Browse > Article
http://dx.doi.org/10.5762/KAIS.2014.15.9.5790

Study of the Real Number Field Extension Operand of Elliptic Curve Cryptography  

Woo, Chan-Il (Dept. of Information and Communication Engineering, Seoil University)
Goo, Eun-Hee (Donut System LSI Co., Ltd.)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.15, no.9, 2014 , pp. 5790-5795 More about this Journal
Abstract
Elliptic curve cryptography (ECC) is an extremely important part of information protection systems because it has outstanding safety among public key encryption algorithms. On the other hand, as ECC cannot obtain accurate values using a real number field because of the slow calculation and errors from rounding off, studies of ECC have focused on a finite field. If ECC can be extended to the real number field, more diverse keys can be selected compared to ECC only based on a finite field. Accordingly, in this paper, a method for constructing a cryptographic system with a high degree of safety is proposed through the diversification of keys selected by the user based on the operant extension method instead of extracting keys only using integer values.
Keywords
Elliptic Curve Cryptography; Real Number Field; Encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W.Diffie, M.E.Hellman, "New directions in cryptography," IEEE Trans. on Information Theory, Vol. 22, No. 6, pp.644-654, 1976. DOI: http://dx.doi.org/10.1109/TIT.1976.1055638   DOI
2 T.ElGamal, "A public key cryptosystem and a signature scheme based on the discrete logarithm," IEEE Trans. on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985. DOI: http://dx.doi.org/10.1109/TIT.1985.1057074   DOI
3 M.O.Rabin, "Digitalized Signatures and public Key Functions as Interactable as Factorization," Technical Report, MIT/LCS/TR212, MIT Lab., Computer Science, Cambridge, Mass 1979.
4 R.L.Rivest, A. Shamir, L.Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communitations of the ACM, Vol. 21, No. 2, pp. 120-126, 1978. DOI: http://dx.doi.org/10.1145/359340.359342   DOI   ScienceOn
5 M.Wiener and R.Zuccherato, "Fast Attacks on Elliptic Curve Crypto-system," in Selected Areas in Crypto-graphy-SAC'98, 1998.
6 A.Menezes, "Elliptic Curve Crypto systems," CryptoBytes, Vol. 1, No. 2, pp. 1-4, 1995.
7 V.S.Miller, "Use of Elliptic Curves in Cryptography," in Advances in Cryptology-Proc. of CRYPTO'85, pp. 417-426, 1986.
8 Eunhee Goo, Joonmo Kim, "Elliptic Curve Cryptography over the Real Number Plane," The 24th ITC-CSCC 2009, pp. 1177-1179, 2009.