Browse > Article
http://dx.doi.org/10.6109/jkiice.2010.14.2.394

Development of High Speed Scalar Product Operation System for ECC Public Key  

Kim, Kap-Yol (경원대학교 컴퓨터공학)
Lee, Chul-Soo (경원대학교 컴퓨터공학)
Park, Seok-Cheon (경원대학교 컴퓨터공학)
Abstract
At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.
Keywords
RSA; ECC; Binary Search; Binary NAF;
Citations & Related Records
연도 인용수 순위
  • Reference
1 포항공대, "부가형 전자서명 방식 표준(안)-제3부: 타원곡석을 이용한 인증서 기반 전자서명 알고리즘", TTA.KO, 2000. 12.
2 Randall K. Nichols, "ICSA Guide to Cryptography," McGraw-Hill, Dec. 1999.
3 유영준, "디지털 암호화 기술 현황", 전자정보센터, 2006. 11.
4 A.J Menezes,P.C Van Oorschot, S.A Vanstome, "Handbook of Applied Cryiptography," CRC Press, Boca Raton, Florida, 1997.
5 W. Diffe and M. Hellman, "New directions In cryptography," IEEE Transactions on Information Theory, pp. 644-654, Nov, 1976.
6 http://en.wikipedia.org/wiki/Digital_Signature_Algorithm
7 Raymond G. Kammer, Director, "DIGITAL SIGNATURE STANDARD(DSS)," U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology, 27. January. 2000.
8 곽미숙, "정보보호에서의 기술적 보안(암호화 기법)", 서울대학교의과대학, pp.3-9, 2005. 10. 25
9 이주철, "정보보호와 전자문서 유통확대를 위한 전자서명의 효율적 이용방안", 전북대학교 학위논문, pp.18-19, 2006.2
10 민병관, "암호화 기술의 최근 동향", 전자부품연구원, pp.3-4, 2004. 02. 19
11 SECl, "Elliptic Curve Cryptography," v.1.0, pp.62, Sept. 2000.
12 C. G. Pollman, "XML Pool Encryption," XMLSEC02, USA, pp.1-9, 22, Nov. 2002.
13 F. Al-Somani and M. K. Ibrahim, "High Performance Elliptic Curve GF(2m) Cryptoprocessor Secure Against Timing Attacks," IJCSNS, Vol. 6, No. 1B, pp.179-181, 2006.
14 http://en.wikipedia.org/wiki/Non-adjacent_form