Visible to the public Research on the Underlying Method of Elliptic Curve Cryptography

TitleResearch on the Underlying Method of Elliptic Curve Cryptography
Publication TypeConference Paper
Year of Publication2017
AuthorsFang, X., Yang, G., Wu, Y.
Conference Name2017 4th International Conference on Information Science and Control Engineering (ICISCE)
Keywordselliptic curve, Elliptic curve cryptography, Elliptic Curve Cryptosystem, Elliptic curves, finite field, Galois fields, generator, Generators, group, Metrics, pubcrawl, Receivers, Resiliency, Scalability
Abstract

Elliptic Curve Cryptography (ECC) is a promising public key cryptography, probably takes the place of RSA. Not only ECC uses less memory, key pair generation and signing are considerably faster, but also ECC's key size is less than that of RSA while it achieves the same level of security. However, the magic behind RSA and its friends can be easily explained, is also widely understood, the foundations of ECC are still a mystery to most of us. This paper's aims are to provide detailed mathematical foundations of ECC, especially, the subgroup and its generator (also called base point) formed by one elliptic curve are researched as highlights, because they are very important for practical ECC implementation. The related algorithms and their implementation details are demonstrated, which is useful for the computing devices with restricted resource, such as embedded systems, mobile devices and IoT devices.

URLhttps://ieeexplore.ieee.org/document/8110366
DOI10.1109/ICISCE.2017.139
Citation Keyfang_research_2017