Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography

被引:1
|
作者
Abhishek, Kunal [1 ]
Raj, E. George Dharma Prakash [2 ]
机构
[1] Soc Elect Transact & Secur, Chennai, Tamil Nadu, India
[2] Bharathidasan Univ, Tiruchirappalli, Tamil Nadu, India
关键词
Computational approaches; evaluation; cryptography; elliptic curve; ECDLP; security; DISCRETE LOGARITHMS;
D O I
10.2478/cait-2021-0045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology of attacks on Elliptic Curve Discrete Logarithm Problem (ECDLP) and investigate their countermeasures to highlight the evolved selection criteria of cryptographically safe elliptic curves. Further, two popular deterministic and random approaches for selection of Short Weierstrass elliptic curve for cryptography are evaluated from computational, security and trust perspectives and a trend in existent computational standards is demonstrated. Finally, standard and nonstandard elliptic curves are analysed to add a new insight into their usability. There is no such survey conducted in past to the best of our knowledge.
引用
收藏
页码:105 / 118
页数:14
相关论文
共 50 条
  • [1] Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
    Abhishek, Kunal
    Raj, E. George Dharma Prakash
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (02) : 70 - 88
  • [2] Torsion subgroups of elliptic curves in short Weierstrass form
    Bennett, MA
    Ingram, P
    TRANSACTIONS OF THE AMERICAN MATHEMATICAL SOCIETY, 2005, 357 (08) : 3325 - 3337
  • [3] Elliptic curves and cryptography
    Jurisic, Aleksandar
    Menezes, Alfred J.
    Dr. Dobb's Journal of Software Tools for Professional Programmer, 1997, 22 (04):
  • [4] Elliptic curves and cryptography
    Silverman, JH
    Public-Key Cryptography, 2005, 62 : 91 - 112
  • [5] Elliptic curves and cryptography
    Jurisic, A
    Menezes, AJ
    DR DOBBS JOURNAL, 1997, 22 (04): : 26 - +
  • [6] Study on elliptic curves in cryptography
    Eier, R.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2005, 122 (1-2): : 7 - 27
  • [7] Supersingular elliptic curves in cryptography
    Menezes, Alfred
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007, 2007, 4575 : 293 - 293
  • [8] A Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves
    Susella, Ruggero
    Montrasio, Sofia
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2016, 2017, 10146 : 156 - 173
  • [9] DETERMINANTAL REPRESENTATIONS OF ELLIPTIC CURVES VIA WEIERSTRASS ELLIPTIC FUNCTIONS
    Chien, Mao-Ting
    Nakazato, Hiroshi
    ELECTRONIC JOURNAL OF LINEAR ALGEBRA, 2018, 34 : 125 - 136
  • [10] Impossible intersections in a Weierstrass family of elliptic curves
    Mavraki, Niki Myrto
    JOURNAL OF NUMBER THEORY, 2016, 169 : 21 - 40