A Study on the Performance of Secure Elliptic Curves for Cryptographic Purposes
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields satisfying the curve equation in the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and Montgomery elliptic curves, which could have an impact in current ECC deployments. This contribution evaluates the performance of the three types of elliptic curves using some of the examples provided by the initiative SafeCurves and a Java implementation developed by the authors, which allows us to offer some conclusions about this topic.
KeywordsEdwards curves Elliptic curve cryptography Java Montgomery curves Point arithmetic Weierstrass curves
This work has been supported by the European Union FEDER funds distributed through Ministerio de Economía y Competitividad (Spain) under the project TIN2014-55325-C2-1-R (ProCriCiS), and through Comunidad de Madrid (Spain) under the project S2013/ICE-3095-CM (CIBERDINE).
- 3.American National Standards Institute: Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. ANSI X9.63 (2001)Google Scholar
- 4.IEEE: Standard specifications for public key cryptography. Institute of Electrical and Electronics Engineers, IEEE 1363 (2000)Google Scholar
- 5.National Institute of Standard and Technology: Digital Signature Standard (DSS). NIST FIPS 186-4 (2009). http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
- 6.Brainpool: ECC Brainpool standard curves and curve generation, version 1.0 (2005). http://www.ecc-brainpool.org/download/Domain-parameters.pdf
- 7.Lochter, M., Merkle, J.: Elliptic Curve Cryptography (ECC) Brainpool standard curves and curve generation. Request for comments (RFC 5639), Internet Engineering Task Force (2010)Google Scholar
- 8.Bernstein, D.J., Lange, T.: SafeCurves (2014). http://safecurves.cr.yp.to/
- 12.National Security Agency: NSA Suite B cryptography (2009). http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml
- 13.Bundesamt für Sicherheit in der Informationstechnik: Elliptic curve cryptography. BSI TR-03111 version 2.0. (2012). https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TR03111/BSI-TR-03111_pdf.pdf?__blob=publicationFile
- 14.Bernstein, D.J., Lange, T.: Explicit-formulas database (2016). https://hyperelliptic.org/EFD/
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.