Study on elliptic curves in cryptography

被引:0
|
作者
Eier, R. [1 ]
机构
[1] Tech Univ Wien, Inst Comp Tech, Gusshausstr 25-29-384, A-1040 Vienna, Austria
来源
ELEKTROTECHNIK UND INFORMATIONSTECHNIK | 2005年 / 122卷 / 1-2期
关键词
graphs of elliptic curves; solution to the tangential problem; Identification of the generating polynomial; doubling and bisection of elliptic curve-points; synthesis and analysis of multiples of points; comparison of elliptic curves and exponential functions; cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Elliptic curves (ECs) based on finite fields are becoming increasingly important in modern cryptographic systems. An elementary introduction to ECs is provided, in the domain of the real numbers. The problem of obtaining a tangential line from a point on the curve onto the graph itself is resolved for the general case, by evaluating the zeros of a polynomial of degree 4. The polynomial generating the EC is derived from three points on the curve. The point arithmetic for ECs by means of graphical addition of EC points is explained in a traditional way, and the importance of integer multiples of EC points for cryptography is pointed out. The synthesis program for multiples of EC points is complemented by a program for analysis that yields the applied factor of multiplicity by exploiting the solution of the tangential problem. The operation of both programs is demonstrated in the domain of rational numbers where the analysis program always gives a unique solution in a straight forward manner. In order to confine the length of numbers and to restrict the runtimes of the programs, two different mechanisms are investigated for application to any intermediate rational numbers in the course of the computation. In the first case all rational numbers are reduced to integers according to residual classes of finite fields. These measures cover all the relevant occurrences of traditional EC- applications. This approach is greatly supported by the well established fundamentals of finite fields. In the other case the numerator and denominator of rational numbers are independently mapped onto integer residue classes, however, the fundamentally rational character of all numbers is deliberately maintained. By this approach it is expected to benefit from the straight forward solutions of the analysis program in the format of rational numbers. However, additional research is needed to substantiate this adequately. Results obtained from ECs are briefly compared to exponential functions. All programs in this article have been implemented on the Mathematica software platform, and can be readily executed. Runtimes for programs were obtained by means of Mathematica, though no effort was made to optimize programs.
引用
收藏
页码:7 / 27
页数:21
相关论文
共 50 条
  • [31] Studie über die elliptischen Kurven in der KryptografieStudy on elliptic curves in cryptography
    R. Eier
    [J]. e & i Elektrotechnik und Informationstechnik, 2005, 122 (1-2) : 7 - 27
  • [32] Residue systems efficiency for modular products summation: Application to Elliptic Curves Cryptography
    Bajard, J. C.
    Duquesne, S.
    Ercegovac, M.
    Meloni, N.
    [J]. ADVANCED SIGNAL PROCESSING ALGORITHMS, ARCHITECTURES, AND IMPLEMENTATIONS XVI, 2006, 6313
  • [33] On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based Cryptography
    Zhang, Meng
    Chen, Xuehong
    Xu, Maozhi
    Wang, Jie
    [J]. BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 60 - 70
  • [34] A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Yeh, Hsiu-Lien
    Chen, Tien-Ho
    Liu, Pin-Chuan
    Kim, Tai-Hoo
    Wei, Hsin-Wen
    [J]. SENSORS, 2011, 11 (05) : 4767 - 4779
  • [35] A Study of Elliptic Curve Cryptography and Its Applications
    Nikhil, U. Vijay
    Stamenkovic, Z.
    Raja, S. P.
    [J]. INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2024,
  • [36] A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
    Chen, Huifang
    Ge, Linlin
    Xie, Lei
    [J]. SENSORS, 2015, 15 (07) : 17057 - 17075
  • [37] Low latency elliptic curve cryptography accelerators for NIST curves over binary fields
    Shu, C
    Gaj, K
    Ei-Ghazawi, T
    [J]. FPT 05: 2005 IEEE INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2005, : 309 - 310
  • [38] Enhanced FPGA Implementations for Doubling Oriented and Jacobi- Quartics Elliptic Curves Cryptography
    Tawalbeh, Lo'ai
    Abu Al-Haija, Qasem
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (03): : 167 - 175
  • [39] A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Shi, Wenbo
    Gong, Peng
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [40] Comparative study on electrocardiogram encryption using elliptic curves cryptography and data encryption standard for applications in Internet of medical things
    Zheng, Lijuan
    Wang, Zihan
    Tian, Senping
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (09):