Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography

被引:1
|
作者
Abhishek, Kunal [1 ]
Raj, E. George Dharma Prakash [2 ]
机构
[1] Soc Elect Transact & Secur, Chennai, Tamil Nadu, India
[2] Bharathidasan Univ, Tiruchirappalli, Tamil Nadu, India
关键词
Computational approaches; evaluation; cryptography; elliptic curve; ECDLP; security; DISCRETE LOGARITHMS;
D O I
10.2478/cait-2021-0045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology of attacks on Elliptic Curve Discrete Logarithm Problem (ECDLP) and investigate their countermeasures to highlight the evolved selection criteria of cryptographically safe elliptic curves. Further, two popular deterministic and random approaches for selection of Short Weierstrass elliptic curve for cryptography are evaluated from computational, security and trust perspectives and a trend in existent computational standards is demonstrated. Finally, standard and nonstandard elliptic curves are analysed to add a new insight into their usability. There is no such survey conducted in past to the best of our knowledge.
引用
收藏
页码:105 / 118
页数:14
相关论文
共 50 条
  • [21] GOOD AND BAD USES OF ELLIPTIC CURVES IN CRYPTOGRAPHY
    Koblitz, Neal
    MOSCOW MATHEMATICAL JOURNAL, 2002, 2 (04) : 693 - 715
  • [22] Pairing-Based Cryptography on Elliptic Curves
    Miret, Josep M.
    Sadornil, Daniel
    Tena, Juan G.
    MATHEMATICS IN COMPUTER SCIENCE, 2018, 12 (03) : 309 - 318
  • [23] Elliptic curves suitable for pairing based cryptography
    Brezing, F
    Weng, AG
    DESIGNS CODES AND CRYPTOGRAPHY, 2005, 37 (01) : 133 - 141
  • [24] A Dual-Core High-Performance Processor for Elliptic Curve Cryptography in GF(p) Over Generic Weierstrass Curves
    Xie, Yujun
    Liu, Yuan
    Zheng, Xin
    Zhu, Wenhao
    Li, Junxian
    Li, Jianzhong
    Cai, Shuting
    Xiong, Xiaoming
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (11) : 4523 - 4527
  • [25] Bi-elliptic Weierstrass points on curves of genus 5
    Kato, T.
    Magaard, K.
    Voelklein, H.
    INDAGATIONES MATHEMATICAE-NEW SERIES, 2011, 22 (1-2): : 116 - 130
  • [26] Same Values Analysis Attack on Weierstrass Binary Elliptic Curves
    Mayeukeu, Aubain Jose
    Fouotsa, Emmanuel
    PROGRESS IN CRYPTOLOGY, AFRICACRYPT 2024, 2024, 14861 : 311 - 326
  • [27] The density of elliptic curves having a global minimal Weierstrass equation
    Bekyel, E
    JOURNAL OF NUMBER THEORY, 2004, 109 (01) : 41 - 58
  • [28] The security of fixed versus random elliptic curves in cryptography
    Hitchcock, Y
    Montague, P
    Carter, G
    Dawson, E
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 55 - 66
  • [29] Selecting elliptic curves for cryptography: an efficiency and security analysis
    Bos, Joppe W.
    Costello, Craig
    Longa, Patrick
    Naehrig, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (04) : 259 - 286
  • [30] The Magic of Elliptic Curves and Public-Key Cryptography
    Florian Heß
    Andreas Stein
    Sandra Stein
    Manfred Lochter
    Jahresbericht der Deutschen Mathematiker-Vereinigung, 2012, 114 (2) : 59 - 88