Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography

被引:1
|
作者
Abhishek, Kunal [1 ]
Raj, E. George Dharma Prakash [2 ]
机构
[1] Soc Elect Transact & Secur, Chennai, Tamil Nadu, India
[2] Bharathidasan Univ, Tiruchirappalli, Tamil Nadu, India
关键词
Computational approaches; evaluation; cryptography; elliptic curve; ECDLP; security; DISCRETE LOGARITHMS;
D O I
10.2478/cait-2021-0045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology of attacks on Elliptic Curve Discrete Logarithm Problem (ECDLP) and investigate their countermeasures to highlight the evolved selection criteria of cryptographically safe elliptic curves. Further, two popular deterministic and random approaches for selection of Short Weierstrass elliptic curve for cryptography are evaluated from computational, security and trust perspectives and a trend in existent computational standards is demonstrated. Finally, standard and nonstandard elliptic curves are analysed to add a new insight into their usability. There is no such survey conducted in past to the best of our knowledge.
引用
收藏
页码:105 / 118
页数:14
相关论文
共 30 条
  • [21] Frobenius distributions of elliptic curves in short intervals on average
    Agwu, Anthony
    Harris, Phillip
    James, Kevin
    Kannan, Siddarth
    Li, Huixi
    RAMANUJAN JOURNAL, 2022, 58 (01): : 75 - 120
  • [22] Frobenius distributions of elliptic curves in short intervals on average
    Anthony Agwu
    Phillip Harris
    Kevin James
    Siddarth Kannan
    Huixi Li
    The Ramanujan Journal, 2022, 58 : 75 - 120
  • [23] A short note on secret sharing using elliptic curves
    Muller, Volker
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 359 - 362
  • [24] Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves
    Kim, Suhri
    IEEE ACCESS, 2021, 9 : 154500 - 154512
  • [25] Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 155 - 158
  • [26] On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus
    Cheng, Chen-Mou
    Kodera, Kenta
    Miyaji, Atsuko
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 245 - 263
  • [27] An Implementation and Evaluation of a Pairing on Elliptic Curves with Embedding Degree 14
    Song, Zihao
    Matsumura, Rikuya
    Takahashi, Yuto
    Nanjo, Yuki
    Kusaka, Takuya
    Nogami, Yasuyuki
    Matsumoto, Tsutomu
    35TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2020), 2020, : 293 - 298
  • [28] Short average distribution of a prime counting function over families of elliptic curves
    Giri, Sumit
    JOURNAL OF NUMBER THEORY, 2020, 212 : 376 - 408
  • [29] Evaluation of Authentication Based Elliptic Curve Cryptography in Wireless Sensor Networks in IoT Context
    Bettoumi, Balkis
    Bouallegue, Ridha
    2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2018, : 258 - 262
  • [30] Height estimates for elliptic curves in short Weierstraß form over global fields and a comparison
    H. G. Zimmer
    S. Schmitt
    Archiv der Mathematik, 2001, 77 : 22 - 31