Investigation into the Elliptic Curve Cryptography

被引:0
作者
Fang, Xianjin [1 ]
Wu, Yanting [1 ]
机构
[1] Anhui Univ Sci & Technol, Sch Comp Sci & Engn, Huainan, Anhui, Peoples R China
来源
2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017) | 2017年
基金
中国国家自然科学基金;
关键词
elliptic curve; elliptic curve cryptography; cyclic group; encryption and decryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Elliptic curve cryptography (ECC) in TLS, PGP and SSH, which are just three of the main technologies on which the modern web and IT world are based. However, Compared with RSA public key algorithm, ECC is mysterious and not understandable to most. Few literatures introduce how to partition the plaintext into blocks for ECC and how to map the digital codes of block into the points over elliptic curve. For the arithmetic of the points over elliptic curve, the algorithm of multiples of points is the most crucial, how to optimize this algorithm and perform its time complexity analysis are very important. This paper addresses the above works about ECC, and illustrates an example of ECC encryption algorithm implementation.
引用
收藏
页码:412 / 415
页数:4
相关论文
共 6 条
  • [1] On the bit security of the weak Diffie-Hellman problem
    Dongyoung, Roh
    Geun, Hahn Sang
    [J]. INFORMATION PROCESSING LETTERS, 2010, 110 (18-19) : 799 - 802
  • [2] Granger Robert, 2014, ARXIV14023668CSMATH
  • [3] NSA/CSS Information Assurance Directorate, 2016, UOO81509915 MFQ NSAC
  • [4] Schoof R., 1995, Journal de thorie des nombres de Bordeaux, V7, P219, DOI [10.5802/jtnb.142, DOI 10.5802/JTNB.142]
  • [5] Modular Arithmetic Analyses for RSA Cryptosystem
    Wu, Chia-Long
    Hu, Chen-Hao
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 816 - 819
  • [6] YOU Lin, 2010, The Journal of China Universities of Posts and Telecommunications, V17, P100