The Implementation of Elliptic Curve Cryptosystems

In this chapter we explore the feasibility of efficient implementation of an arithmetic processor for performing elliptic curve computations over finite fields. For a secure system, it is evident from the results of Chapter 5 that the curve and underlying field should be judiciously chosen. However we should point out that for a given underlying field there are a large number of suitable elliptic curve to choose from. If the logarithm problem in supersingular curves is indeed as hard as the logarithm problem in finite fields, and/or if the logarithm problem in non-supersingular curves is indeed intractable, then the systems discussed here are both efficient and secure and very attractive for practical usage.