Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography

被引:1
|
作者
Abhishek, Kunal [1 ]
Raj, E. George Dharma Prakash [2 ]
机构
[1] Soc Elect Transact & Secur, Chennai, Tamil Nadu, India
[2] Bharathidasan Univ, Tiruchirappalli, Tamil Nadu, India
关键词
Computational approaches; evaluation; cryptography; elliptic curve; ECDLP; security; DISCRETE LOGARITHMS;
D O I
10.2478/cait-2021-0045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology of attacks on Elliptic Curve Discrete Logarithm Problem (ECDLP) and investigate their countermeasures to highlight the evolved selection criteria of cryptographically safe elliptic curves. Further, two popular deterministic and random approaches for selection of Short Weierstrass elliptic curve for cryptography are evaluated from computational, security and trust perspectives and a trend in existent computational standards is demonstrated. Finally, standard and nonstandard elliptic curves are analysed to add a new insight into their usability. There is no such survey conducted in past to the best of our knowledge.
引用
收藏
页码:105 / 118
页数:14
相关论文
共 30 条
  • [1] Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
    Abhishek, Kunal
    Raj, E. George Dharma Prakash
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (02) : 70 - 88
  • [2] Elliptic curves and cryptography
    Silverman, JH
    Public-Key Cryptography, 2005, 62 : 91 - 112
  • [3] Study on elliptic curves in cryptography
    Eier, R.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2005, 122 (1-2): : 7 - 27
  • [4] Impossible intersections in a Weierstrass family of elliptic curves
    Mavraki, Niki Myrto
    JOURNAL OF NUMBER THEORY, 2016, 169 : 21 - 40
  • [5] CRYPTOGRAPHY BASED ON CURVES (ELLIPTIC AND HYPERELLIPTIC)
    Durcheva, Mariana
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2015, 7 (01): : 33 - 44
  • [6] A comparison of random elliptic curves and finite fields suitable for cryptography
    Kuroda, MSH
    Bover, DCC
    Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005, : 49 - 55
  • [7] The application of elliptic curves cryptography in embedded systems
    Wang, QX
    ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 527 - 530
  • [8] The density of elliptic curves having a global minimal Weierstrass equation
    Bekyel, E
    JOURNAL OF NUMBER THEORY, 2004, 109 (01) : 41 - 58
  • [9] The Magic of Elliptic Curves and Public-Key Cryptography
    Florian Heß
    Andreas Stein
    Sandra Stein
    Manfred Lochter
    Jahresbericht der Deutschen Mathematiker-Vereinigung, 2012, 114 (2) : 59 - 88
  • [10] On Elliptic Curve Cryptography implementations and evaluation
    Alimi, Nejmeddine
    Lahbib, Younes
    Machhout, Mohsen
    Tourki, Rached
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2016, : 35 - 40