On Assurance of Information Security using Elliptic Curves Cryptosystems

We present in this paper an important area of information security emerged in the last decades, namely Elliptic Curves Cryptosystems (ECC). Compared to traditional public-key cryptosystems like RSA or Diffie-Hellman, ECC offers equivalent security with smaller key sizes; these result in faster computations, lower power consumption, as well as memory and bandwidth savings. ECC are more and more considered as an attractive public-key cryptosystem for mobile/wireless environments. ECC are especially useful for mobile devices, which are typically limited in terms of their CPU, power and network connectivity. ECC are the next frontier in the use of security mechanisms by providing good security margins with lower computational cost. ECC's domain is an important field emerged in information security. The elliptic curves (EC) are used for conceiving efficient factorization algorithms and for proving the primality. They are used in public key cryptosystems and in pseudorandom bit generators, too. The elliptic curves were also applied in Codes Theory, where they were used to create very good error protected codes. In this paper, our aim is to examine the security, implementation and performance of ECC applications on various mobile devices. Also, our goal is to compare ECC and conventional PKC performances. Doing these, we want to prove that ECC could become the next-generation of PKC.

[1]  Kyung-Sang Sung,et al.  XML Document Encrypt Implementation Using Elliptic Curve Cryptosystem , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[2]  Marisa W. Paryasto,et al.  Issues in Elliptic Curve Cryptography Implementation , 2009 .

[3]  Kouichi Sakurai,et al.  Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems , 1991, CRYPTO.

[4]  Alfred Menezes,et al.  Elliptic curve cryptosystems and their implementation , 1993, Journal of Cryptology.

[5]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[6]  Kazuhiro Yokoyama,et al.  Elliptic curve cryptosystem , 2000 .

[7]  Alfred Menezes,et al.  Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.

[8]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[9]  Douglas Stebila,et al.  Performance analysis of elliptic curve cryptography for SSL , 2002, WiSE '02.

[10]  Alfred Menezes,et al.  Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.

[11]  Neal Koblitz,et al.  Hyperelliptic cryptosystems , 1989, Journal of Cryptology.

[12]  Ingrid Verbauwhede,et al.  Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.

[13]  R. Shanmugalakshmi,et al.  Research Issues on Elliptic Curve Cryptography and Its applications , 2009 .

[14]  Jean-Jacques Quisquater,et al.  High-speed hardware implementations of Elliptic Curve Cryptography: A survey , 2007, J. Syst. Archit..