Selection of Security Elliptic Curve Based on Evolution Algorithm

被引:6
作者
Wang, Maocai [1 ,2 ]
Dai, Guangming
Hu, Hanping [1 ]
Pen, Lei [2 ]
机构
[1] Huazhong Univ Sci & Technol, Inst Pattern Recognit & Artificial Intelligence, Wuhan 430074, Peoples R China
[2] China Univ Geosci, Sch Comp, Wuhan 430074, Peoples R China
来源
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL I | 2009年
关键词
Elliptic curve; Selection algorithm; ECDLP; Evolution algorithm; CRYPTOGRAPHY;
D O I
10.1109/CINC.2009.205
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Applying evolution algorithm to selection of security elliptic curve(EC) is first researched in the paper. In order to ensure the security of elliptic curve cryptosystem(ECC), it is necessary that the elliptic curves are safe against all kinds of attack algorithms about the elliptic curve discrete logarithm problem (ECDLP). Therefore, selection of secure elliptic curves is a mathematics difficult problem. In this paper, selection principles of secure EC are firstly analyzed. Then, based on the selection principle, a selection algorithm of security EC based on evolution algorithm is put forward. The thoughts of encoding, crossover and mutation of evolution algorithm for selection of EC are discussed in detail. The implementation result shows the availability and efficiency of the algorithm.
引用
收藏
页码:55 / +
页数:2
相关论文
共 50 条
  • [41] Elliptic curve Diffie–Hellman cryptosystem in big data cloud security
    E. K. Subramanian
    Latha Tamilselvan
    Cluster Computing, 2020, 23 : 3057 - 3067
  • [42] Improving e-payment security using Elliptic Curve Cryptosystem
    Vincent, O. R.
    Folorunso, O.
    Akinde, A. D.
    ELECTRONIC COMMERCE RESEARCH, 2010, 10 (01) : 27 - 41
  • [43] New algorithm of elliptic curve multi-scalar multiplication
    Liu, Duo
    Dai, Yi-Qi
    Jisuanji Xuebao/Chinese Journal of Computers, 2008, 31 (07): : 1131 - 1137
  • [44] An elliptic curve implementation of the finite field Digital Signature Algorithm
    Koblitz, N
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 327 - 337
  • [45] Area Efficient Implementation of Elliptic Curve Point Multiplication Algorithm
    Bobade, Sunil Devidas
    Mankar, Vijay R.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (04) : 24 - 34
  • [46] Multiple scalar-multiplication algorithm over elliptic curve
    Kobayashi, K
    Morita, H
    Hakuta, M
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (02) : 271 - 276
  • [47] Elliptic curve scalar multiplication algorithm using complementary recoding
    Balasubramaniam, P.
    Karthikeyan, E.
    APPLIED MATHEMATICS AND COMPUTATION, 2007, 190 (01) : 51 - 56
  • [48] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [49] Pseudo random sequences based on elliptic curve subgroups and mathematical model for its application to digital image security
    Haider, Muhammad Imran
    Shah, Tariq
    Ali, Asif
    Shah, Dawood
    Khalid, Ijaz
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (17) : 23709 - 23734
  • [50] Pseudo random sequences based on elliptic curve subgroups and mathematical model for its application to digital image security
    Muhammad Imran Haider
    Tariq Shah
    Asif Ali
    Dawood Shah
    Ijaz Khalid
    Multimedia Tools and Applications, 2022, 81 : 23709 - 23734