Title :
Elliptic curve cryptography in Java
Author :
Deligiannidis, Leonidas
Author_Institution :
Dept. of Comput. Sc. & Networking, Wentworth Inst. of Technol., Boston, MA, USA
Abstract :
The strength of public key cryptography utilizing Elliptic Curves relies on the difficulty of computing discrete logarithms in a finite field. Other public key cryptographic algorithms, such as RSA, rely on the difficulty of integer factorization. We will describe how we can implement several cryptographic ECC algorithms in java, such as digital signatures, encryption/decryption and key-exchange. We will show implementation details that would help students, practitioners, and researchers implement and experiment with such algorithms.
Keywords :
Java; public key cryptography; Java; cryptographic ECC algorithms; discrete logarithms; elliptic curve cryptography; integer factorization; public key cryptography; Elliptic curve cryptography; Elliptic curves; Finite element analysis; Galois fields; Java; Elliptic Curve Cryptography; Java;
Conference_Titel :
Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on
Conference_Location :
Baltimore, MD
Print_ISBN :
978-1-4799-9888-3
DOI :
10.1109/ISI.2015.7165975