Abstract
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields satisfying the curve equation in the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and Montgomery elliptic curves, which could have an impact in current ECC deployments. This contribution evaluates the performance of the three types of elliptic curves using some of the examples provided by the initiative SafeCurves and a Java implementation developed by the authors, which allows us to offer some conclusions about this topic.
This is a preview of subscription content, log in via an institution.
References
Koblitz, N.: Elliptic curve cryptosytems. Math. Comput. 48(177), 203–209 (1987)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). doi:10.1007/3-540-39799-X_31
American National Standards Institute: Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63 (2001)
IEEE: Standard specifications for public key cryptography. Institute of Electrical and Electronics Engineers, IEEE 1363 (2000)
National Institute of Standard and Technology: Digital Signature Standard (DSS). NIST FIPS 186-4 (2009). http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
Brainpool: ECC Brainpool standard curves and curve generation, version 1.0 (2005). http://www.ecc-brainpool.org/download/Domain-parameters.pdf
Lochter, M., Merkle, J.: Elliptic Curve Cryptography (ECC) Brainpool standard curves and curve generation. Request for comments (RFC 5639), Internet Engineering Task Force (2010)
Bernstein, D.J., Lange, T.: SafeCurves (2014). http://safecurves.cr.yp.to/
Menezes, A.J.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston (1993)
Cohen, H., Frey, G.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Discrete Mathematics and its Applications. Chapman & Hall/CRC, Boca Raton (2006)
Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207–228. Springer, Heidelberg (2006). doi:10.1007/11745853_14
National Security Agency: NSA Suite B cryptography (2009). http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml
Bundesamt für Sicherheit in der Informationstechnik: Elliptic curve cryptography. BSI TR-03111 version 2.0. (2012). https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TR03111/BSI-TR-03111_pdf.pdf?__blob=publicationFile
Bernstein, D.J., Lange, T.: Explicit-formulas database (2016). https://hyperelliptic.org/EFD/
Edwards, H.M.: A normal form for elliptic curves. Bull. Am. Math. Soc. 44, 393–422 (2007)
Acknowledgements
This work has been supported by the European Union FEDER funds distributed through Ministerio de Economía y Competitividad (Spain) under the project TIN2014-55325-C2-1-R (ProCriCiS), and through Comunidad de Madrid (Spain) under the project S2013/ICE-3095-CM (CIBERDINE).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Durán Díaz, R., Gayoso Martínez, V., Hernández Encinas, L., Martín Muñoz, A. (2017). A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes. In: Graña, M., López-Guede, J.M., Etxaniz, O., Herrero, Á., Quintián, H., Corchado, E. (eds) International Joint Conference SOCO’16-CISIS’16-ICEUTE’16. SOCO CISIS ICEUTE 2016 2016 2016. Advances in Intelligent Systems and Computing, vol 527. Springer, Cham. https://doi.org/10.1007/978-3-319-47364-2_64
Download citation
DOI: https://doi.org/10.1007/978-3-319-47364-2_64
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47363-5
Online ISBN: 978-3-319-47364-2
eBook Packages: EngineeringEngineering (R0)