOURNAL, 2002, 2 (04) : 693 - 715
  • [10] Rational groups of elliptic curves suitable for cryptography
    Kohel, DR
    [J]. CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 69 - 80