Abstract
Properties like short keys and efficient algorithms make elliptic curve cryptography (ECC) more and more interesting for future oriented applications. In this paper we give a short overview of the basics of ECC. Thereby we show where programmers can gain possible speed-ups and what parts are crucial. Since there are many different implementation options and some of the algorithms are patented, we believe that there is no optimal solution. Therefore we introduce a software framework, which allows a transparent replacement of data and algorithms. Furthermore, we discuss aspects of the standardized encoding, and point out where interoperability problems could occur.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35612-9_23
Chapter PDF
Similar content being viewed by others
References
Michael Brown, Darrel Hankerson, Julio Lopez, Alfred Menezes. Software implementation of the NIST elliptic curves over prime fields. In CT-RSA, pages 250–265, 2001.
Certicom. Sec 1: Elliptic curve cryptography, 2000.
Certicom. Sec 2: Recommended elliptic curve domain parameters, 2000.
Daniel M. Gordon. A survey of fast exponentiation methods. J. Algorithms, 27 (1): 129–146, 1998.
Jorge Guaiardo and Christof Paar. Efficient algorithms for elliptic curve cryptosystems. In CRYPTO, pages 342–356, 1997.
Darrel Hankerson, Julio Lopez Hernandez, and Alfred Menezes. Software implementation of elliptic curve cryptography over binary fields. In Cryptographic Hardware and Embedded Systems, pages 1–24, 2000.
IEEE. 1363 standard specification for public key cryptography, 2000.
American National Standards Institute. X9.62–1998, public key cryptography for the financial services industries: The elliptic curve digital signature algorithm (ecdsa), 1998.
D. Johnson, A. Menezes. The elliptic curve digital signature algorithm (ecdsa), 1999.
Bodo Moeller. Algorithms for Multi-exponentiation, pages 165–180. Springer-Verlag, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Bauer, W. (2002). Implementing Elliptic Curve Cryptography. In: Jerman-Blažič, B., Klobučar, T. (eds) Advanced Communications and Multimedia Security. IFIP — The International Federation for Information Processing, vol 100. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35612-9_3
Download citation
DOI: https://doi.org/10.1007/978-0-387-35612-9_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-4405-7
Online ISBN: 978-0-387-35612-9
eBook Packages: Springer Book Archive