Title :
Elliptic Curve Cryptography and its applications
Author :
Amara, Moncef ; Siad, Amar
Author_Institution :
Lab. LAGA, Univ. Paris-8, St. Denis, France
Abstract :
The idea of Elliptic Curve Cryptography (ECC), and how it´s a better promise for a faster and more secure method of encryption in comparison to the current standards in the Public-Key Cryptographic algorithms of RSA is discussed in this paper. The Elliptic Curve Cryptography covers all relevant asymmetric cryptographic primitives like digital signatures and key agreement algorithms. The function used for this purpose is the scalar multiplication k.P which is the core operation of ECCs. Where k is an integer and P is a point on an elliptic curve. This article explains the role of ECC in the network security. ECC´s uses with smaller keys to provide high security and high speed.
Keywords :
public key cryptography; RSA; asymmetric cryptographic primitives; digital signatures; elliptic curve cryptography; key agreement algorithm; network security; public-key cryptographic algorithm; scalar multiplication; Digital signatures; Elliptic curve cryptography; Elliptic curves; Protocols;
Conference_Titel :
Systems, Signal Processing and their Applications (WOSSPA), 2011 7th International Workshop on
Conference_Location :
Tipaza
Print_ISBN :
978-1-4577-0689-9
DOI :
10.1109/WOSSPA.2011.5931464