Design of Elliptic Curve Cryptography in GSI

In this paper, the main ideas of applications using elliptic curve cryptography in the grid security infrastructure are presented. The grid security infrastructure offers secure communication between varied elements within a grid, based on public key cryptography. The main attraction of ECC compared to RSA is that the best algorithm known for solving the elliptic curve discrete logarithm problem takes fully exponential time. This means that significantly smaller parameters can be used in ECC than in other systems such as RSA, but with equivalent levels of security. The schemes of ECC which include key generation, digital signature and key exchange are described in this paper. Several fast algorithms of implementation of ECC are also introduced.

[1]  Warwick Ford,et al.  Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework , 2003, RFC.

[2]  Ian T. Foster,et al.  The Globus project: a status report , 1998, Proceedings Seventh Heterogeneous Computing Workshop (HCW'98).

[3]  Jerome A. Solinas,et al.  Efficient Arithmetic on Koblitz Curves , 2000, Des. Codes Cryptogr..

[4]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[5]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[6]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[7]  Ian T. Foster,et al.  Security for Grid services , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.