Study on elliptic curves in cryptography

被引:0
|
作者
Eier, R. [1 ]
机构
[1] Tech Univ Wien, Inst Comp Tech, Gusshausstr 25-29-384, A-1040 Vienna, Austria
来源
ELEKTROTECHNIK UND INFORMATIONSTECHNIK | 2005年 / 122卷 / 1-2期
关键词
graphs of elliptic curves; solution to the tangential problem; Identification of the generating polynomial; doubling and bisection of elliptic curve-points; synthesis and analysis of multiples of points; comparison of elliptic curves and exponential functions; cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Elliptic curves (ECs) based on finite fields are becoming increasingly important in modern cryptographic systems. An elementary introduction to ECs is provided, in the domain of the real numbers. The problem of obtaining a tangential line from a point on the curve onto the graph itself is resolved for the general case, by evaluating the zeros of a polynomial of degree 4. The polynomial generating the EC is derived from three points on the curve. The point arithmetic for ECs by means of graphical addition of EC points is explained in a traditional way, and the importance of integer multiples of EC points for cryptography is pointed out. The synthesis program for multiples of EC points is complemented by a program for analysis that yields the applied factor of multiplicity by exploiting the solution of the tangential problem. The operation of both programs is demonstrated in the domain of rational numbers where the analysis program always gives a unique solution in a straight forward manner. In order to confine the length of numbers and to restrict the runtimes of the programs, two different mechanisms are investigated for application to any intermediate rational numbers in the course of the computation. In the first case all rational numbers are reduced to integers according to residual classes of finite fields. These measures cover all the relevant occurrences of traditional EC- applications. This approach is greatly supported by the well established fundamentals of finite fields. In the other case the numerator and denominator of rational numbers are independently mapped onto integer residue classes, however, the fundamentally rational character of all numbers is deliberately maintained. By this approach it is expected to benefit from the straight forward solutions of the analysis program in the format of rational numbers. However, additional research is needed to substantiate this adequately. Results obtained from ECs are briefly compared to exponential functions. All programs in this article have been implemented on the Mathematica software platform, and can be readily executed. Runtimes for programs were obtained by means of Mathematica, though no effort was made to optimize programs.
引用
收藏
页码:7 / 27
页数:21
相关论文
共 50 条
  • [21] Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
    Galbraith, Steven D.
    Lin, Xibin
    Scott, Michael
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (03) : 446 - 469
  • [22] A comparison of random elliptic curves and finite fields suitable for cryptography
    Kuroda, MSH
    Bover, DCC
    [J]. Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005, : 49 - 55
  • [23] Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
    Abhishek, Kunal
    Raj, E. George Dharma Prakash
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (04) : 105 - 118
  • [24] Cryptography on elliptic curves over p-adic number fields
    XU MaoZhi 1
    2 China Electronic Equipment System Engineering Corporation
    3 Microsoft Research Asia
    [J]. Science China(Information Sciences), 2008, (03) : 258 - 272
  • [25] High-Speed Elliptic Curve Cryptography Accelerator for Koblitz Curves
    Jarvinen, Kimmo U.
    Skytta, Jorma O.
    [J]. PROCEEDINGS OF THE SIXTEENTH IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, 2008, : 109 - 118
  • [26] Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves
    Koziel, Brian
    Azarderakhsh, Reza
    Kermani, Mehran Mozaffari
    Jao, David
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2017, 64 (01) : 86 - 99
  • [27] Cryptography on elliptic curves over p-adic number fields
    MaoZhi Xu
    ChunLai Zhao
    Min Feng
    ZhaoRong Ren
    JiQing Ye
    [J]. Science in China Series F: Information Sciences, 2008, 51 : 258 - 272
  • [28] Cryptography on elliptic curves over p-adic number fields
    Xu MaoZhi
    Zhao ChunLai
    Feng Min
    Ren ZhaoRong
    Ye JiQing
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (03): : 258 - 272
  • [29] ENDOMORPHISMS ON ELLIPTIC CURVES FOR OPTIMAL SUBSPACES AND APPLICATIONS TO DIFFERENTIAL EQUATIONS AND NONLINEAR CRYPTOGRAPHY
    Ticleanu, Oana Adriana
    [J]. ELECTRONIC JOURNAL OF DIFFERENTIAL EQUATIONS, 2015,
  • [30] MPHELL: A fast and robust library with unified and versatile arithmetics for elliptic curves cryptography
    Coladon, Titouan
    Elbaz-Vincent, Philippe
    Hugounenq, Cyril
    [J]. 2021 IEEE 28TH SYMPOSIUM ON COMPUTER ARITHMETIC (ARITH 2021), 2021, : 78 - 85