首页> 外文期刊>Information Technology Journal >Elliptic Curve Cryptography over Binary Finite Field GF(2m)
【24h】

Elliptic Curve Cryptography over Binary Finite Field GF(2m)

机译:二元有限域GF(2 m )上的椭圆曲线密码学

获取原文
           

摘要

The rapid growth of information technology that has resulted in significant advances in cryptography to protect the integrity and confidentiality of data is astounding. Elliptic curve cryptography is gaining wide acceptance as an alternative to the conventional cryptosystems (DES, RSA, AES, etc.). Elliptic curve cryptosystems require less computational power, memory, communication bandwidth and network connectivity. Elliptic curve ciphers today are based in smartcards, Personal Digital Assistants (PDAs), pagers and mobile phones and can be easily implemented with processors clocked in single digits of MHz. This study describes the basic design principle of Elliptic Curve Crypto (ECC) protocols. The ECC processor is normally used to perform elliptic curve operations for: EC Diffie-Hellman, EC ElGamal and ECDSA protocols. As an example we will implement ECC defined over binary finite field GF(2m).
机译:信息技术的飞速发展令人震惊,它已经大大提高了加密技术的安全性,以保护数据的完整性和机密性。椭圆曲线密码术已被广泛接受,可以替代传统的密码系统(DES,RSA,AES等)。椭圆曲线密码系统需要较少的计算能力,内存,通信带宽和网络连接性。如今,椭圆曲线密码基于智能卡,个人数字助理(PDA),寻呼机和移动电话,并且可以通过时钟频率为几位MHz的处理器轻松实现。这项研究描述了椭圆曲线加密(ECC)协议的基本设计原理。 ECC处理器通常用于执行以下椭圆曲线操作:EC Diffie-Hellman,EC ElGamal和ECDSA协议。作为示例,我们将实现在二进制有限域GF(2 m )上定义的ECC。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号