APPLICATION OF ELLIPTIC CURVES IN CRYPTOGRAPHY-A REVIEW

Similar documents
CPSC 467b: Cryptography and Computer Security

Polynomial Interpolation in the Elliptic Curve Cryptosystem

CPSC 467: Cryptography and Computer Security

Elliptic Curves I. The first three sections introduce and explain the properties of elliptic curves.

6. ELLIPTIC CURVE CRYPTOGRAPHY (ECC)

Elliptic Curve Cryptography

Elliptic Curve Cryptosystems

Introduction to Elliptic Curve Cryptography. Anupam Datta

Minal Wankhede Barsagade, Dr. Suchitra Meshram

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

Definition of a finite group

A note on López-Dahab coordinates

Elliptic Curve Cryptography

Fast Algorithm in ECC for Wireless Sensor Network

SEMINAR SECURITY - REPORT ELLIPTIC CURVE CRYPTOGRAPHY

Other Public-Key Cryptosystems

Julio López and Ricardo Dahab. Institute of Computing (IC) UNICAMP. April,

Other Public-Key Cryptosystems

The Elliptic Curve in https

Attacks on Elliptic Curve Cryptography Discrete Logarithm Problem (EC-DLP)

Elliptic Curve Cryptosystems and Scalar Multiplication

Chapter 4 Asymmetric Cryptography

Asymmetric Cryptography

8 Elliptic Curve Cryptography

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

Elliptic Curve Cryptography

Elliptic Curve Cryptography

Elliptic curves: Theory and Applications. Day 4: The discrete logarithm problem.

Elliptic Curve Cryptography with Derive

Ti Secured communications

ABHELSINKI UNIVERSITY OF TECHNOLOGY

Elliptic Curves and Cryptography

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

TheSecurityofEllipticCurveCryptosystemsA Survey

Sharing a Secret in Plain Sight. Gregory Quenell

Cryptography IV: Asymmetric Ciphers

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

Modern elliptic curve cryptography

A point compression method for elliptic curves defined over GF (2 n )

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

Asymmetric Encryption

Elliptic Curves and an Application in Cryptography

Fast Scalar Multiplication on Elliptic Curves fo Sensor Nodes

Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System

Introduction to Elliptic Curve Cryptography

PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM

Hardware Implementation of Elliptic Curve Point Multiplication over GF (2 m ) for ECC protocols

Fundamentals of Modern Cryptography

A Note on Scalar Multiplication Using Division Polynomials

Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography

CSC 5930/9010 Modern Cryptography: Number Theory

Elliptic Curve Public-Key Cryptosystems An Introduction

Elliptic Curve Cryptography and Security of Embedded Devices

Mapping an Arbitrary Message to an Elliptic Curve when Defined over GF (2 n )

Lecture V : Public Key Cryptography

International Journal of Advanced Computer Technology (IJACT)

Elliptic Curve Cryptography

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Public Key Algorithms

A Knapsack Cryptosystem Based on The Discrete Logarithm Problem

CPSC 467b: Cryptography and Computer Security

Lecture 1: Introduction to Public key cryptography

One can use elliptic curves to factor integers, although probably not RSA moduli.

Chapter 10 Elliptic Curves in Cryptography

Public-key Cryptography and elliptic curves

KEY EXCHANGE IN ELLIPTIC CURVE CRYPTOGRAPHY BASED ON THE DECOMPOSITION PROBLEM

New Strategy for Doubling-Free Short Addition-Subtraction Chain

arxiv: v3 [cs.cr] 15 Jun 2017

Introduction to Braid Group Cryptography

Discrete logarithm and related schemes

On the complexity of computing discrete logarithms in the field F

Notes for Lecture 17

Non-generic attacks on elliptic curve DLPs

An Application of Discrete Algorithms in Asymmetric Cryptography

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks

An Introduction to Elliptic Curve Cryptography

Overview. Public Key Algorithms II

An Algorithm to Enhance Elliptic Curves Scalar Multiplication Combining MBNR with Point Halving

recover the secret key [14]. More recently, the resistance of smart-card implementations of the AES candidates against monitoring power consumption wa

Lattice-Based Cryptography

Implementing Pairing-Based Cryptosystems

Suppose F is a field and a1,..., a6 F. Definition 1. An elliptic curve E over a field F is a curve given by an equation:

Low-Resource and Fast Elliptic Curve Implementations over Binary Edwards Curves

NTRU Cryptosystem and Its Analysis

Mathematical analysis of the computational complexity of integer sub-decomposition algorithm

Digital Signatures. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay

Trading Inversions for Multiplications in Elliptic Curve Cryptography

Cryptanalysis on An ElGamal-Like Cryptosystem for Encrypting Large Messages

Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem

Lecture 4 Chiu Yuen Koo Nikolai Yakovenko. 1 Summary. 2 Hybrid Encryption. CMSC 858K Advanced Topics in Cryptography February 5, 2004

SPA Resistant Scalar Multiplication using Golden Ratio Addition Chain Method

Optimal Use of Montgomery Multiplication on Smart Cards

Introduction to Cryptography. Lecture 8

Constructing Pairing-Friendly Elliptic Curves for Cryptography

Mathematics of Public Key Cryptography

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

International Electronic Journal of Pure and Applied Mathematics IEJPAM, Volume 9, No. 1 (2015)

On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves

Transcription:

APPLICATION OF ELLIPTIC CURVES IN CRYPTOGRAPHY-A REVIEW Savkirat Kaur Department of Mathematics, Dev Samaj College for Women, Ferozepur (India) ABSTRACT Earlier, the role of cryptography was confined to the transmission of data securely. With the development of internet and the increased use of resource constrained devices, the need was to build up cryptosystems which are faster as well as reliable. Elliptic Curve Cryptography (ECC) is the major advancement in the field of cryptography providing faster and secure methods for encryption. The foundation of ECC is the operation of scalar multiplication in elliptic curves over finite fields. ECC uses shorter key sizes as compared to the classic public key cryptosystems (e.g. RSA) thus providing faster communication methods. The intent of this paper is to discuss the basic arithmetic of elliptic curves and their role in elliptic curve cryptography. Keywords: Elliptic curve, Point addition, Point doubling, Scalar multiplication, Protocol, Elliptic curve cryptography, RSA I. INTRODUCTION In 20 th century, with the development of internet, the need was to have a cryptography technique which would not involve sharing the same keyword between two parties. In 1976, Whitfield Diffie and Martin Hellman proposed Diffie Hellman key exchange protocol, which was the foundation of Public Key Cryptosystem [1]. In 1977, this protocol was implemented in RSA Encryption technique. In 1985, another public key cryptosystem was developed on the basis of nature of elliptic curves in finite fields, named as Elliptic Curve Cryptography (ECC). The first use of elliptic curves in cryptography was recommended by Neal Koblitz and Victor S. Miller. ECC utilizes the methods of Diffie-Hellman Key Exchange and RSA Encryption, but in this system the prime numbers are selected with the help of an elliptic curve in a finite field [2, 3]. An elliptic curve over a field K is an algebraic curve in a plane and is represented by equation (1), as follows: (1) where, l & m K and In other words, the set of points (x,y) which satisfy the above equation together with the point at infinity represent an Elliptic curve [4]. It can be observed that this set of points become an Abelian group under the composition defined in next section. 236 P a g e

II. GROUP OPERATIONS FOR ELLIPTIC CURVE 2.1 Point Addition Elliptic curves form a group under the composition of point addition. The geometric and algebraic approach of this composition is discussed below. 2.1.1 Geometrical Approach Given two points P ( in the set E = as shown in Fig.2.1.1 (a). If P -Q, then the composition is defined as P + Q = R where, R is the point on the curve where the straight line joining the points P and Q meet the curve and R is the reflection of R with respect to x-axis. If P = -Q, then the line through this point intersects at a point at infinity. In this case, P + (-P) = as shown in Fig.2.1.1 (b). is the additive identity of the group of points on the elliptic curve [5]. Fig.2.1.1 (a) point addition P -Q Fig.2.1.1 (b) point addition P = -Q 2.1.2 Algebraic Approach The coordinates of the point R are. Suppose S is the slope of the line joining the points P and Q, therefore S can be expressed by equation (2): S = (2) As the points P, Q and R lie on the elliptic curve, therefore equation (1) implies the following equations: (3) Further, the coordinates of R can be computed as: (4) The operation defined above is also known as Point Addition [2]. Under this operation, elliptic curves satisfy all the properties of an abelian group. 2.2 Point Doubling Point Doubling of a point P ( is defined as the addition of the point to itself. If, then geometrically a tangent is drawn to the curve at that point. The point of intersection of the tangent with the curve is -2P and the reflection of -2P with respect to x axis is 2P. If, then doubling that point is the point at 237 P a g e

infinity [2, 6]. In order to implement Diffie Hellman key exchange protocol, the group operation scalar multiplication is also required. 2.3 Scalar Multiplication Scalar Multiplication is nothing but the repeated point addition. Given a point P ( on the curve and any scalar k Z, the scalar multiplication is defined as: Q = kp = P+P+P+...+P (k times) The operation of scalar multiplication acts as a one way function for Diffie Hellman key exchange protocol [6, 7]. III. ELLIPTIC CURVE CRYPTOGRAPHY 3.1 Elliptic Curve Discrete Log Problem Consider an elliptic curve over a finite field. Given P E ( ) and a scalar k, it is easy to evaluate Q; where Q = kp. But if P and Q are given, it is very difficult to find the scalar k. This is the principle used behind the Diffie Hellman key exchange protocol [4]. 3.2 Domain Parameters The set of parameters {l, m, p, G, n, h} are the domain parameters for Elliptic Curve Cryptography where l and m are the curve parameters; p is the prime number; G is a point on the curve that generates a cyclic subgroup; n is the order of the subgroup generated by the G; h is the cofactor. Ideally, h=1. The parameter n is the least positive integer such that ng = (the point at infinity). The set of domain parameters is the information required by all the parties in order to implement protocol. [8]. 3.3 Implementation In this section, the implementation of Elliptic Curve Cryptosystem is discussed. All the parties which are communicating on a public network are aware of the domain parameters. In particular, if there are two parties then, both the parties choose their private keys say respectively. 1 1 Both parties evaluate the following points and send them publically to each other. 1 st party: A = G 2 nd party: B = G Despite of knowing the points A ( ) and B ( ), no one on the public network can find the values of scalars. Using B and its private key, the first party computes B = G. Similarly, using A and its private key, the second party computes A = G. As the scalar multiplication is commutative, they reach the same point without even knowing each other s secret keys [9]. IV. ECC vs RSA Elliptic curve cryptography provides smaller key sizes as compared to RSA and other public key cryptography methods. Small key sizes require less storage memory, less power consumption and fewer processing units to 238 P a g e

implement the protocol. Smaller keys of ECC provide same level of security as compared to RSA. For example, 1024 bit security potency of RSA is similar to 163 bit security potency of ECC [10, 11]. Table 4.1 represents the key sizes for RSA and ECC with same security level [11-13]. Table 4.1 Comparison between RSA and ECC Security Level (in Bits) RSA: Modulus Size (in Bits) ECC: Key Size (in Bits) Key Size Ratio 80 1024 160 6.4:1 112 2048 224 9.1:1 128 3072 256 12:1 192 7680 384 20:1 256 15360 512 30:1 V. CONCLUSION The remarkable applications of elliptic curves in secret writing make them significant for research. The operation of scalar multiplication in elliptic curves is considered to be more efficient computationally as compared to exponentiation in RSA. The advantage of ECC over RSA is that it maintains same level of security and provides faster communication using smaller key sizes. It has been incorporated in many security standards because of its efficient implementation. Moreover, ECC is quite appropriate for wireless communications, like mobile phones and smart cards. In order to enhance the security level of ECC, improvement can be made in scalar multiplication algorithm. REFERENCES [1] Nicholas G. McDonald, A research review: Past, Present and Future Methods of Cryptography and Data Encryption, University of Utah, 2009, 13-19. [2] Gary C. Kessler, An Overview of Cryptography, 2010, 37-39. Available from: <http:www.garykessler.net/library/crypto.html>. [3] S. Kaur, The Role of Mathematics in Emergence of Cryptography: A Review, International Journal of Advance Research in Science and Engineering, 6(1), 2017, 230-234. [4] V. S. Miller, Use of Elliptic Curves in Cryptography, Conference on the Theory and Application of Cryptographic Techniques, Springer Berlin Heidelberg, 1985. [5] D. Hankerson, A. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography, Springer, NY, USA, 2004, 11-16. [6] M. S. Anoop, Elliptic Curve Cryptography, An Implementation Guide, 2007. [7] M. Joye, C. Tymen, Protections against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approach, Cryptographic Hardware and Embedded Systems, France, 2001, 377-390. 239 P a g e

[8] A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano, Elliptic Curve Cryptography Engineering, Proc. 94 th IEEE Conf., 2006, 395-406. [9] Ian F. Blake, Gadiel Seroussi, Nigel P. Smart, Advances in elliptic curve cryptography, Cambridge University Press, 317, 2005. [10] M. Savari, M. Montazerolzohour, Y. E. Thiam, Comparison of ECC and RSA Algorithm in Multipurpose Smart Card Application, International Conference on Cyber Security, Cyber Warfare and Digital Forensic, 2012, 49-53. [11] M. Bafandehkar, S. Yasin, R. Mahmod, Z. M. Hanapi, Comparison of ECC and RSA Algorithm in Resource Constrained Devices, International Conference on IT Convergence and Security, 2013, 1-3. [12] M. Prabu, R. Shanmugalakshmi, A Comparative and Overview Analysis of Elliptic Curve Cryptography over Finite Fields, International Conference on Information and Multimedia Technology, 2009, 495-499. [13] M. J. B. Robshaw, Y. L. Yin, Elliptic Curve Cryptosystems, An RSA Laboratories Technical Note 1, 1997, 997. 240 P a g e