DocumentCode
3696615
Title
Elliptic curve cryptography: Algorithms and implementation analysis over coordinate systems
Author
Iskandar Setiadi;Achmad Imam Kistijantoro;Atsuko Miyaji
Author_Institution
School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, Indonesia
fYear
2015
Firstpage
1
Lastpage
6
Abstract
Since the last decade, the growth of computing power and parallel computing has resulted in significant needs of efficient cryptosystem. Elliptic Curve Cryptography (ECC) offers faster computation and stronger security over other asymmetric cryptosystems such as RSA. ECC can be used for several cryptography activities: secret key sharing, message encryption, and digital signature. This paper gives step-by-step tutorial to transform ECC over prime field GF(p) from mathematical concept to the software implementation. This paper also gives several alternatives and tradeoffs between different coordinate systems in the computational process. The implementation result is quite interesting since several computational costs have been optimized in latest instruction sets. For the study case, we provides the implementation result in C language with GNU GMP library on Intel i3 CPU M350 2.27GHz (1 Core, 2 GB RAM, 32-bit architecture).
Keywords
"Elliptic curve cryptography","Elliptic curves","Algorithm design and analysis","Jacobian matrices","Galois fields","Encryption"
Publisher
ieee
Conference_Titel
Advanced Informatics: Concepts, Theory and Applications (ICAICTA), 2015 2nd International Conference on
Print_ISBN
978-1-4673-8142-0
Type
conf
DOI
10.1109/ICAICTA.2015.7335349
Filename
7335349
Link To Document