Visible to the public Applications of Elliptic Curve Cryptography: A Light Introduction to Elliptic Curves and a Survey of Their Applications

TitleApplications of Elliptic Curve Cryptography: A Light Introduction to Elliptic Curves and a Survey of Their Applications
Publication TypeConference Paper
Year of Publication2017
AuthorsHarkanson, R., Kim, Y.
Conference NameProceedings of the 12th Annual Conference on Cyber and Information Security Research
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4855-3
Keywordscomposability, compositionality, diffie-hellman (DH), Digital Signature Algorithm (DSA), Elliptic curve cryptography (ECC), elliptic curve diffie-hellman (ECDH), elliptic curve DSA (ECDSA), pubcrawl, theoretical cryptography
Abstract

Elliptic curve cryptography (ECC) is a relatively newer form of public key cryptography that provides more security per bit than other forms of cryptography still being used today. We explore the mathematical structure and operations of elliptic curves and how those properties make curves suitable tools for cryptography. A brief historical context is given followed by the safety of usage in production, as not all curves are free from vulnerabilities. Next, we compare ECC with other popular forms of cryptography for both key exchange and digital signatures, in terms of security and speed. Traditional applications of ECC, both theoretical and in-practice, are presented, including key exchange for web browser usage and DNSSEC. We examine multiple uses of ECC in a mobile context, including cellular phones and the Internet of Things. Modern applications of curves are explored, such as iris recognition, RFID, smart grid, as well as an application for E-health. Finally, we discuss how ECC stacks up in a post-quantum cryptography world.

URLhttps://dl.acm.org/citation.cfm?doid=3064814.3064818
DOI10.1145/3064814.3064818
Citation Keyharkanson_applications_2017