ABSTRACT
The cryptography of elliptical curve (ECC) is an approach in cryptography public key based on the algebraic structure of elliptical curves on the finished fields; a smaller group can be used to obtain the same level of security as RSA-based. In this article a simple presentation on cryptography with focus on elliptic curve algorithm, examine its security, benefits and its functions with privacy issues. The last part of this article is "protection and privacy components", for each component the article look at privacy issue then examine the elliptic curve angle to be used with the component. These work results in using elliptic curve in multipart security (or single party) is more efficient in key size, speed and retrieve encrypted information.
- Entrust.com 2008. Elliptic Curve PKI: An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography.Google Scholar
- Vittorio, S. 2002. Quantum Cryptography: Privacy Through Uncertainty. Retrieved from CSA information company: http://www.csa.comGoogle Scholar
- Bennett, C. H., & Brassard, G. 1984. Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, (pp. 175--179). Bangalore, India: IEEE.Google Scholar
- Bennett, C. H., Brassard, G., & Ekert, A. K. 1992. Quantum cryptography. Scientific American, pp. 50--57.Google ScholarCross Ref
- Goldreich, O. 2001. Foundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press. Google ScholarDigital Library
- Katz, J., & Lindell, Y. 2007. Introduction to Modern Cryptography. Chapman and Hall/CRC Press. Google ScholarDigital Library
- Al-Hamdani, W. A. 1999"Cipher Systems "Iraqi National Library No. 135 in 29-05-1997Google Scholar
- Menezes, A. J. 1996. Handbook of Applied Cryptography. CRC Press. Google ScholarDigital Library
- RSALab. 1992. Cryptography FAQ Chapter 2 and Chapter 2. Retrieved from Rsa Lab: http://www.rsa.com/rsalabs/node.asp?id=2213Google Scholar
- Koblitz, N. 1987. Elliptic curve cryptosystems. Mathematics of Computation, 48, 203--209.Google ScholarDigital Library
- Miller, V. 1985. Use of elliptic curves in cryptography. CRYPTO 85. Google ScholarDigital Library
- Lay, G.-J., & Zimmer, H. G. 1998. Constructing elliptic curves with given group order over large finite fields. Proceedings of the First International Symposium on Algorithmic Number Theory. Springer Lecture Notes In Computer Science; Vol. 877. Google ScholarDigital Library
- Rosing, M. 1999. Implementation Elliptic Curve Cryptography. Manning Pub. Google ScholarDigital Library
- Blake, I. F. 2005. Advances in Elliptic Curve Cryptography. Cambridge University Press Series: London Mathematical Society Lecture Note Series (No. 317). Google ScholarDigital Library
- nsa.gov. 2009. The Case for Elliptic Curve Cryptography. Retrieved from The National Security Agency Central Security Service: can be retrieved from http://www.nsa.gov/business/programs/elliptic_curve.shtmlGoogle Scholar
- nsa.gov. (n.d.). NSA Suite B Cryptography. Retrieved from The National Security Agency Central Security Service: can be retrieved from http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtmlGoogle Scholar
- Givens, B. (2009). Privacy Today: A Review of Current Issues. Retrieved from Privacy Rights Clearinghouse (PRC): http://www.privacyrights.org/Google Scholar
- Soutar, C., Roberge, D., Stoianov, A., Gilro, R., & Kumar, B. V. 1999. Biometric Encryption. In R. K. (ed), ICSA Guide to Cryptography (p. chapter 22 in). McGraw-Hill.Google Scholar
- Zhu, L., Jaganathan, K., & Lauter, K. (2008). RFC5349 - Elliptic Curve Cryptography (ECC) Support for Public. faqs.org.Google Scholar
- Beth, G. (retrived 20009). privacyrights.org. Retrieved from Privacy Today: A Review of Current Issues: http://www.privacyrights.org/ar/Privacy-IssuesList.htm#uGoogle Scholar
- Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., & Moeller, B. 2006. RFC4492 - Elliptic Curve Cryptography (ECC) Cipher Suites for T. faqs.org.Google Scholar
- entrust.com. 2008. Elliptic Curve PKI: An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography. Retrieved from www.entrust.com: www.entrust.comGoogle Scholar
- Wasim Al-Hamdani.2010. Cryptography Based Access Control in Healthcare Web Systems. InfoSec CD 2010, Proceedings of the 7th annual conference on Information security curriculum development http://infosec.kennesaw.edu/InfoSecCD/ Google ScholarDigital Library
- Leu, M.-C., & Sun, H.-M. (2009). Authentication method employing elliptic curve cryptography. Retrieved from faqs.org: http://www.faqs.org/patents/Google Scholar
- FIPS PUB 186-2, 2000. Digital Signature Standard, (DSS), U. S. DEPARTMENT OF COMMERCE/National Institute of Standards and TechnologyGoogle Scholar
Index Terms
- Elliptic curve for data protection
Recommendations
Elliptic curve cryptography: survey and its security applications
ACAI '11: Proceedings of the International Conference on Advances in Computing and Artificial IntelligenceElliptic curve cryptosystems are based on ECDLP (Elliptic curve discrete logarithm problem) for their security. The best known method to solve ECDLP (pollard's rho algorithm) is fully exponential therefore Elliptic Curve Cryptosystems require ...
An Elliptic Curve Trapdoor System
We propose an elliptic curve trapdoor system which is of interest in key escrow applications. In this system, a pair (Es, Epb) of elliptic curves over F2161 is constructed with the following properties: (i) the Gaudry-Hess-Smart Weil descent attack ...
Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization
ICETE 2014: Proceedings of the 11th International Joint Conference on e-Business and Telecommunications - Volume 4Elliptic curve scalar multiplication ( [k]P where k is an integer and P is a point on the elliptic curve) is widely used in encryption and signature generation. In this paper, we explore a factorization-based approach called Near-Factorization that can ...
Comments