Skip to main content

Two Galois Fields Cryptographic Applications

  • Chapter
  • First Online:
Algebraic Circuits

Abstract

This last chapter is devoted to illustrating Galois Fields possibilities in cryptography. Thus, as an example, two cryptographic applications of the circuits described in previous chapters are presented. Nowadays, cryptographic applications are becoming more and more important in communications, especially when using public channels such as Internet. The different standards available are usually software implemented, but in the following faster hardware implementations are described. First Section introduces general concepts about cryptography, while the second one presents the discrete logarithm based cryptosystems. The third one describes elliptic curve cryptosystems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Baldoni, M.W., Ciliberto, C., Cattaneo, G.M.P.: Elementary Number Theory, Cryptography and Codes. Springer, Berlin (2009)

    Book  MATH  Google Scholar 

  2. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  3. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 472–496 (1985)

    Google Scholar 

  4. IEEE Standard Specifications for Public-Key Cryptography. IEEE Std. 1363–2000 (2000)

    Google Scholar 

  5. National Institute of Standards and Technology: FIPS 186-4, digital signature standard (DSS), Gaithersburg, MD, July 2013

    Google Scholar 

  6. Singh, S.: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Books, New York (2000)

    Google Scholar 

  7. Standards for Efficient Cryptography, SEC2: Recommended elliptic curve domain parameters, v1.0. Available at http://www.secg.org/ (2000). Accessed 20 Sept 2000

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Antonio Lloris Ruiz .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Lloris Ruiz, A., Castillo Morales, E., Parrilla Roure, L., García Ríos, A. (2014). Two Galois Fields Cryptographic Applications. In: Algebraic Circuits. Intelligent Systems Reference Library, vol 66. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54649-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54649-5_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54648-8

  • Online ISBN: 978-3-642-54649-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics