SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
A SURVEY ON ELLIPTIC CURVE CRYPTOGRAPHY (ECC)
                 Sonali U Nimbhorkar                                                            Dr.L.G.Malik
            Computer Science &Engineering                                             Computer Science &Engineering
          G.H.Raisoni College of Engineering                                        G.H.Raisoni College of Engineering
                     Nagpur, India                                                             Nagpur, India
               nimsonali12@yahoo.com                                                     lgmalik@rediffmail. com

                                                                      of individuals to access network services. Elliptic curve
Abstract— Now a days Elliptic Curve Cryptography is an                cryptography is more complex than RSA.As in RSA single
promising type of public key cryptography that provides               encryption algorithms is used.ECC can be implemented in
compensation by comparing with other public key algorithms like       different ways.ECC uses arithmetic algorithms as the main
RSA, Diffie-Hellman key exchange and DSA. Understanding the           objective operations for high level security functions such as
use of public key cryptography which makes potential use of           encryption for gaining confidentiality and digital signature
discrete logarithms problem. The security of ECC depends on the
difficulty of Elliptic Curve Discrete Logarithm. The elliptic curve
                                                                      for authentication.ECC can be implemented in software and
cryptography offers security more than sufficient with smaller key    in hardware . ECC follows generic procedure like parties
length. This paper provides brief explanation of Elliptic Curve       agree on publicly-known data items and each user generates
Cryptography over Galois field.                                       their public and private keys[8][9][10][12][21][23] .
                                                                         The rest of this paper is organized as follows : Section II
Keywords-elliptic curve      cryptography,security;   finite field;   describes overview of mathematical background for elliptic
elliptic curve;                                                       curve , definition of elliptic curves, major operations
                                                                      performed in elliptic curves cryptography in section III,
                        I.     INTRODUCTION                           discuss main security consideration for elliptic curve
                                                                      cryptography , comparison of ECC with RSA in section IV
Cryptography is the art and science of hiding information in a        ,and section V analyze the implementation consideration of
systematic manner such that only authorized parties have              ECC for communication network, elliptic curve applications
access to right information. Cryptosystem broadly classified          is explained in section VI. Finally ,conclusion is described in
into two major categories, first is symmetric and other is            section VII.
asymmetric based on the concepts of key. In symmetric use
same key is used for both encryption and decryption
purpose. It is also called as secret key cryptosystems. While          II.     MATHEMATICAL BACKGROUND
Asymmetric use two different keys, one is for encryption              An elliptic curve over a field K of characteristic ≠ 2, 3 is
and another is used for decryption. Asymmetric is also                given by an equation of the form
known as public key cryptosystem. Elliptic curve
cryptography was independently introduced by Neal Koblitz
                                                                             E : y2 = x3 + ax + b, with a, b  ε K--------------------1
& Victor S.Miller in 1985 and 1987[12].Elliptic curve
cryptography transforms a mathematical problem in to an
                                                                             and    Δ = −16(4a3 + 27b2) ≠ 0------------------------2
applicable computer algorithm. Intractable problems are the
center of public key cryptography and bring computationally
                                                                      where Δ Discriminant function .
demanding operations into a cryptosystem. curve
                                                                      From equation 2 ,this equation represents a non-singular
cryptography (ECC) is based upon the algebraic structure of
                                                                      elliptic curve; otherwise ,the equation represented a singular
elliptic curves over finite field. The main advantage of ECC
                                                                      elliptic curve .Discriminants of elliptic curves classified the
over other public key algorithms like RSA,DSA and Diffie-
                                                                      curves into two types. In non-singular elliptic curve ,the
Hellman key exchange. It requires shorter key lengths for
                                                                      equation x3+ax+b=0 has three different roots ;in a singular
make sure the same level of security . For example , 160 bit
                                                                      elliptic curve the equation x3+ax+b=0 does not have three
key in ECC is considered to be as secured as 1024 bit key in
                                                                      different roots[8][9][10].
RSA. Other than this ECC in particularly appropriate for
                                                                      The set of K-rational points of an elliptic curve is
wireless communication. Elliptic Curve Cryptography has
become the cryptographic choice for networks and                      E(K) = {(x, y) ε K × K ; y2 = x3 + ax + b}U {O}
communication devices due to its size and efficiency
benefits. Elliptic curve cipher uses very small keys and is           In the general case, we consider the long Weierstrass form
computationally very efficient, which makes it ideal for the
smaller, less powerful devices being used today by majority
y2 + a1xy + a3y = x3 + a2x2 + a4x + a6,
         where a1, a2, a3, a4, a6 ε K.
It is popularly known that E is an abelian group with the
point ∞ serving as its identity element. The rules for group
addition are summarized below[7][8].
The major operation in elliptic curve cryptography is the
scalar multiplication .Scalar multiplication has the form k.P

   k. P → [k]P = P + · · · + P, (k times)                                    Figure2.Group laws on elliptic curve

   Where k is a positive integer ,                                Figure2 shows the addition of two points on an elliptic curve.
        P is the point on elliptic curve .                       Elliptic curves have the interesting property that adding two
                                                                 points on the elliptic curve results a third point on the curve.
Computation of k.P means adding point P exactly k-1 times        Therefore, adding two points, P1 and P2, gets us to point P3,
to itself ,which resulting into other point Q on the elliptic    also on the curve. Small changes in P1 or P2 can cause a large
curve .When points P and Q are given ,to recover k such          change in the position of P3.
operation is known as the elliptic curve discrete logarithm      Point addition is the addition of two points J and K on an
problem. In general scalar multiplication is performed by the    elliptic curve to obtain another point L on the same elliptic
combination of point additions and point doublings.              curve as shown in figure 3and point doubling Point doubling
Elliptic curve arithmetic is defined in terms of underlying      is the addition of a point J on the elliptic curve to itself to
finite field which is a set of elements that have a finite       obtain another point L as shown in figure 4.
order .The most popular finite fields used in ECC are Galois
Fields (GF) that defined modulo prime number GF (p) or a
binary extension fields GF (2m)[8].




                                                                 Figure3. Group laws of Elliptic Curve (point addition)


             Figure1. Classes of Elliptic Curves
As shown in figure 1 two families of elliptic curves are used
in cryptographic applications like prime curves GF(p) and
binary curves over GF(2m).In prime curve ,use a cubic
equation which takes variables and coefficients values in
the set of integers from o to p-1 and performed the
calculations using modulo p . In binary curve ,the variables
and coefficients uses values in GF(2m) and performed the
calculations over GF(2m).
  Cryptography needs modular arithmetic for addition
                                                                   Figure4. Group laws of Elliptic Curve(point doubling)
operation , algebraic structure like group and field. The
group defines the set of the points on the elliptic curves and
the addition operation on the points. The field defines the
addition ,subtraction ,multiplication ,and division that are
required for determining the addition of the points in the
group.
III.   ELLIPTIC CURVE CRYPTOGRAPHY                   methods remove the conditional branches through executing
                                                                    a point doubling and an addition whatever the key bit is. Thus
A. Scalar Multiplication                                            the Montgomery and Double-and-Add-Always methods are
The most time consuming operation in elliptic curve                 often used to defeat SPA attacks. Other SPA-resistant
cryptography is point multiplication or scalar multiplication ,     methods include the Double-and-Add-Balanced method,
For speeding up this process, numerous approaches, methods,         which balance point doubling and addition by means of
and algorithms exist, like Selection of an underlying finite        dummy operations insertion in the Binary method[2][8].
field which is suitable for fast implementation in software as      The primary scalar multiplication method used by Ecclib was
well as in hardware, Selection of a representation of the           developed by Lopez and Dahab. This method has been
underlying finite field. The purpose is to select such              measured by most researchers to be the most efficient
representation, which provides the fastest arithmetic in the        Algorithm for polynomial bases because once the point is
field. This is possible due to the existence of some                improved to Montgomery projective coordinates,
representations of finite fields that have computational            Calculations can subsequently be performed only on x and
advantages over the other representations, Selection of an          z.Once the result has been computed, the resulting y value
elliptic curve[2][6][21]. Numerous modifications of the             can be computed through post processing. Furthermore, it is
general elliptic curve equation 1 , Selection of a point            very efficient as it requires only six multiplications per bit of
representation that the speed of point exponentiation. Point        the scalar and can be supplementary optimized to require
representations done using coordinates system can even be           only five multiplications per bit for Koblitz curves[6][20]
mixed to achieve best performance throughout the run of an          [21].
exponentiation algorithm. Efficiency of an algorithm can be         C. Various forms of coordinate system for point
described from two basic points of view memory                          representation
requirements and computational difficulty. Memory
requirements are basically the needs of certain size of the         A coordinate system is a organization which uses one or
memory for performing operation.                                    more numbers, or coordinates, to distinctively determine the
                                                                    position of a point or other geometric constituent on a
                                                                    manifold such as Euclidean space. The use of a coordinate
B. Schemes for Scalar Multiplication                                system allows problems in geometry to be translated into
    There are different ways to implement scalar                    problems about numbers and vice versa.
    multiplication     like         Binary       ,Signed    digit   An elliptic curve can be represented by several coordinate
    representation(NAF),Montgomery method .There are                systems [11]. Following are descriptions of coordinates
    three       different phases to performed scalar                system. Point additions(PA) and point doublings(PD) can be
    multiplication .At the top level, select the method for         implemented using following coordinate system[5][6]
    computation the scalar multiplication ,middle layer                  • Affine coordinate system
    decides underlying use of finite field and coordinate                • Standard projective
    system and at the lower level finite field arithmetic is             • Standard projective and affine
    performed. Different possible ways to perform scalar                 • Jacobian projective
    multiplication are as follows[1][2][3][16][18] :                     • Jacobian projective and affine
     • Right to left binary method                                       • Lopez –Dahab
     • Left to right binary method                                  The affine coordinates system considered the normal form
     • Non Adjacent Form                                            Hessian curve without any projection to produce the value of
     • Width w Non Adjacent Form                                    the point doubling represented as P3= (x3, y3). By Using the
     • Joint Sparse Form                                            point-slope (m) equation y=mx + c [6].
     • Double and add form                                          Where m is the gradient of line.
     • Addition chains                                                       c is the y-intercept.
     • Fibonacci and add                                            Affine coordinate system needs field inversion in the both
     • Montgomery method                                            Point additions (PA) and point doublings (PD),whereas other
The binary method is simplest method used for scalar                coordinate system do not need it.  Inversions are very
multiplication .It scans every bit of scalar k and depending        exclusive that can be take out by changing the representation
upon bits value,0 or 1,it performs point doubling operation or      of the points. In some different coordinate systems, points on
both point doubling and point addition and an point addition.       a curve can be added without inversions[14][22].
The Binary method consists of a point doubling operation if         (x; y) →(X; Y ; Z)
the key bit is ‘0’, and a point doubling followed by a point
addition operation if the key bit is ‘1’. If the power pattern of      Transformation: x = X/Zc and y = Y /Zd
point doubling is different from that of point addition,
attackers can easily retrieve the secret key from a single             Where c ,d are multiplier parameters
power trace [3]. Montgomery and Double-and-Add-Always
D. Types of curves                                               working ECC system like EC Parameters generation ,
There are two kinds of curves are given in general[10][12] :     Selection of Parameter set, Level of security, Interoperability,
                                                                 Performance, Application Level Issues, Device Level
    •     Pseudo-random curves are those whose coefficients      Issues .For ECC implementation following point of
         are generated from the output of a seeded               consideration should assemble[1][2][4][25]
         cryptographic hash.                                         • Exactness of methods available for optimizing finite
                                                                          field arithmetic like addition, multiplication,
    •    Special curves whose coefficients and essential field            squaring, and inversion.
         have been preferred to optimize the efficiency of the
         elliptic curve operations.                                  •     Exactness of methods available for optimizing
                                                                           elliptic curve arithmetic like point addition, point
         IV.   SECURITY OF ELLIPTIC CURVE CRYPTOGRAPHY                     doubling, and scalar multiplication.
As RSA depends on the difficulty of large-number                       •     Application platform like software, hardware, or
factorization for its security, ECC depends on the difficulty of
                                                                           firmware.
the large number discrete logarithm calculation. This is
referred to as the Elliptic Curve Discrete Logarithm Problem
(ECDLP). Elliptic curves for which the total number of points        •     Constraints of a particular computing environment
on the curve equals the number of essentials in the primary                e.g., processor speed, storage, code size, gate count,
finite field are also considered cryptographically pathetic.                 power consumption.
Again the security of ECC depends upon how to calculate k
when point is given in scalar multiplication [10][4].                •     Constraints of a particular communications
                                                                           environment e.g., bandwidth, response time.
TABLE I. EQUIVALENT KEY SIZES FOR SYMMETRIC ,ECC AND
RSA
                                                                 Efficiency of ECC is depends upon factors such as
   Symmetric       Elliptic      curve    RSA/DSA(modulus        computational outlay ,key size ,band width ,ECC provides
   scheme(key      cryptography based     size in bits)          higher-strength per- bit which include higher speeds, smaller
   size in bits)   schemes (key size in                          power consumption, bandwidth reserves, storage efficiencies,
                   bits)                                         and smaller certificates[13][20].
   56              112                    512
   80              160                    1024                           VI.   APPLICATIONS OF ELLIPTIC CURVE CRYPTOGRAPHY

   112             224                    2048                   Applications of ECC includes the implementation of ECC
   128             256                    3072                   for web’s security infrastructure ,integration in openSSL, and
   192             384                    7680                   for the implementation cryptographic algorithms and
   256             512                    15360                  protocols[1].
                                                                 Many devices are constrained devices that have small and
Table I shows the Comparison between symmetric and               restricted storage and computational power ,for constrained
asymmetric algorithms such AES ,ECC ,and RSA . Same              devices ECC can be applied[3][11].ECC can be functional
level of security ,data sizes ,encrypted message sizes and       For wireless communication devices like PDA’s ,multimedia
computational power .The security levels which is given by       cellular phones .It can be used for security of Smart cards
RSA can be provided by smaller keys of elliptic curve            ,wireless sensor networks ,wireless mesh networks. Web
cryptosystem[3][21][17].                                         servers that need to handle many encryption sessions. Any
                                                                 kind application where security is needed for our current
    For providing security mechanism will require                cryptosystems. In public-key cryptosystem for secret key
fundamental basic security services such as authentication,      sharing offers Diffie-Hellman protocol ,in order to implement
confidentiality, non-repudiation and message integrity.          Diffie-Hellman protocol scalar multiplication is used[1][2]
Authentication confirms the identity of the party involved in    [18].
communication, confidentiality assures that only intended
receiver should able to understand the contents of transmitted                          VII.   CONCLUSION
message ,message integrity guarantees that the messages is
not altered and non-repudiation ensures proofers of              Elliptic curve systems are progressively more seen as an
communication[5][7][11] .                                        alternative to RSA, relatively than a replacement. The
                                                                 primary motive for the magnetism over RSA and DSA is
  V.     IMPLEMENTATION ISSUES IN ELLIPTIC CURVE CRYPTOGRAPHY    that the best algorithm known for solving underlying use of
There are many issues to be discussed between the                ECDLP which takes fully exponential time than other public
mathematical basis for an ECC scheme and a practical             key cryptosystem. There are prospective advantages,
particularly when used in devices with limited processing                      [11] Xue Sun ,Mingping Xia “An improved proxy signature based on
                                                                                    elliptic curve cryptography” DOI10.1109/ICCCS.2009.36
capability and/or memory. Representative applications
                                                                               [12] www.certicom.com
includes m-commerce (e.g.         mobile phone, hand-held
                                                                               [13] Jithra Adikari “Efficient Algorithms For Elliptic Curve
devices) smart card systems, e-commerce and banking                                 Cryptography” Ph.D Thesis , Department Of Electrical & Computer
applications (e.g. SET) internet based applications (e.g. SSL)                      Engineering,Calgary University, Alberta January, 2011.
.There are, however, some problems and issues that are                         [14] E.Munivel,Dr G M Ajit “Efficient Public Key Infrastructure
inhibiting the widespread adoption of elliptic curve                                Implementation in Wireless Sensor Networks” 2010 IEEE.
systems[18][19][3] [13].                                                       [15] A. Chandrasekar, V.R. Rajasekar & V. Vasudevan “Improved
                                                                                    Authentication and Key Agreement Protocol Using Elliptic Curve
                                                                                    Cryptography” International Journal of Computer Science and
                                                                                    Security (IJCSS), Volume (3): Issue (4)
                               REFERENCES
                                                                               [16] Vassil Dimitrov, Laurent Imbert, And Pradeep K. Mishra “The
                                                                                    Double-Base Number System And Its Application To Elliptic Curve
 [1]  Andrej Dujella “Applications of Elliptic Curves in Public Key                 Cryptography”MATHEMATICS OF COMPUTATIONS 0025-
      Cryptography “Basque Center for Applied Mathematics and                       5718(07)02048-0,Article electronically published on December 11,
      Universidad del Pais Vasco / Euskal HerrikoUnibertsitatea, Bilbao,            2007
      May 2011.                                                                [17] Mathias Schmalisch, Dirk Timmermann “Comparison of Algorithms
 [2] Moncef Amara ,Amar siad “Elliptic Curve Cryptography and its                   for Finite Fields of GF(2m)”,The IASTED International Conference
      application”7th international workshop on systems ,signal processing          on Communication, Network, and Information Security.CNIS 2003,
      and their applications(WOSSPA)IEEE 2011                                       December 10-12, 2003New york,USA.
 [3] Tingding Chen, Huiyun Li, Keke Wu, Fengqi Yu “Evaluation                  [18] Dr.R.Shanmugalakshmi ,M.Prabu” Research Issues on Elliptic Curve
      Criterion Of Side-Channel Countermeasures For Elliptic Curve” 978-            Cryptography and Its applications”IJCSNS International Journal of
      0-7695-3906-5/09 2009 IEEE.                                                   Computer Science and Network Security, VOL.9 No.6, June 2009.
 [4] Philip Hines”Improvements to an Efficient Implementation of an            [19] Michael Naehrig “Pairings on elliptic curves – parameter selection
      Elliptic Curve Cryptosystem over a Binary Galois Field in the                 and efficient computation”, Workshop on Elliptic Curve Computation
      Polynomial Basis” Hines_Summer_2007_report.pdf                                ,Redmond, 19 October 2010
 [5] Zhi Li, John Higgins, Mark Clement “ Performance of Finite Field          [20] Pardeep Malik “Elliptic Curve Cryptography For Security Inwireless
      Arithmetic in an Elliptic Curve Cryptosystem”                                 Networks”Statistics 2011 Canada: 5th Canadian Conference in
 [6] Fahad Bin Muhaya, Qasem Abu Al-Haija, and Lo'ai Tawalbeh”                      Applied Statistics/ 20th conference of the Forum for Interdisciplinary
      Applying Hessian Curves in Parallel to improve Elliptic Curve Scalar          Mathematics -Interdisciplinary Mathematical Statistical Techniques,
      Multiplication Hardware”.International Journal of Security and Its            July 1-4-2011, Concordia University, Montreal, Quebec, Canada.
      Applications Vol. 4, No. 2, April, 2010                                  [21] Guicheng Shen ,Bingwu Liu”Research on Efficiency of computing
 [7]   Samta Gajbhiye, Monisha Sharma, Samir Dashputre “A Survey                    kP in Elliptic Curve System” .,supported by funding project for
      Report on Elliptic Curve Cryptography” International Journal of               science and technology program Beijing,2010 under grant
      Electrical and Computer Engineering (IJECE) Vol.1, No.2, December             numberKM20101010037002.
      2011, pp. 195~201 ISSN: 2088-8708.                                       [22] SECG SEC1, “Elliptic Curve Cryptography, Standards for Efficient
 [8] D. Sravana Kumar “CRYPTOGRAPHIC PROTOCOLS USING                                Cryptography             Group,          ver.          2,       2009,
      ELLIPTIC CURVE OVER FINITE FIELDS “International Journal                      http://www.secg.org/download/aid-780/sec1-v2.pdf.
      of Engineering Science and Technology (IJEST) ISSN : 0975-5462           [23] Sheueling Chang, Hans Eberle, Vipul Gupta, Nils Gura, Sun
      Vol. 4 No.01 January 2012                                                     Microsystems Laboratories "HowECCWorks-USLetter.pdf
 [9] Behrouz A Forouzan,Debdeep Mukhopadhayay “A text book of                  [24] http://cse.iitkgp.ac.in/~debdeep/pres/TI/ecc.ppt
      Cryptography and Network security”,second edition 2011.                  [25] Abdahossein        rezai,parviz   kashvarzi      “high    performance
 [10] William Stallings, “A text book of Cryptography and Network                   implementation approach of elliptic curve cryptosystem for wireless
      security”, Principles and practices, Pearson education, fourth edition        network applications,978-1-61284-459-6/11,IEEE 2011
      2007.

Más contenido relacionado

La actualidad más candente

Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
Editor IJARCET
 
Fcv learn yu
Fcv learn yuFcv learn yu
Fcv learn yu
zukun
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
guest3f9c6b
 

La actualidad más candente (16)

Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
 
Genetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher EncryptionGenetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher Encryption
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
 
AbdoSummerANS_mod3
AbdoSummerANS_mod3AbdoSummerANS_mod3
AbdoSummerANS_mod3
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
Implementation of Efficiency CORDIC Algorithmfor Sine & Cosine Generation
Implementation of Efficiency CORDIC Algorithmfor Sine & Cosine GenerationImplementation of Efficiency CORDIC Algorithmfor Sine & Cosine Generation
Implementation of Efficiency CORDIC Algorithmfor Sine & Cosine Generation
 
Cs6701 cryptography and network security
Cs6701 cryptography and network securityCs6701 cryptography and network security
Cs6701 cryptography and network security
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoder
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
Fe25959964
Fe25959964Fe25959964
Fe25959964
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...
 
Fcv learn yu
Fcv learn yuFcv learn yu
Fcv learn yu
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
 
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...
 
Kernel Recipes 2016 - Video and Colorspaces
Kernel Recipes 2016 - Video and ColorspacesKernel Recipes 2016 - Video and Colorspaces
Kernel Recipes 2016 - Video and Colorspaces
 
Ki2518101816
Ki2518101816Ki2518101816
Ki2518101816
 

Similar a Survey ecc 09june12

elliptic-curves-modern
elliptic-curves-modernelliptic-curves-modern
elliptic-curves-modern
Eric Seifert
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...
CSITiaesprime
 
Image encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherImage encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipher
karthik kedarisetti
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
Nithin Cv
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
Editor IJARCET
 

Similar a Survey ecc 09june12 (20)

Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
elliptic-curves-modern
elliptic-curves-modernelliptic-curves-modern
elliptic-curves-modern
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
Modified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCModified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECC
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
 
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
 
Elliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsubaElliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsuba
 
A Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve CryptographyA Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve Cryptography
 
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
 
Image encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherImage encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipher
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
 

Más de IJASCSE

A Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningA Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and Learning
IJASCSE
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
IJASCSE
 
Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...
IJASCSE
 
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
IJASCSE
 
Evaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsEvaluation of Exception Handling Metrics
Evaluation of Exception Handling Metrics
IJASCSE
 
An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...
IJASCSE
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
IJASCSE
 
Portfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelPortfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz model
IJASCSE
 

Más de IJASCSE (20)

Inter Time Series Sales Forecasting
Inter Time Series Sales ForecastingInter Time Series Sales Forecasting
Inter Time Series Sales Forecasting
 
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
 
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
 
Improving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudImproving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure Cloud
 
Four Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape SignatureFour Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape Signature
 
Theoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsTheoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel Sections
 
Improved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansImproved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-Means
 
A Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningA Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and Learning
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
 
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsDesign Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
 
A Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerA Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layer
 
Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...
 
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
 
Evaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsEvaluation of Exception Handling Metrics
Evaluation of Exception Handling Metrics
 
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
 
An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
 
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
 
Portfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelPortfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz model
 

Último

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Survey ecc 09june12

  • 1. A SURVEY ON ELLIPTIC CURVE CRYPTOGRAPHY (ECC) Sonali U Nimbhorkar Dr.L.G.Malik Computer Science &Engineering Computer Science &Engineering G.H.Raisoni College of Engineering G.H.Raisoni College of Engineering Nagpur, India Nagpur, India nimsonali12@yahoo.com lgmalik@rediffmail. com of individuals to access network services. Elliptic curve Abstract— Now a days Elliptic Curve Cryptography is an cryptography is more complex than RSA.As in RSA single promising type of public key cryptography that provides encryption algorithms is used.ECC can be implemented in compensation by comparing with other public key algorithms like different ways.ECC uses arithmetic algorithms as the main RSA, Diffie-Hellman key exchange and DSA. Understanding the objective operations for high level security functions such as use of public key cryptography which makes potential use of encryption for gaining confidentiality and digital signature discrete logarithms problem. The security of ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. The elliptic curve for authentication.ECC can be implemented in software and cryptography offers security more than sufficient with smaller key in hardware . ECC follows generic procedure like parties length. This paper provides brief explanation of Elliptic Curve agree on publicly-known data items and each user generates Cryptography over Galois field. their public and private keys[8][9][10][12][21][23] . The rest of this paper is organized as follows : Section II Keywords-elliptic curve cryptography,security; finite field; describes overview of mathematical background for elliptic elliptic curve; curve , definition of elliptic curves, major operations performed in elliptic curves cryptography in section III, I. INTRODUCTION discuss main security consideration for elliptic curve cryptography , comparison of ECC with RSA in section IV Cryptography is the art and science of hiding information in a ,and section V analyze the implementation consideration of systematic manner such that only authorized parties have ECC for communication network, elliptic curve applications access to right information. Cryptosystem broadly classified is explained in section VI. Finally ,conclusion is described in into two major categories, first is symmetric and other is section VII. asymmetric based on the concepts of key. In symmetric use same key is used for both encryption and decryption purpose. It is also called as secret key cryptosystems. While II. MATHEMATICAL BACKGROUND Asymmetric use two different keys, one is for encryption An elliptic curve over a field K of characteristic ≠ 2, 3 is and another is used for decryption. Asymmetric is also given by an equation of the form known as public key cryptosystem. Elliptic curve cryptography was independently introduced by Neal Koblitz E : y2 = x3 + ax + b, with a, b  ε K--------------------1 & Victor S.Miller in 1985 and 1987[12].Elliptic curve cryptography transforms a mathematical problem in to an and Δ = −16(4a3 + 27b2) ≠ 0------------------------2 applicable computer algorithm. Intractable problems are the center of public key cryptography and bring computationally where Δ Discriminant function . demanding operations into a cryptosystem. curve From equation 2 ,this equation represents a non-singular cryptography (ECC) is based upon the algebraic structure of elliptic curve; otherwise ,the equation represented a singular elliptic curves over finite field. The main advantage of ECC elliptic curve .Discriminants of elliptic curves classified the over other public key algorithms like RSA,DSA and Diffie- curves into two types. In non-singular elliptic curve ,the Hellman key exchange. It requires shorter key lengths for equation x3+ax+b=0 has three different roots ;in a singular make sure the same level of security . For example , 160 bit elliptic curve the equation x3+ax+b=0 does not have three key in ECC is considered to be as secured as 1024 bit key in different roots[8][9][10]. RSA. Other than this ECC in particularly appropriate for The set of K-rational points of an elliptic curve is wireless communication. Elliptic Curve Cryptography has become the cryptographic choice for networks and E(K) = {(x, y) ε K × K ; y2 = x3 + ax + b}U {O} communication devices due to its size and efficiency benefits. Elliptic curve cipher uses very small keys and is In the general case, we consider the long Weierstrass form computationally very efficient, which makes it ideal for the smaller, less powerful devices being used today by majority
  • 2. y2 + a1xy + a3y = x3 + a2x2 + a4x + a6, where a1, a2, a3, a4, a6 ε K. It is popularly known that E is an abelian group with the point ∞ serving as its identity element. The rules for group addition are summarized below[7][8]. The major operation in elliptic curve cryptography is the scalar multiplication .Scalar multiplication has the form k.P k. P → [k]P = P + · · · + P, (k times) Figure2.Group laws on elliptic curve Where k is a positive integer , Figure2 shows the addition of two points on an elliptic curve. P is the point on elliptic curve . Elliptic curves have the interesting property that adding two points on the elliptic curve results a third point on the curve. Computation of k.P means adding point P exactly k-1 times Therefore, adding two points, P1 and P2, gets us to point P3, to itself ,which resulting into other point Q on the elliptic also on the curve. Small changes in P1 or P2 can cause a large curve .When points P and Q are given ,to recover k such change in the position of P3. operation is known as the elliptic curve discrete logarithm Point addition is the addition of two points J and K on an problem. In general scalar multiplication is performed by the elliptic curve to obtain another point L on the same elliptic combination of point additions and point doublings. curve as shown in figure 3and point doubling Point doubling Elliptic curve arithmetic is defined in terms of underlying is the addition of a point J on the elliptic curve to itself to finite field which is a set of elements that have a finite obtain another point L as shown in figure 4. order .The most popular finite fields used in ECC are Galois Fields (GF) that defined modulo prime number GF (p) or a binary extension fields GF (2m)[8]. Figure3. Group laws of Elliptic Curve (point addition) Figure1. Classes of Elliptic Curves As shown in figure 1 two families of elliptic curves are used in cryptographic applications like prime curves GF(p) and binary curves over GF(2m).In prime curve ,use a cubic equation which takes variables and coefficients values in the set of integers from o to p-1 and performed the calculations using modulo p . In binary curve ,the variables and coefficients uses values in GF(2m) and performed the calculations over GF(2m). Cryptography needs modular arithmetic for addition Figure4. Group laws of Elliptic Curve(point doubling) operation , algebraic structure like group and field. The group defines the set of the points on the elliptic curves and the addition operation on the points. The field defines the addition ,subtraction ,multiplication ,and division that are required for determining the addition of the points in the group.
  • 3. III. ELLIPTIC CURVE CRYPTOGRAPHY methods remove the conditional branches through executing a point doubling and an addition whatever the key bit is. Thus A. Scalar Multiplication the Montgomery and Double-and-Add-Always methods are The most time consuming operation in elliptic curve often used to defeat SPA attacks. Other SPA-resistant cryptography is point multiplication or scalar multiplication , methods include the Double-and-Add-Balanced method, For speeding up this process, numerous approaches, methods, which balance point doubling and addition by means of and algorithms exist, like Selection of an underlying finite dummy operations insertion in the Binary method[2][8]. field which is suitable for fast implementation in software as The primary scalar multiplication method used by Ecclib was well as in hardware, Selection of a representation of the developed by Lopez and Dahab. This method has been underlying finite field. The purpose is to select such measured by most researchers to be the most efficient representation, which provides the fastest arithmetic in the Algorithm for polynomial bases because once the point is field. This is possible due to the existence of some improved to Montgomery projective coordinates, representations of finite fields that have computational Calculations can subsequently be performed only on x and advantages over the other representations, Selection of an z.Once the result has been computed, the resulting y value elliptic curve[2][6][21]. Numerous modifications of the can be computed through post processing. Furthermore, it is general elliptic curve equation 1 , Selection of a point very efficient as it requires only six multiplications per bit of representation that the speed of point exponentiation. Point the scalar and can be supplementary optimized to require representations done using coordinates system can even be only five multiplications per bit for Koblitz curves[6][20] mixed to achieve best performance throughout the run of an [21]. exponentiation algorithm. Efficiency of an algorithm can be C. Various forms of coordinate system for point described from two basic points of view memory representation requirements and computational difficulty. Memory requirements are basically the needs of certain size of the A coordinate system is a organization which uses one or memory for performing operation. more numbers, or coordinates, to distinctively determine the position of a point or other geometric constituent on a manifold such as Euclidean space. The use of a coordinate B. Schemes for Scalar Multiplication system allows problems in geometry to be translated into There are different ways to implement scalar problems about numbers and vice versa. multiplication like Binary ,Signed digit An elliptic curve can be represented by several coordinate representation(NAF),Montgomery method .There are systems [11]. Following are descriptions of coordinates three different phases to performed scalar system. Point additions(PA) and point doublings(PD) can be multiplication .At the top level, select the method for implemented using following coordinate system[5][6] computation the scalar multiplication ,middle layer • Affine coordinate system decides underlying use of finite field and coordinate • Standard projective system and at the lower level finite field arithmetic is • Standard projective and affine performed. Different possible ways to perform scalar • Jacobian projective multiplication are as follows[1][2][3][16][18] : • Jacobian projective and affine • Right to left binary method • Lopez –Dahab • Left to right binary method The affine coordinates system considered the normal form • Non Adjacent Form Hessian curve without any projection to produce the value of • Width w Non Adjacent Form the point doubling represented as P3= (x3, y3). By Using the • Joint Sparse Form point-slope (m) equation y=mx + c [6]. • Double and add form Where m is the gradient of line. • Addition chains c is the y-intercept. • Fibonacci and add Affine coordinate system needs field inversion in the both • Montgomery method Point additions (PA) and point doublings (PD),whereas other The binary method is simplest method used for scalar coordinate system do not need it.  Inversions are very multiplication .It scans every bit of scalar k and depending exclusive that can be take out by changing the representation upon bits value,0 or 1,it performs point doubling operation or of the points. In some different coordinate systems, points on both point doubling and point addition and an point addition. a curve can be added without inversions[14][22]. The Binary method consists of a point doubling operation if (x; y) →(X; Y ; Z) the key bit is ‘0’, and a point doubling followed by a point addition operation if the key bit is ‘1’. If the power pattern of Transformation: x = X/Zc and y = Y /Zd point doubling is different from that of point addition, attackers can easily retrieve the secret key from a single Where c ,d are multiplier parameters power trace [3]. Montgomery and Double-and-Add-Always
  • 4. D. Types of curves working ECC system like EC Parameters generation , There are two kinds of curves are given in general[10][12] : Selection of Parameter set, Level of security, Interoperability, Performance, Application Level Issues, Device Level • Pseudo-random curves are those whose coefficients Issues .For ECC implementation following point of are generated from the output of a seeded consideration should assemble[1][2][4][25] cryptographic hash. • Exactness of methods available for optimizing finite field arithmetic like addition, multiplication, • Special curves whose coefficients and essential field squaring, and inversion. have been preferred to optimize the efficiency of the elliptic curve operations. • Exactness of methods available for optimizing elliptic curve arithmetic like point addition, point IV. SECURITY OF ELLIPTIC CURVE CRYPTOGRAPHY doubling, and scalar multiplication. As RSA depends on the difficulty of large-number • Application platform like software, hardware, or factorization for its security, ECC depends on the difficulty of firmware. the large number discrete logarithm calculation. This is referred to as the Elliptic Curve Discrete Logarithm Problem (ECDLP). Elliptic curves for which the total number of points • Constraints of a particular computing environment on the curve equals the number of essentials in the primary e.g., processor speed, storage, code size, gate count, finite field are also considered cryptographically pathetic. power consumption. Again the security of ECC depends upon how to calculate k when point is given in scalar multiplication [10][4]. • Constraints of a particular communications environment e.g., bandwidth, response time. TABLE I. EQUIVALENT KEY SIZES FOR SYMMETRIC ,ECC AND RSA Efficiency of ECC is depends upon factors such as Symmetric Elliptic curve RSA/DSA(modulus computational outlay ,key size ,band width ,ECC provides scheme(key cryptography based size in bits) higher-strength per- bit which include higher speeds, smaller size in bits) schemes (key size in power consumption, bandwidth reserves, storage efficiencies, bits) and smaller certificates[13][20]. 56 112 512 80 160 1024 VI. APPLICATIONS OF ELLIPTIC CURVE CRYPTOGRAPHY 112 224 2048 Applications of ECC includes the implementation of ECC 128 256 3072 for web’s security infrastructure ,integration in openSSL, and 192 384 7680 for the implementation cryptographic algorithms and 256 512 15360 protocols[1]. Many devices are constrained devices that have small and Table I shows the Comparison between symmetric and restricted storage and computational power ,for constrained asymmetric algorithms such AES ,ECC ,and RSA . Same devices ECC can be applied[3][11].ECC can be functional level of security ,data sizes ,encrypted message sizes and For wireless communication devices like PDA’s ,multimedia computational power .The security levels which is given by cellular phones .It can be used for security of Smart cards RSA can be provided by smaller keys of elliptic curve ,wireless sensor networks ,wireless mesh networks. Web cryptosystem[3][21][17]. servers that need to handle many encryption sessions. Any kind application where security is needed for our current For providing security mechanism will require cryptosystems. In public-key cryptosystem for secret key fundamental basic security services such as authentication, sharing offers Diffie-Hellman protocol ,in order to implement confidentiality, non-repudiation and message integrity. Diffie-Hellman protocol scalar multiplication is used[1][2] Authentication confirms the identity of the party involved in [18]. communication, confidentiality assures that only intended receiver should able to understand the contents of transmitted VII. CONCLUSION message ,message integrity guarantees that the messages is not altered and non-repudiation ensures proofers of Elliptic curve systems are progressively more seen as an communication[5][7][11] . alternative to RSA, relatively than a replacement. The primary motive for the magnetism over RSA and DSA is V. IMPLEMENTATION ISSUES IN ELLIPTIC CURVE CRYPTOGRAPHY that the best algorithm known for solving underlying use of There are many issues to be discussed between the ECDLP which takes fully exponential time than other public mathematical basis for an ECC scheme and a practical key cryptosystem. There are prospective advantages,
  • 5. particularly when used in devices with limited processing [11] Xue Sun ,Mingping Xia “An improved proxy signature based on elliptic curve cryptography” DOI10.1109/ICCCS.2009.36 capability and/or memory. Representative applications [12] www.certicom.com includes m-commerce (e.g. mobile phone, hand-held [13] Jithra Adikari “Efficient Algorithms For Elliptic Curve devices) smart card systems, e-commerce and banking Cryptography” Ph.D Thesis , Department Of Electrical & Computer applications (e.g. SET) internet based applications (e.g. SSL) Engineering,Calgary University, Alberta January, 2011. .There are, however, some problems and issues that are [14] E.Munivel,Dr G M Ajit “Efficient Public Key Infrastructure inhibiting the widespread adoption of elliptic curve Implementation in Wireless Sensor Networks” 2010 IEEE. systems[18][19][3] [13]. [15] A. Chandrasekar, V.R. Rajasekar & V. Vasudevan “Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography” International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (4) REFERENCES [16] Vassil Dimitrov, Laurent Imbert, And Pradeep K. Mishra “The Double-Base Number System And Its Application To Elliptic Curve [1] Andrej Dujella “Applications of Elliptic Curves in Public Key Cryptography”MATHEMATICS OF COMPUTATIONS 0025- Cryptography “Basque Center for Applied Mathematics and 5718(07)02048-0,Article electronically published on December 11, Universidad del Pais Vasco / Euskal HerrikoUnibertsitatea, Bilbao, 2007 May 2011. [17] Mathias Schmalisch, Dirk Timmermann “Comparison of Algorithms [2] Moncef Amara ,Amar siad “Elliptic Curve Cryptography and its for Finite Fields of GF(2m)”,The IASTED International Conference application”7th international workshop on systems ,signal processing on Communication, Network, and Information Security.CNIS 2003, and their applications(WOSSPA)IEEE 2011 December 10-12, 2003New york,USA. [3] Tingding Chen, Huiyun Li, Keke Wu, Fengqi Yu “Evaluation [18] Dr.R.Shanmugalakshmi ,M.Prabu” Research Issues on Elliptic Curve Criterion Of Side-Channel Countermeasures For Elliptic Curve” 978- Cryptography and Its applications”IJCSNS International Journal of 0-7695-3906-5/09 2009 IEEE. Computer Science and Network Security, VOL.9 No.6, June 2009. [4] Philip Hines”Improvements to an Efficient Implementation of an [19] Michael Naehrig “Pairings on elliptic curves – parameter selection Elliptic Curve Cryptosystem over a Binary Galois Field in the and efficient computation”, Workshop on Elliptic Curve Computation Polynomial Basis” Hines_Summer_2007_report.pdf ,Redmond, 19 October 2010 [5] Zhi Li, John Higgins, Mark Clement “ Performance of Finite Field [20] Pardeep Malik “Elliptic Curve Cryptography For Security Inwireless Arithmetic in an Elliptic Curve Cryptosystem” Networks”Statistics 2011 Canada: 5th Canadian Conference in [6] Fahad Bin Muhaya, Qasem Abu Al-Haija, and Lo'ai Tawalbeh” Applied Statistics/ 20th conference of the Forum for Interdisciplinary Applying Hessian Curves in Parallel to improve Elliptic Curve Scalar Mathematics -Interdisciplinary Mathematical Statistical Techniques, Multiplication Hardware”.International Journal of Security and Its July 1-4-2011, Concordia University, Montreal, Quebec, Canada. Applications Vol. 4, No. 2, April, 2010 [21] Guicheng Shen ,Bingwu Liu”Research on Efficiency of computing [7] Samta Gajbhiye, Monisha Sharma, Samir Dashputre “A Survey kP in Elliptic Curve System” .,supported by funding project for Report on Elliptic Curve Cryptography” International Journal of science and technology program Beijing,2010 under grant Electrical and Computer Engineering (IJECE) Vol.1, No.2, December numberKM20101010037002. 2011, pp. 195~201 ISSN: 2088-8708. [22] SECG SEC1, “Elliptic Curve Cryptography, Standards for Efficient [8] D. Sravana Kumar “CRYPTOGRAPHIC PROTOCOLS USING Cryptography Group, ver. 2, 2009, ELLIPTIC CURVE OVER FINITE FIELDS “International Journal http://www.secg.org/download/aid-780/sec1-v2.pdf. of Engineering Science and Technology (IJEST) ISSN : 0975-5462 [23] Sheueling Chang, Hans Eberle, Vipul Gupta, Nils Gura, Sun Vol. 4 No.01 January 2012 Microsystems Laboratories "HowECCWorks-USLetter.pdf [9] Behrouz A Forouzan,Debdeep Mukhopadhayay “A text book of [24] http://cse.iitkgp.ac.in/~debdeep/pres/TI/ecc.ppt Cryptography and Network security”,second edition 2011. [25] Abdahossein rezai,parviz kashvarzi “high performance [10] William Stallings, “A text book of Cryptography and Network implementation approach of elliptic curve cryptosystem for wireless security”, Principles and practices, Pearson education, fourth edition network applications,978-1-61284-459-6/11,IEEE 2011 2007.