Elliptic Curves Cryptographic Techniques

被引:0
|
作者
Sagheer, Ali Makki [1 ]
机构
[1] Univ Anbar, Coll Comp, Dept Informat Syst, Ramadi, Iraq
关键词
component; Elliptic Curves Cryptography; Discrete Logarithm Problem; Elliptic Curve Discrete Logarithm Problem; ElGamal; Menezes-Vanstone;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security issues are very important for information technology applications now a day such as ATM and Smart cards. One of the recent public key cryptosystems is Elliptic Curves Cryptography. The group of the elliptic curve points forms an Abelian group, that is a suitable choice for constructing the Elliptic Curve Discrete Logarithm Problem (ECDLP). This led to create cipher system based on the difficulty of its solution. That is open a new windows for treatment with special groups and new operations. This paper provides three proposed techniques as a modification of ElGamal cryptosystem based on the elliptic curves, as well as, implement these techniques, compute the computational complexity of these methods compared to the original methods, compare these methods with the original methods in running time of several messages have different sizes. A great reduction in calculation time is resulted, also these techniques makes the cipher text more confused than cipher text which resulted from original techniques.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Isomorphic elliptic curves for cryptographic use
    Salazar, JL
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT I, 2002, : 483 - 487
  • [2] ON THE USES OF ELLIPTIC-CURVES IN CRYPTOGRAPHIC PROTOCOLS
    KAZARIN, OV
    UKHLINOV, LM
    AVTOMATIKA I VYCHISLITELNAYA TEKHNIKA, 1992, (05): : 23 - 32
  • [3] Elliptic curves with the Montgomery-form and their cryptographic applications
    Okeya, K
    Kurumatani, H
    Sakurai, K
    PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 238 - 257
  • [4] Nonlinear analysis on elliptic curves subspaces with cryptographic applications
    Ticleanu, Oana Adriana
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2014, 41 (02): : 292 - 299
  • [5] A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes
    Duran Diaz, Raul
    Gayoso Martinez, Victor
    Hernandez Encinas, Luis
    Martin Munoz, Agustin
    INTERNATIONAL JOINT CONFERENCE SOCO'16- CISIS'16-ICEUTE'16, 2017, 527 : 658 - 667
  • [6] Anomalous Behaviour of Cryptographic Elliptic Curves over Finite Field
    Fujdiak, Radek
    Dzurenda, Petr
    Mlynek, Petr
    Misurec, Jiri
    Orgon, Milos
    Sergey, Bezzateev
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2017, 23 (05) : 82 - 88
  • [7] A cryptographic processor for arbitrary elliptic curves over GF(2(m))
    Eberle, Hans
    Gura, Nils
    Shantz, Sheueling Chang
    Gupta, Vipul
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2008, 3 (04) : 241 - 255
  • [8] DIFFERENTIAL OPERATORS OVER PARTICULAR ELLIPTIC CURVES SPACES WITH CRYPTOGRAPHIC APPLICATIONS
    Ticleanu, Oana Adriana
    ELECTRONIC JOURNAL OF DIFFERENTIAL EQUATIONS, 2015,
  • [9] Development, Implementation and Analysis of Cryptographic Protocol for Digital Signatures Based on Elliptic Curves
    Chekanov, S. G.
    BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2013, 6 (02): : 120 - 127
  • [10] A Secured OpenFlow Protocol Using Elliptic Curves Cryptographic for Software Defined Networks
    Al Dulaimi, Layth A. Khalil
    Ahmad, R. Badlishah
    Yaakob, Naimah
    Hussein, Qasim Mohammed
    1ST INTERNATIONAL CONFERENCE ON GREEN AND SUSTAINABLE COMPUTING (ICOGES) 2017, 2018, 1019