Browse > Article
http://dx.doi.org/10.5762/KAIS.2013.14.3.1439

A Study on the Performance Evaluation of Elliptic Curve Cryptography based on a Real Number Field  

Woo, Chan-Il (Dept. of Information and Communication Engineering, Seoil University)
Goo, Eun-Hee (Dept. of Information and Communication Engineering, Seoil University)
Lee, Seung-Dae (Dept. of Electronic Engineering, Namseoul University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.14, no.3, 2013 , pp. 1439-1444 More about this Journal
Abstract
Recently, as the use of the applications like online banking and stock trading is increasing by the rapid development of the network, security of data content is becoming more and more important. Accordingly, public key or symmetric key encryption algorithm is widely used in open networks such as the internet for the protection of data. Generally, public key cryptographic systems is based on two famous number theoretic problems namely factoring or discrete logarithm problem. So, public key cryptographic systems is relatively slow compared to symmetric key cryptography systems. Among public key cryptographic systems, the advantage of ECC compared to RSA is that it offers equal security for a far smaller key. For this reason, ECC is faster than RSA. In this paper, we propose a efficient key generation method for elliptic curve cryptography system based on the real number field.
Keywords
Cryptography; ECC; Key Generation; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 V. S. Miller, "Use of Elliptic Curves in Cryptography," in Advances in Cryptology-Proc. of CRYPTO'85, pp. 417-426, 1986.
2 NIST, http://csrc.nist.gov/encryption
3 IEEE, http://www.ieee.org
4 Youngho Park, Public Key Encryption, Vol. 16, No. 3, Physics&High Technology, March, 2007.
5 Eunhee Goo, Joonmo Kim, "Elliptic Curve Cryptography over the Real Number Plane," The 24th ITC-CSCC 2009, pp. 1177-1179, 2009.
6 Mark Stamp, Information Security:Principles and Practice, Wiley, 2005.
7 David J. Malan, Matt Welsh, Michael D. Smith, "A Public-key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography", First IEEE International Conference on Sensor and Ad-hoc Communications and Network, Oct. 2004.
8 N. Koblitz, "Elliptic Curve Cryptosystems," Mathemetics of Computation, Vol. 48, pp.203-209, 1987.   DOI   ScienceOn