Analysis of Standard Elliptic Curves for the Implementation of Elliptic Curve Cryptography in Resource-Constrained E-commerce Applications

被引:0
|
作者
Shaikh, Javed R. [1 ]
Nenova, Maria [1 ]
Iliev, Georgi [1 ]
Valkova-Jarvis, Zlatka [1 ]
机构
[1] Tech Univ Sofia, Sofia, Bulgaria
关键词
E-commerce; ECC; ECDH; ECDSA; RSA; Safe Elliptic Curves;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the public key cryptography infrastructure of electronic commerce (E-commerce), use of the Rivest, Shamir, and Adleman (RSA) algorithm is very common. Due to the security requirements, the necessary key size of RSA is increasing exponentially. Because of this large key size, it is not convenient to use RSA in resource-constrained applications where computational speed, storage and bandwidth are limited. Elliptic Curve Cryptography (ECC) is the best alternative to the traditional RSA. ECC provides the same level of security as RSA but with reduced key size. The most important factor in the use of ECC is the selection of the correct elliptic curve. There are different types of elliptic curves suggested by various standards. The selection of the curve is dependent on various parameters, such as prime field size, the shape of the curve, etc. In this paper, sets of elliptic curves recommended by different standards for cryptography are selected, and the selected curves are analysed, focusing on the performance and security features. The performance of each curve is measured in terms of computation time. The analysis is performed by considering each curve for the implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm and the Elliptic Curve Digital Signature Algorithm (ECDSA). The comparative table of selected curves is arranged according to the computation time taken by each curve to perform various operations when used for the ECC algorithms
引用
收藏
页码:532 / 535
页数:4
相关论文
共 27 条
  • [21] FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications
    Wang, Deming
    Lin, Yuhang
    Hu, Jianguo
    Zhang, Chong
    Zhong, Qinghua
    MICROMACHINES, 2023, 14 (05)
  • [22] Flexible Hardware/Software Co-design for Scalable Elliptic Curve Cryptography for Low-Resource Applications
    Hassan, M. N.
    Benaissa, M.
    Kanakis, A.
    21ST IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2010,
  • [23] Better privacy and security in e-commerce: Using elliptic curve-based zero-knowledge proofs
    Almuhammadi, S
    Sui, NT
    McLeod, D
    CEC 2004: IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS, 2004, : 299 - 302
  • [24] Technologically Enabling Resource-constrained Enterprises in Developing Nations Through The Implementation of E-Commerce on-Demand Service Portals for a Grid Utility Computing Platform
    Odusote, Babafemi O.
    Adigun, Matthew O.
    PROCEEDINGS OF THE 2014 IEEE 6TH INTERNATIONAL CONFERENCE ON ADAPTIVE SCIENCE AND TECHNOLOGY (ICAST 2014), 2014,
  • [25] Comparative study on electrocardiogram encryption using elliptic curves cryptography and data encryption standard for applications in Internet of medical things
    Zheng, Lijuan
    Wang, Zihan
    Tian, Senping
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (09):
  • [26] Implementation of a Blockchain System Using Improved Elliptic Curve Cryptography Algorithm for the Performance Assessment of the Students in the E-Learning Platform
    Alshahrani, Mohammad Y.
    APPLIED SCIENCES-BASEL, 2022, 12 (01):
  • [27] Full-custom hardware implementation of point multiplication on binary Edwards curves for application-specific integrated circuit elliptic curve cryptosystem applications
    Rashidi, Bahram
    Sayedi, Sayed Masoud
    Farashahi, Reza Rezaeian
    IET CIRCUITS DEVICES & SYSTEMS, 2017, 11 (06) : 568 - 578