IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM
|
|
|
- Matthew McKinney
- 10 years ago
- Views:
Transcription
1 NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 28 IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM Mohammad Noor Nabi, Sabbir Mahmud, and M Lutfar Rahman * School of Engineering and Computer Science, Independent University, Bangladesh * Department of Computer Science and Engineering, University of Dhaka, Bangladesh [email protected], [email protected], [email protected] Abstract: In this paper we present a novel method for obtaining fast software implementation of the Elliptic Curve Digital Signature Algorithm in the finite field GF(p) with an arbitrary prime modulus p of arbitrary length. The most important feature of the method is that it avoids bit-level operations which are slow on microprocessors and performs word-level operations which are significantly faster. The algorithms used in the implementation perform word-level operations, trading them off for bit-level operations and thus resulting in much higher speeds. We provide the timing results of our implementations on a 2.8 GHz Pentium 4 processor, supporting our claim that ECDSA is appropriate for constrained environments. Keywords: Digital Signature, Elliptic Curve, Finite Field, ECDSA, Hashing. 1. Introduction A digital signature is a checksum which depends on the time period during which it was produced. It depends on all the bits of a transmitted message, and also on a secret key, but which can be checked without knowledge of the secret key. Digital signatures furnish the parties with two forms of protection, where A is the originator and B the receiver of message. 1) Both party A and party B should be protected against forged messages, planted in communication system by a third party C who pretends to be party A. 2) Party A should be protected against messages forged by party B, who may claim to received the messages from party A. At this time, there are three popular public-key algorithms which can provide digital signatures: (1) Elliptic Curve Digital Signature Algorithm (ECDSA) [1]; (2) the RSA scheme [2], () the ElGamal signature scheme []. Among these ECDSA provides a faster alternative for public-key cryptography, much smaller key lengths are required to provide a desired level of security [1]. The objectives of this paper are to implement Elliptic Curve Digital Signature Algorithm (ECDSA) in C/C++ and analyze its workload characteristics. This paper also finds the suitability of ECDSA in constrained environment where the processing resources, memory and power are all very limited. In Section 2 some of the related works are mentioned. Section describes briefly about elliptic curve cryptography and generation of parameters of ECDSA. Section 4 describes the ECDSA. Section 5 describes the algorithms used in the implementation of ECDSA. In section 6 experimental results are presented. Section 7 concludes the paper. 2. Previous Work Elliptic curves as mathematical objects have been known and studied since long before digital computers were built, but their application in cryptography has been more recent. In 1985, Victor Miller [4] and Neal Kolbitz [5] suggested independently that elliptic curves could he used to perform public-key security functions (e.g. key exchanges, digital signatures). Detailed and comprehensive reference is available on techniques for efficient finite field and elliptic curve arithmetic is IEEE [6]. Elliptic-curve ElGamal (EC-EIGamal) is the elliptic-curve analog of the integer ElGamal algorithm [7]. ECC provide the highest strength per bit among cryptosystems known today [8]. Jin-Hee Han and al implemented ECDSA based on Java card [9]. T.Yanik and al implemented ECDSA by incomplete reduction in modular arithmetic [10].. Elliptic Curve Cryptography The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE PI6 [10] and NIST s FIPS [12] standards. It was also accepted in 1998 as an ISO standard, and is under consideration for inclusion in some other ISO standards. Unlike the ordinary discrete logarithm problem and the
2 DAFFODIL INTERNATIONAL UNIVERSITY JOURNAL OF SCIENCE AND TECHNOLOGY, VOLUME 2, ISSUE 1, JANUARY integer factorization problem, no subexponentialtime algorithm is known for the elliptic curve discrete logarithm problem. For this reason, the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves..1 Comparison of Elliptic Curve Cryptography Certain unique properties of elliptic curves made them resilient against the types of attacks that were successful against integer-based algorithms. Table 1 shows, the number of key bits necessary to have equivalent levels of security for integer based algorithms (e.g. Digital Signature Algorithm, RSA) versus elliptic curve algorithms (e.g. ECDSA). For the most commonly used 1024-bit keys for an integer based algorithm; the elliptic curve counterpart only requires 160-bit keys for the equivalent security [11]. This is 7 times reduction in the space required to store these keys, or a similar reduction in bandwidth required to transmit these keys over a wireless network. This reduction in the size of data objects allows much faster completion of the algorithms. Because of these favorable properties, ECC has been incorporated into many security standards. Table 1. Key lengths (in bits) for equivalent security Integer algorithm (e.g. DSA, RSA) Elliptic curve algorithm (e.g. ECDSA) Elliptic Curve Parameters Implementation of elliptic curve cryptography involves the selection of a suitable elliptic curve (determined by the coefficients in the elliptic curve equation), the representation of field elements (e.g. a binary field or a prime field), algorithms for field arithmetic and elliptic-curve arithmetic. The standards provide suggestions for the selection of elliptic curves and representation of field elements. FIPS [12] recommends a total of ten curves for binary fields: two different curves for each of 16-bit, 2-bit, 28-bit, 409-bit and 571-bit fields. We limit the scope of this analysis to five curves on binary fields, and choose polynomial basis representation for the field elements, which allows faster implementation on programmable processors. 4. Elliptic Curve Digital Signature Algorithm Elliptic-curve ElGamal (EC-EIGamal) is the elliptic-curve analog of the integer ElGamal algorithm [1]. It is used to securely transmit the coordinates of the point P(x, y) from party A to party B (assume that the original plaintext m is embedded in P(x, y). We assume that party A and party B have previously agreed on a binary field GF(2 k ), a common elliptic curve E with suitable coefficients, and a base point, which lies on E and has order n. Elliptic-curve Digital Signature Algorithm (EC-DSA) has three different segments: key generation, signature generation and signature verification. These steps are summarized in Figure 1, where party A signs the message m and party B verifies the signature. Key generation (by party A) 1. Choose random a [2,n 1] 2. Compute intermediate point A T A T = P a Party A s private key = a Party A s public key = (E,P,A T ) Signature Generation (by party A) 1. Choose random k [2,n 1] 2. Compute P a = (x, y ) 1 1 and R = x 1 mod n ( if r = 0, go to step 1). Compute K -1 mod n 4. Compute s = k -1 (SHA(m)+ar) mod n (if s = 0, go to step 1)
3 NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 0 Signature for m = (r.s) 5. send (r,s) 1. Compute c = s -1 mod n and SHA(m) 2. Compute u 1 = SHA(m)c mod n And u 2 = rc mod n. Compute P u 1 + A u = ( x, y ) T and V = x 0 mod n 4. Accept signature if v = r 5. Software Implementation Of ECDSA ECDSA is coded and optimized in C/C++ on IBM workstation using 2.8 GHz Intel Pentium 4 processor. The coding of these algorithms needs fairly simple instructions, but efficient algorithms mentioned in section 4 were used. The basic arithmetic operations (i.e. addition, subtraction and multiplication) in the finite field GF(p) have several applications in cryptography, including Elliptic Curve Digital Signature Algorithm (ECDSA) [14]. The arithmetic of GF(p) is also called modular arithmetic where the modulus is p. The elements of the field are the set of integers {0, 1,..., (p-1)}, and the arithmetic function (addition, subtraction and multiplication) takes two input operands from this set and produces the output which is also in this set. We are assuming that the modulus p is a k- bit integer, where k [160,2048]. A number in this range is represented as an array of words, where each word is of length w. Most software implementations require that w = 2; however, w can be selected as 8 or 16 on 8-bit or 16 bit microprocessors. Algorithms used in the implementation of ECDSA are shown in figure 2 and figure. Signature verification (by party B) Figure 1. Elliptic Curve Digital Signature Algorithm Algorithm 1. Polynomial reduction [8] INPUT: Binary polynomial c(x) of degree at most 24. OUTPUT: c(x) mod p(x), where p(x) = x 16 + x 7 + x 6 + x For i from 5 down to do 1.1 t = c(i). 1.2 c(i-) c(i-) (t<<29) (t<<2) (t>>5) (t>>6) 1. c(i-2) c(i-2) (t<<28) (t<<29) (t>>2) (t>>5) 2. t = c(i)&0xffffffff c(0) c(0) (t<<28) (t<<29) (t>>2) (t>>5) 4. c[2] = c[2]&0x ffffffff. 5. Return (c[2], c[1], c[0]. Algorithm 2. Table lookup method for polynomial squaring INPUT: Binary polynomial a(x) OUTPUT: C(X) = a 2 (x) Algorithm 1 is used for polynomial reduction in binary fields. Algorithm 2 is used for polynomial reduction in binary fields. This is facilitated by using 512-byte table that is pre-computed to hold 16-bit squares of each 8-bit polynomial [14]. For polynomial inversion, we present Modified Almost Inverse Algorithm (MAIA) [14] which is summarized in Algorithm 2. MAIA (and similar variants of the Almost Inverse Algorithm) is used in optimized implementations. Algorithm 4 was used for adding two points and Algorithm 5 was used doubling of a point on elliptic curves. Nomenclature for algorithm descriptions: Polynomials are represented using lower-case letters: a(x), b(x), c(x) etc. When addressing the individual 64bit words of a polynomial, square brackets are used: a[0], b[l], c[2] etc. a[0] represents the lowest order (least significant) word of a(x). When addressing the individual bits of a polynomial, a subscript is used: a 0, b 2, c 162 etc. The bit a 0 represents the least-significant bit of a(x), a 162 represents the most-significant bit. The operator represents an XOR operation. When used, p(x) denotes the irreducible polynomial generating the field. For GF(z 16 ), p(x) = x 16 + x 7 + x 4 + x + 1.
4 DAFFODIL INTERNATIONAL UNIVERSITY JOURNAL OF SCIENCE AND TECHNOLOGY, VOLUME 2, ISSUE 1, JANUARY Precomputation: For each byte v = (v 7, v 6...v 1, v 0 ). compute the 16-bit quantity T(v) = (0, v 7, 0, v 6..., 0, v 1, 0,v 0 2. For i from 0 to 5 do 2.1. Let a[il = ( u 7, u 6, u 5, u 4, u, u 2, u 1, u 0 ) where each u i is a byte c[2i]=(t(u 1 ), T(u 0 )), c[2i+1]=( T(u ), T(u 2 )). Return c(x). Algorithm. Modified Almost Inverse Algorithm (MAIA) [8,2] for polynomial inversion INPUT: Binary polynomial a(x), a(x) 0 OUTPUT: b(x) GF(2 t ) and t [0,2k-1] Such that b(x) a(x) x t mod p(x) 1. b(x)=1, c(x)=0, u(x)=a(x), v(x)= p(x), t=0. 2. While x divides u(x) do 2.1 u(x)= u(x)/x, c(x)= c(x)x, t = t+1. u(x) = 1, return (b(x)t. 4. If degree (u(x))<degree(v(x)) then u(x) v(x), b(x) c(x). 5. u(x)= u(x)+ x j v(x), b(x)= b(x)+ c(x) 6. Go to Step 2. Figure 2. Algorithms for (a) polynomial reduction, (b) polynomial squaring (c) Polynomial inversion Algorithm 4. Adding two distinct points on an elliptic curve INPUT: Elliptic Curve points P =(x 1, y 1 ) and Q =(x 2, y 2 ), P Q OUTPUT: R = P + Q = (x, y ) y2 + y1 1. Compute θ = x2 + x Compute x = θ + θ + x1 + x2 + a. Compute y = θ ( x1 + x) + x + y1 4. Return (x, y ). Algorithm 5. Doubling a point on an elliptic curve INPUT: Elliptic Curve point P =(x 1, y 1 ) OUTPUT: R = P + P = (x, y ) y 1. Compute θ = x + x 2. Compute x = θ 2 + θ + a 2. Compute y = θ ( x + ( θ + 1) x 4. Return (x, y ). Figure. Algorithms for (a) adding points (b) doubling points on an elliptic curve Separate program was written to count points on the curve and specify an initial point on the curve using algorithms shown in figure, which was then used in a separate program as common information to generate public and private key. The source codes were carefully minimized by creating separate functions to handle polynomials using different algorithms shown in figure 2 and figure. Separate main programs were written for signature generation and verification of ECDSA described in section 4 where algorithms shown in figure 2 were used. 6. Experimental Results Experiments were performed on many different sets of data. For characteristic representative of workload characterization, we used the three different sets of inputs in the range of to characters without space. The experiments were conducted on an IBM workstation with Intel processor Pentium 4 of 2.8 GHz clock speed, memory size 512 MB, cache memory size 512 KB and storage of 40 GB. Table 2 shows the hashing time obtained from the experiments. The number of characters is represented by n, and the times taken (in milliseconds) by hashing is stated by T H. Figure 4 shows that the hashing time increases linearly with the number of characters or block size. Hashing is very fast as we found that for 10 million characters without spacing it takes around 406 milliseconds.
5 NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 2 Table and Table 4 shows the time obtained from our experiments for five different key sizes. The key sizes were taken for five different curves. The key sizes were selected according to equivalency shown in Table 1. In these tables T GS1, T GS2, T GS, T GS4, and T GS5 represent the times taken (in milliseconds) for signature operations using key sizes of 106,12, 160, 224 and 512 bits respectively. T SWH1, T SWH2, T SWH, T SWH4, and T SWH5 represent the times taken (in milliseconds) for signature operations without hashing and T VS1, T VS2, T VS,T VS4 and T VS5 represent the times taken (in milliseconds) for signature verification operations for the above mentioned five key sizes respectively. The times T GS5 and T VS5 taken for digital signature generation and verification using key size of 512-bits are considered to calculate the speedup. Table 2. Experimental results for hashing using SHA1 N T H Table. Experimental results of ECDSA for key size 106, 12 and 160 bits Key Size: 106 Key Size: 12 Key Size: 160 n T GS1 T SWH1 T VS1 T GS2 T SWH2 T VS2 T GS T SWH T VS Speedup Table 4. Experimental results of ECDSA for key size 224 and 512 Key Size: 224 Key Size: 512 N T GS1 T SWH1 T VS1 T GS2 T SWH2 T VS Speedup ECDSA Signature generation ECDSA Signature Verification Total Computation Time Total Computation Time No. of Characters No. of Characters (a) (b) Figure 4. Result analysis of the results for ECDSA, (a) Signature generation time; (b) Signature Verification time; using key sizes 160, 224 and 512 bits respectively Figure 5 states the relationship between the results from our experiments. Figure 4(a) show signature generation and Figure 4(b) show signature verification time respectively using key size 160 bits, 224 bits and 512-bits. It is found that for the similar number of characters ( and ) ECDSA takes similar amount of time for input of same sizes. It is found that for ECDSA signature generation and verification times are equivalent to their hashing times respectively. Table and Table 4 show that the signature generation without hashing is 0 in millisecond
6 DAFFODIL INTERNATIONAL UNIVERSITY JOURNAL OF SCIENCE AND TECHNOLOGY, VOLUME 2, ISSUE 1, JANUARY 2007 scale, which means the operation needs less than 1 millisecond for five key sizes considered in the experiment. In millisecond scale we did not find any speed up although key sizes were varied from 106 to 512 bits which means that Speedup factor does not increase with key size. ECDSA is very fast, signature generation and verification time is very insignificant in comparison with hashing time. 7. Conclusions In this paper we presented practical implementation of ECDSA signature generation and verification algorithms and found its workload characteristics. ECDSA can provide very high speed signature generation and verification. As much smaller key length is required with ECDSA to provide desired level of security, key exchanges become faster and smaller key storage is needed. ECDSA is therefore much better than DSA and RSA signatures for constrained environment like mobile information appliances, where computing resources and power ability are limited. ECDSA can be used equally in non-constrained environments. We hope that this paper contributes to an increased understanding of the properties of ECDSA, and facilitates its use in practice. For future work, we plan to expand our research to include other digital signature algorithms, elliptic-curve algorithms, different block ciphers, symmetric-key, and hash functions. We will also expand our ECC results to include results for prime fields, using bases other than polynomial bases, and different coordinate systems such as projective coordinates. References [1] Araki. Kiyomichi, Takakazu Satoh, and Shinji Miura, Overview of Elliptic Curve Cryptography, Public Key Cryptography. pp Springer-Verlag [2] Rivest, R.L., Shamir, A., and Adelman, L. A method for obtaining digital signatures and public-key cryptosystem, Commun. ACM, 1978, 21, (2). pp [] Elgamal, T, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Info. Theo, 1985, IT-1, pp [4] Miller. Victor S., Use of Elliptic Curves in Cryptography, Lecture Notes in Computer Sci. no. 218, pp , Springer-Verlag [5] Koblitz, Neal. Elliptic Curve Cryptosystem Mathematics of Computation, vol 48, no, 177, pp20-209, 1987 [6] T. Hasegawa, J. Nakajima and M. Matsui, A practical implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer, Public Key Cryptography Proceedings of PKC 98, Lecture Notes in Computer Science, 141 (1998), [7] Proposed Federal Information Processing Standard for Digital Signature Standard (DSS), in Federal Register, 1991, 56, (169), [8] Menezed, A., Van Oorschot, P., Vanstone, S., Handbook of Appl Cryptography, CRC Press, [9] Jin-Hee Han and al, Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card, Proceedings of the 22 nd International Conference on Distributed Computing Systems Workshops (ICDCSW 02), 2002 IEEE [10] T.Yanik, E. Savas and C. K. Koc Incomplete reduction in modular arithmetic IEE Proceedings online no , [11] Annex to the IEEE P16, Standard Specifications for Public Key Cryptography. [12] Digital Signature Standard (DSS) - FIPS Pub February [1] EIGamal, T., A Public key Cryptosystem and a Signature Scheme based on Discrete Logarithm, IEEE Trans. on Info theory, 1: [14] Hankerson, D., J. Hernandez. and A. Menezes. Software Implementation of Elliptic Curve Cryptography Over Binary Fields, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Mohammad Noor Nabi is currently a Lecturer in the School of Engineering and Computer Science at the Independent University, Bangladesh. Mr. Nabi received his B. Sc. (Honors) in Applied Physics, Electronics and Communication Engineering, M.S. in Computer Science and Engineering degrees from University of Dhaka. Mr Nabi s areas of interest include Parallel and distributed computing, Cryptography and VLSI design. Sabbir Mahmud is currently a Lecturer in the School of Engineering and Computer Science at the Independent University, Bangladesh. Mr. Mahmud received his B. Sc. (Honors) in Computer Science from IUBAT and M.S. in Computer Science from Independent University, Bangladesh. Mr Mahmuid s areas of interest include Parallel and distributed computing, Cryptography and Data Mining. M. Lutfar Rahman is currently working as a Professor in the Department of Computer Science and Engineering, University of Dhaka and he is the founder chairman of the Department. He worked as the director of Institution of Information Technology (IIT) of Dhaka University. Professor Rahman obtained B.Sc. (Hons) and M.Sc. in Physics and M.Sc. and Ph.D. in Electronic and Electrical Engineering. He has over 200 research papers and scientific and technical articles to his credit. He authored sixteen books on Electronics and Computer Science and was awarded Halima Sharfuddin Science Writer Prize by Bangla Academy.
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
Implementation of Elliptic Curve Digital Signature Algorithm
Implementation of Elliptic Curve Digital Signature Algorithm Aqeel Khalique Kuldip Singh Sandeep Sood Department of Electronics & Computer Engineering, Indian Institute of Technology Roorkee Roorkee, India
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
A New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
Implementing Network Security Protocols
Implementing Network Security Protocols based on Elliptic Curve Cryptography M. Aydos, E. Savaş, and Ç. K. Koç Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331, USA {aydos,savas,koc}@ece.orst.edu
An Approach to Shorten Digital Signature Length
Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based
Software Implementations of Elliptic Curve Cryptography
Software Implementations of Elliptic Curve Cryptography Zhijie Jerry Shi and Hai Yan Computer Science and Engineering Department University of Connecticut, Storrs, CT 06269, USA Email: {zshi, hai.yan}@engr.uconn.edu
A Survey of the Elliptic Curve Integrated Encryption Scheme
JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME, ISSUE, AUGUST 010 A Survey of the Elliptic Curve Integrated Encryption Scheme 7 V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila Abstract
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis
Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis by Susana Sin A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master
A SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected].
Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected] Overview Cryptanalysis Challenge Encryption: DES AES Message
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK Al Imem Ali 1 1 PRINCE ISITC, H. Sousse University of Sousse, 4011 Hammam Sousse, Tunisia ABSTRACT It is well known that Named
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
A blind digital signature scheme using elliptic curve digital signature algorithm
A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department
Digital Signature. Raj Jain. Washington University in St. Louis
Digital Signature Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
A Java implementation of the Elliptic Curve Integrated Encryption Scheme
A Java implementation of the Elliptic Curve Integrated Encryption Scheme V. Gayoso Martínez 1, L. Hernández Encinas 1, and C. Sánchez Ávila 2 1 Department of Information Processing and Coding Institute
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction
MATH 168: FINAL PROJECT Troels Eriksen 1 Introduction In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key
Cryptography and Network Security
Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
ARCHIVED PUBLICATION
ARCHIVED PUBLICATION The attached publication, FIPS Publication 186-3 (dated June 2009), was superseded on July 19, 2013 and is provided here only for historical purposes. For the most current revision
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Digital Signature Standard (DSS)
FIPS PUB 186-4 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory National Institute
ECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
Digital Signatures. Meka N.L.Sneha. Indiana State University. [email protected]. October 2015
Digital Signatures Meka N.L.Sneha Indiana State University [email protected] October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
A New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-
Multi-Layered Cryptographic Processor for Network Security
International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 Multi-Layered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,
SEC 2: Recommended Elliptic Curve Domain Parameters
STANDARDS FOR EFFICIENT CRYPTOGRAPHY SEC 2: Recommended Elliptic Curve Domain Parameters Certicom Research Contact: [email protected] September 20, 2000 Version 1.0 c 2000 Certicom Corp. License
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC Laxminath Tripathy 1 Nayan Ranjan Paul 2 1Department of Information technology, Eastern Academy of Science and
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified
A New secure email scheme Using Digital Signature with S/MIME
International Journal of Computer Networks and Communications Security VOL. 4, NO. 3, MARCH 2016, 56 62 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) A New secure
Cryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
Elements of Applied Cryptography Public key encryption
Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing
322 The International Arab Journal of Information Technology, Vol. 11, No. 4, July 2014 Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Public Key Cryptography. Performance Comparison and Benchmarking
Public Key Cryptography Performance Comparison and Benchmarking Tanja Lange Department of Mathematics Technical University of Denmark [email protected] 28.08.2006 Tanja Lange Benchmarking p. 1 What
2. Cryptography 2.4 Digital Signatures
DI-FCT-UNL Computer and Network Systems Security Segurança de Sistemas e Redes de Computadores 2010-2011 2. Cryptography 2.4 Digital Signatures 2010, Henrique J. Domingos, DI/FCT/UNL 2.4 Digital Signatures
THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY KRISTIN LAUTER, MICROSOFT CORPORATION
T OPICS IN WIRELESS SECURITY THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY KRISTIN LAUTER, MICROSOFT CORPORATION Q 2 = R 1 Q 2 R 1 R 1 As the wireless industry explodes, it faces
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
A Novel Approach for Signing Multiple Messages: Hash- Based Signature
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. International Research Publications House http://www. irphouse.com A Novel Approach for Signing
A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract
A Security Flaw in the X509 Standard Santosh Chokhani CygnaCom Solutions, Inc Abstract The CCITT X509 standard for public key certificates is used to for public key management, including distributing them
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Encryption/Decryption using Public Key Cryptography Network Security Chapter 2 Basics 2.2 Public Key Cryptography
Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms
Principles of Public Key Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter : Security on Network and Transport
IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING Sonam Mahajan 1 and Maninder Singh 2 1 Department of Computer Science Engineering, Thapar University, Patiala, India 2 Department of Computer Science Engineering,
CMSS An Improved Merkle Signature Scheme
CMSS An Improved Merkle Signature Scheme Johannes Buchmann 1, Luis Carlos Coronado García 2, Erik Dahmen 1, Martin Döring 1, and Elena Klintsevich 1 1 Technische Universität Darmstadt Department of Computer
Hardware-Software Codesign in Embedded Asymmetric Cryptography Application a Case Study
Hardware-Software Codesign in Embedded Asymmetric Cryptography Application a Case Study Martin Šimka1, Viktor Fischer 2, and Miloš Drutarovský 1 1 Department of Electronics and Multimedia Communications,
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS ABSTRACT Greeshma Sarath 1, Devesh C Jinwala 2 and Sankita Patel 3 1,2,3 Department of Computer Engineering, SVNIT, Surat [email protected],
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
LUC: A New Public Key System
LUC: A New Public Key System Peter J. Smith a and Michael J. J. Lennon b a LUC Partners, Auckland UniServices Ltd, The University of Auckland, Private Bag 92019, Auckland, New Zealand. b Department of
Performance Comparison of Elliptic Curve and RSA Digital Signatures
Performance Comparison of Elliptic Curve and RSA Digital Signatures Nicholas Jansma [[email protected]] Brandon Arrendondo [[email protected]] April 28, 2004 Abstract. This paper compares
Speeding Up RSA Encryption Using GPU Parallelization
2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation Speeding Up RSA Encryption Using GPU Parallelization Chu-Hsing Lin, Jung-Chun Liu, and Cheng-Chieh Li Department of
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Evaluation of Digital Signature Process
Evaluation of Digital Signature Process Emil SIMION, Ph. D. email: [email protected] Agenda Evaluation of digital signatures schemes: evaluation criteria; security evaluation; security of hash functions;
Public Key (asymmetric) Cryptography
Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: [email protected]) Course of Network Security,
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New
Data Security in Cloud Computing using Elliptical Curve Cryptography
Data Security in Cloud Computing using Elliptical Curve Cryptography Mr. Pragnesh G. Patel #1, Mr. S.M.Shah *2 # M.E.C.S.E, Government Engineering College Sector-28, Gandhinagar, Gujarat, India 1 [email protected]
Klaus Hansen, Troels Larsen and Kim Olsen Department of Computer Science University of Copenhagen Copenhagen, Denmark
On the Efficiency of Fast RSA Variants in Modern Mobile Phones Klaus Hansen, Troels Larsen and Kim Olsen Department of Computer Science University of Copenhagen Copenhagen, Denmark Abstract Modern mobile
Public Key Cryptography of Digital Signatures
ACTA UNIVERSITATIS APULENSIS No 13/2007 MATHEMATICAL FOUNDATION OF DIGITAL SIGNATURES Daniela Bojan and Sidonia Vultur Abstract.The new services available on the Internet have born the necessity of a permanent
Cryptography and Network Security Chapter 9
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,
Elliptic Curve Cryptography
Elliptic Curve Cryptography Elaine Brow, December 2010 Math 189A: Algebraic Geometry 1. Introduction to Public Key Cryptography To understand the motivation for elliptic curve cryptography, we must first
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Notes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015
Performance Investigations Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015 1 Motivation In we tried to provide guidance for the use of DTLS (TLS) when used in
Crittografia e sicurezza delle reti. Digital signatures- DSA
Crittografia e sicurezza delle reti Digital signatures- DSA Signatures vs. MACs Suppose parties A and B share the secret key K. Then M, MAC K (M) convinces A that indeed M originated with B. But in case
Network Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing
Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing S.Hemalatha, Dr.R.Manickachezian Ph.D Research Scholar, Department of Computer Science, N.G.M College, Pollachi,
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS- SIMULATION USING NS2
American Journal of Applied Sciences 11 (2): 171-179, 2014 ISSN: 1546-9239 2014 Science Publication doi:10.3844/ajassp.2014.171.179 Published Online 11 (2) 2014 (http://www.thescipub.com/ajas.toc) CERTIFICATE
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
A novel deniable authentication protocol using generalized ElGamal signature scheme
Information Sciences 177 (2007) 1376 1381 www.elsevier.com/locate/ins A novel deniable authentication protocol using generalized ElGamal signature scheme Wei-Bin Lee a, Chia-Chun Wu a, Woei-Jiunn Tsaur
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
with Embedding Degree 10 University of California, Berkeley, USA ANTS-VII, 2006 Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3 Outline 1 Introduction
Design and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Data Security in Cloud Using Elliptic Curve Crytography
Data Security in Cloud Using Elliptic Curve Crytography Puneetha C 1, Dr. M Dakshayini 2 PG Student, Dept. of Information Science & Engineering, B.M.S.C.E, Karnataka, Bangalore,India 1 Professor, Dept.
Ashraf Abusharekh Kris Gaj Department of Electrical & Computer Engineering George Mason University
COMPARATIVE ANALYSIS OF SOFTWARE LIBRARIES FOR PUBLIC KEY CRYPTOGRAPHY Ashraf Abusharekh Kris Gaj Department of Electrical & Computer Engineering George Mason University 1 OBJECTIVE Evaluation of Multi-precision
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
Security and Authentication Primer
Security and Authentication Primer Manfred Jantscher and Peter H. Cole Auto-ID Labs White Paper WP-HARDWARE-025 Mr. Manfred Jantscher Visiting Master Student, School of Electrical and Electronics Engineering,
Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay
Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -721302 Objectives Introduction
Public Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
A Novel Approach to combine Public-key encryption with Symmetric-key encryption
Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach
