skip to main content
10.1145/2047456.2047457acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Elliptic curve for data protection

Published:30 September 2011Publication History

ABSTRACT

The cryptography of elliptical curve (ECC) is an approach in cryptography public key based on the algebraic structure of elliptical curves on the finished fields; a smaller group can be used to obtain the same level of security as RSA-based. In this article a simple presentation on cryptography with focus on elliptic curve algorithm, examine its security, benefits and its functions with privacy issues. The last part of this article is "protection and privacy components", for each component the article look at privacy issue then examine the elliptic curve angle to be used with the component. These work results in using elliptic curve in multipart security (or single party) is more efficient in key size, speed and retrieve encrypted information.

References

  1. Entrust.com 2008. Elliptic Curve PKI: An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography.Google ScholarGoogle Scholar
  2. Vittorio, S. 2002. Quantum Cryptography: Privacy Through Uncertainty. Retrieved from CSA information company: http://www.csa.comGoogle ScholarGoogle Scholar
  3. Bennett, C. H., & Brassard, G. 1984. Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, (pp. 175--179). Bangalore, India: IEEE.Google ScholarGoogle Scholar
  4. Bennett, C. H., Brassard, G., & Ekert, A. K. 1992. Quantum cryptography. Scientific American, pp. 50--57.Google ScholarGoogle ScholarCross RefCross Ref
  5. Goldreich, O. 2001. Foundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Katz, J., & Lindell, Y. 2007. Introduction to Modern Cryptography. Chapman and Hall/CRC Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Al-Hamdani, W. A. 1999"Cipher Systems "Iraqi National Library No. 135 in 29-05-1997Google ScholarGoogle Scholar
  8. Menezes, A. J. 1996. Handbook of Applied Cryptography. CRC Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. RSALab. 1992. Cryptography FAQ Chapter 2 and Chapter 2. Retrieved from Rsa Lab: http://www.rsa.com/rsalabs/node.asp?id=2213Google ScholarGoogle Scholar
  10. Koblitz, N. 1987. Elliptic curve cryptosystems. Mathematics of Computation, 48, 203--209.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Miller, V. 1985. Use of elliptic curves in cryptography. CRYPTO 85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lay, G.-J., & Zimmer, H. G. 1998. Constructing elliptic curves with given group order over large finite fields. Proceedings of the First International Symposium on Algorithmic Number Theory. Springer Lecture Notes In Computer Science; Vol. 877. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Rosing, M. 1999. Implementation Elliptic Curve Cryptography. Manning Pub. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Blake, I. F. 2005. Advances in Elliptic Curve Cryptography. Cambridge University Press Series: London Mathematical Society Lecture Note Series (No. 317). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. nsa.gov. 2009. The Case for Elliptic Curve Cryptography. Retrieved from The National Security Agency Central Security Service: can be retrieved from http://www.nsa.gov/business/programs/elliptic_curve.shtmlGoogle ScholarGoogle Scholar
  16. nsa.gov. (n.d.). NSA Suite B Cryptography. Retrieved from The National Security Agency Central Security Service: can be retrieved from http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtmlGoogle ScholarGoogle Scholar
  17. Givens, B. (2009). Privacy Today: A Review of Current Issues. Retrieved from Privacy Rights Clearinghouse (PRC): http://www.privacyrights.org/Google ScholarGoogle Scholar
  18. Soutar, C., Roberge, D., Stoianov, A., Gilro, R., & Kumar, B. V. 1999. Biometric Encryption. In R. K. (ed), ICSA Guide to Cryptography (p. chapter 22 in). McGraw-Hill.Google ScholarGoogle Scholar
  19. Zhu, L., Jaganathan, K., & Lauter, K. (2008). RFC5349 - Elliptic Curve Cryptography (ECC) Support for Public. faqs.org.Google ScholarGoogle Scholar
  20. Beth, G. (retrived 20009). privacyrights.org. Retrieved from Privacy Today: A Review of Current Issues: http://www.privacyrights.org/ar/Privacy-IssuesList.htm#uGoogle ScholarGoogle Scholar
  21. Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., & Moeller, B. 2006. RFC4492 - Elliptic Curve Cryptography (ECC) Cipher Suites for T. faqs.org.Google ScholarGoogle Scholar
  22. entrust.com. 2008. Elliptic Curve PKI: An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography. Retrieved from www.entrust.com: www.entrust.comGoogle ScholarGoogle Scholar
  23. Wasim Al-Hamdani.2010. Cryptography Based Access Control in Healthcare Web Systems. InfoSec CD 2010, Proceedings of the 7th annual conference on Information security curriculum development http://infosec.kennesaw.edu/InfoSecCD/ Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Leu, M.-C., & Sun, H.-M. (2009). Authentication method employing elliptic curve cryptography. Retrieved from faqs.org: http://www.faqs.org/patents/Google ScholarGoogle Scholar
  25. FIPS PUB 186-2, 2000. Digital Signature Standard, (DSS), U. S. DEPARTMENT OF COMMERCE/National Institute of Standards and TechnologyGoogle ScholarGoogle Scholar

Index Terms

  1. Elliptic curve for data protection

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                InfoSecCD '11: Proceedings of the 2011 Information Security Curriculum Development Conference
                September 2011
                111 pages
                ISBN:9781450308120
                DOI:10.1145/2047456

                Copyright © 2011 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 30 September 2011

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate18of23submissions,78%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader