Skip to main content

A Study on Android-Based Real Number Field Elliptic Curve Key Table Generation

  • Conference paper
Computer Applications for Security, Control and System Engineering

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 339))

  • 2637 Accesses

Abstract

Encryption algorithms are used to protect data, but encrypted data depend on the safety of the key used in the encryption algorithm, so it is very important to generated a key that cannot be easily inferred for a safer protection of data. For this, in order to broaden the choice of keys used in encryption algorithm, this paper proposed the method to generate a key table by expanding the previously proposed elliptic curve algorithm to real number field, and the proposed method was applied to Android-based smartphone cryptosystem for verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Park, J., Min, H., Jang, J., Cho, Y., Hong, J.: Survey of Security Techniques for Android Platform. Journal of The Korea Computer Congress 38(1B), 52–54 (2011)

    Google Scholar 

  2. Choi, J.-H., Jeong, C.-W., Joo, S.-C.: Design and Implementation of Android Context-based Security Service Based on Ubiquitous Computing. Journal of The Korean Society for Internet Information Autumn Academic Conference 12(2), 107–108 (2011)

    Google Scholar 

  3. Lee, J.-M., Lee, C., Kwon, W.-S.: Design of Programmable and Configurable Elliptic Curve Cryptosystem Coprocessor. Journal of The Institute of Electronics Engineers of Korea 42(6), 67–74 (2005)

    Google Scholar 

  4. Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  5. Koblitz, N.: Elliptic curve crypto-systems. Mathematic of Computation 48, 203–209 (1987)

    Article  MATH  Google Scholar 

  6. Chung, B., Lee, S., Hong, S.-M., Yoon, H.: Fast Scalar Multiplication Algorithm on Elliptic Curve over Optimal Extension Fields. Journal of The Korea Institute of Information Security & Cryptology 15(3), 65–76 (2005)

    Google Scholar 

  7. Wiener, M., Zuccherato, R.J.: Faster Attacks on Elliptic Curve Cryptosystems. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 190–200. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  8. Goo, E.: Elliptic Curve Cryptography over Real Plane. Doctoral Dissertation, Dankook University (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Goo, Eh., Lee, Sd. (2012). A Study on Android-Based Real Number Field Elliptic Curve Key Table Generation. In: Kim, Th., et al. Computer Applications for Security, Control and System Engineering. Communications in Computer and Information Science, vol 339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35264-5_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35264-5_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35263-8

  • Online ISBN: 978-3-642-35264-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics