Implementation of Secure-key Establishment and Generation using Elliptic Curve Cryptographic Protocols
暂无分享,去创建一个
In the last couple of years, we have witnessed rapid advances in information and communication technology (ICT) that has resulted in significant advances and use of cryptography to protect the integrity and confidentiality of data is astounding. Securing of Internet connected devices has also increased in complexity when one looks at IoT, BOYD etc. More-so, of late the troubling effect of cybercriminals taking advantage of crypto-security in the name of ransomware – a computer malware that installs covertly on a victim's computer, executes a cryptovirology attack that adversely affects it, and demands a ransom payment to restore it. In the crypto-control security, elliptic curve cryptography has gained wide acceptance as an alternative to the conventional cryptosystems (DES, RSA, AES, etc.) for securing wireless and small form-factor devices. Elliptic curve ciphers require less computational power, memory, and communication bandwidth. Elliptic curve ciphers are based in smart cards, personal digital assistants (PDAs), tablets, pagers, and mobile phones, and can be easily implemented with processors clocked in single digits of MHz! This paper describes the basic design principle of elliptic curve crypto (ECC) protocols using coprocessor. The ECC processor is normally used to perform elliptic curve operations for: EC Diffie-Hellman, EC ElGamal and ECDSA protocols. As an example we will implement ECC defined over the field GF(2163), which is a SEC-2 recommendation.