ABSTRACT
Elliptic curve cryptography (ECC) is a relatively newer form of public key cryptography that provides more security per bit than other forms of cryptography still being used today. We explore the mathematical structure and operations of elliptic curves and how those properties make curves suitable tools for cryptography. A brief historical context is given followed by the safety of usage in production, as not all curves are free from vulnerabilities. Next, we compare ECC with other popular forms of cryptography for both key exchange and digital signatures, in terms of security and speed. Traditional applications of ECC, both theoretical and in-practice, are presented, including key exchange for web browser usage and DNSSEC. We examine multiple uses of ECC in a mobile context, including cellular phones and the Internet of Things. Modern applications of curves are explored, such as iris recognition, RFID, smart grid, as well as an application for E-health. Finally, we discuss how ECC stacks up in a post-quantum cryptography world.
- James S. Milne. 2006. Elliptic Curves. BookSurge Publishing, Charleston, SC.Google Scholar
- Alfred J. Menezes, Tatsuaki Okamoto, and Scott A. Vanstone. 2002. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. IEEE Transactions on Information Theory 39, 5 (Aug. 2002), 1639--1646. Google Scholar
Digital Library
- Neal Koblitz. 1987. Elliptic Curve Cryptosystems. Mathematics of Computation 48, 177 (Jan. 1987), 203--209.Google Scholar
Cross Ref
- Victor S. Miller. 1985. Use of Elliptic Curves in Cryptography. In CRYPTO '85 Advances in Cryptology. Springer-Verlag, 417--426. Google Scholar
Digital Library
- M. Sudhakar, R.V. Kamala, and M.B. Srinivas. 2007. A Unified, Reconfigurable Architecture for Montgomery Multiplication in Finite Fields GF(p) and GF(2^n). In 20th International Conference on VLSI Design held jointly with 6th International Conference on Embedded Systems (VLSID'07). IEEE, Bangalore, India, 750--755. Google Scholar
Digital Library
- Jean Karim Zinzindohoué, Evmorfia-Iro Bartzia, and Karthikeyan Bhargavan. 2016. A Verified Extensible Library of Elliptic Curves. In 2016 IEEE 29th Computer Security Foundations Symposium (CSF). IEEE, Lisbon, 296--309.Google Scholar
Cross Ref
- Daniel J. Bernstein. 2006. Curve25519: New Diffie-Hellman Speed Records. In International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg, 207--228. Google Scholar
Digital Library
- Elaine B. Barker, William C. Barker, William E. Burr, William T. Polk, and Miles E. Smid. 2007. Recommendation for Key Management - Part 1: General (Revision 3). National Institute of Standards & Technology, Gaithersburg.Google Scholar
- Non Thiranant, Young Sil Lee, and Hoonjae Lee. 2015. Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication. In 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops. IEEE, Gwangiu, 278--282. Google Scholar
Digital Library
- OpenSSL. 2016. OpenSSL Cryptography and SSL/TLS Toolkit. (December 2016). Retrieved from https://www.openssl.org/Google Scholar
- Alexa. 2016. Alexa Top 500 Global Sites. (December 2016). Retrieved from http://www.alexa.com/topsitesGoogle Scholar
- Roland van Rijswijk-Deij, Kaspar Hageman, Anna Sperotto, and Aiko Pras. 2016. The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation. IEEE/ACM Transactions on Networking PP, 99 (Sep. 2016), 1--13.Google Scholar
- Wuqiong Pan, Fangyu Zheng, Yuan Zhao, Wen-Tao Zhu, and Jiwu Jing. 2016. An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. IEEE Transactions on Information Forensics and Security 12, 1 (Aug. 2016), 111--122. Google Scholar
Digital Library
- Alavalapati Goutham Reddy, Ashok Kumar Das, Eun-Jun Yoon, and Kee-Young Yoo. 2016. A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. IEEE Access 4 (July 2016), 4394--4407.Google Scholar
- Pranjali Deepak Nikam and Vanita Raut. 2015. Improoved MANET Security Using Elliptic Curve Cryptography and EAACK. In 2015 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, Jabalpur, 1125--1129.Google Scholar
- V L Shivraj, M A Rajan, Meena Singh, and P Balamuralidhar. 2015. One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW). IEEE, Riyadh, 1--6.Google Scholar
Cross Ref
- Tarun Kumar Goyal and Vineet Sahula. 2016. Lightweight Security Algorithm for Low Power IoT Devices. In 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, Jaipur, 1725--1729.Google Scholar
- Debiao He, Huaqun Wang, Muhammad Khurram Khan, and Lina Wang. 2016. Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Communications 10, 14 (Sep. 2016), 1795--1802.Google Scholar
Digital Library
- Amit Dua, Neeraj Kumar, Mukesh Singh, M. S. Obaidat, and Kuei-Fang Hsiao. 2016. Secure Message Communication Among Vehicles Using Elliptic Curve Cryptography in Smart Cities. In 2016 International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE, Kunming, 1--6.Google Scholar
- Mustapha Benssalah, Mustapha Djeddou, and Karim Drouiche. 2016. Design and Implementation of a New Active RFID Authentication Protocol Based on Elliptic Curve Encryption. In 2016 SAI Computing Conference (SAI). IEEE, London, 1076--1081.Google Scholar
Cross Ref
- Sasank Venkata Vishnubhatla. 2015. An Elliptic Curve Algorithm for Iris Pattern Recognition. In 2015 Annual Global Online Conference on Information and Computer Technology (GOCICT). IEEE, Louisville, KY, 51--59.Google Scholar
- Bart Preneel. 1993. Analysis and Design of Cryptographic Hash Functions.Google Scholar
- Golnaz Sahebi, Amin Majd, Masoumeh Ebrahimi, Juha Plosila, Jaber Karimpour, and Hannu Tenhunen. 2016. SEECC: A Secure and Efficient Elliptic Curve Cryptosystem for E-health Applications. In 2016 International Conference on High Performance Computing & Simulation (HPCS). IEEE, Innsbruck, 492--500.Google Scholar
- Peter W. Shor. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing 26, 5 (Oct. 1997), 1484--1509. Google Scholar
Digital Library
- Lieven M. K. Vandersypen, Matthias Steffen, Gregory Breyta, Costantino S. Yannoni, Mark H. Sherwood, and Isaac L. Chuang. 2001. Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance. Nature 414, 6866 (Dec. 2001), 883--887.Google Scholar
Cross Ref
- Nikesh S. Dattani and Nathaniel Bryans. 2014. Quantum factorization of 56153 with only 4 qubits. (November 2014). Retrieved from https://arxiv.org/abs/1411.6758v3Google Scholar
- John Proos and Christof Zalka. 2003. Shor's discrete logarithm quantum algorithm for elliptic curves. Quantum Information & Computation 3, 4 (July 2003), 317--344. Google Scholar
Digital Library
- Chaohui Du and Guoqiang Ba. 2016. High-Performance Software Implementation of Discrete Gaussian Sampling for Lattice-Based Cryptography. In 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference. IEEE, Chongqing, 220--224.Google Scholar
- Li Tian and Wansu Bao. 2010. A Medium Field Multivariate Public Key Signature Scheme with External Perturbation. In 2010 Third International Symposium on Intelligent Information Technology and Security Informatics. IEEE, Jinggangshan, 753--757. Google Scholar
Digital Library
- Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani, and David Jao. 2016. Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves. IEEE Transactions on Circuits and Systems I: Regular Papers 64, 1 (Oct. 2016), 86--99.Google Scholar
Index Terms
Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications
Recommendations
Elliptic curve cryptography: survey and its security applications
ACAI '11: Proceedings of the International Conference on Advances in Computing and Artificial IntelligenceElliptic curve cryptosystems are based on ECDLP (Elliptic curve discrete logarithm problem) for their security. The best known method to solve ECDLP (pollard's rho algorithm) is fully exponential therefore Elliptic Curve Cryptosystems require ...
Performance analysis of elliptic curve cryptography for SSL
WiSE '02: Proceedings of the 1st ACM workshop on Wireless securityElliptic Curve Cryptography (ECC) is emerging as an attractive public-key cryptosystem for mobile/wireless environments. Compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster ...
Timestamp based authentication protocol for smart card using ECC
WISM'11: Proceedings of the 2011 international conference on Web information systems and mining - Volume Part IElliptic Curve Cryptography is one of the most suitable public key techniques for its small key size and high security and is suitable for secure access of Smart Card. Smart Card based authentication plays a critical role in communication network as ...





Comments