Selection of Security Elliptic Curve Based on Evolution Algorithm

被引:6
作者
Wang, Maocai [1 ,2 ]
Dai, Guangming
Hu, Hanping [1 ]
Pen, Lei [2 ]
机构
[1] Huazhong Univ Sci & Technol, Inst Pattern Recognit & Artificial Intelligence, Wuhan 430074, Peoples R China
[2] China Univ Geosci, Sch Comp, Wuhan 430074, Peoples R China
来源
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL I | 2009年
关键词
Elliptic curve; Selection algorithm; ECDLP; Evolution algorithm; CRYPTOGRAPHY;
D O I
10.1109/CINC.2009.205
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Applying evolution algorithm to selection of security elliptic curve(EC) is first researched in the paper. In order to ensure the security of elliptic curve cryptosystem(ECC), it is necessary that the elliptic curves are safe against all kinds of attack algorithms about the elliptic curve discrete logarithm problem (ECDLP). Therefore, selection of secure elliptic curves is a mathematics difficult problem. In this paper, selection principles of secure EC are firstly analyzed. Then, based on the selection principle, a selection algorithm of security EC based on evolution algorithm is put forward. The thoughts of encoding, crossover and mutation of evolution algorithm for selection of EC are discussed in detail. The implementation result shows the availability and efficiency of the algorithm.
引用
收藏
页码:55 / +
页数:2
相关论文
共 50 条
  • [31] A CONVERSION ALGORITHM OF TEXT MESSAGES INTO ELLIPTIC CURVE POINTS
    Ghosh, Tapas kumar
    ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2022, 21 (09): : 5445 - 5456
  • [32] Improvement and Implementation of One Elliptic Curve Cryptography Algorithm
    Kong, Qingyan
    INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT (EBM2011), VOLS 1-6, 2011, : 2438 - 2440
  • [33] The Key Exchange Research of Chaotic Encryption Chip based on Elliptic Curve Cryptography Algorithm
    Zhou, Ping
    Ding, Qun
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 689 - 693
  • [34] Threshold Signcryption based on Elliptic Curve
    Han, Yiliang
    Yang, Xiaoyuan
    Hu, Junru
    2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 370 - 373
  • [35] A NEW SIGNING ALGORITHM BASED ON ELLIPTIC CURVE DISCRETE LOGARITHMS AND QUADRATIC RESIDUE PROBLEMS
    Tahat, Nedal
    Abdallah, Emad E.
    ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2014, (32): : 125 - 132
  • [36] Hybrid Cryptosystem for Image Security by Using Hill Cipher 4x4 and ElGamal Elliptic Curve Algorithm
    Rachmawati, Dian
    Budiman, Mohammad Andri
    Wardhono, Muhammad Ishan
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT), 2018, : 49 - 54
  • [37] Catalan's Conjecture and Elliptic Curve Cryptography (CCECC) Algorithm for Enhancing Data Security During Data Transmission in MANET
    Pauline, D. Eben Angel
    COMPUTING SCIENCE, COMMUNICATION AND SECURITY, COMS2 2024, 2025, 2174 : 245 - 254
  • [38] Elliptic Curve Arithmetic over Extension Field to Intensify Security and Privacy
    Pote, Santoshi
    Lande, B. K.
    Mammen, Priyank A. Mary
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1890 - 1893
  • [39] A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes
    Aung, Tun Myat
    Hla, Ni Ni
    FUTURE DATA AND SECURITY ENGINEERING (FDSE 2019), 2019, 11814 : 371 - 382
  • [40] Reconfigurable real number field elliptic curve cryptography to improve the security
    Goo E.-H.
    Lee S.-D.
    Journal of Computer Virology and Hacking Techniques, 2015, 11 (3) : 123 - 128