skip to main content
10.1145/1059524.1059542acmconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
Article

Elliptic curve cryptography: Java implementation

Published:08 October 2004Publication History

ABSTRACT

The use of Java in developing commercial Internet applications is growing very rapidly. A major requirement for e-commerce applications is the provision of security. In this work we consider Elliptic Curve Cryptography (ECC) because of the high level of security it provides with small key sizes. ECC is ideal for use on constrained environments such as pagers, personal digital assistants, cellular phones and smart cards. We implement the ECC algorithms approved by the National Institute of Standards and Technology (NIST) in Java on the Dell Inspiron 7500. The speeds of the various ECC algorithms are provided.

References

  1. Agnew, G. B., Mullin, R. C., and Vanstone, S. A. An Implementation of elliptic curve cryptosystem over F155. IEEE journal on selected areas in communication, Vol 11, No 5, 1993 804--813.]]Google ScholarGoogle Scholar
  2. Blake, I., Seroussi, G., and Smart N. Elliptic Curves in Cryptography. Cambridge University Press, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Edoh K. D., and Wahab H. Multicast security: Issues and new schemes for key management. Proceedings of 2003 Information Resource Management Association International Conference, 2003, 123--126.]]Google ScholarGoogle Scholar
  4. Hankerson, D., Hernandez, L. J., and Menezes A. Software implementation of elliptic curve cryptography over binary fields, CHESS 2000, LNCS 1965, 2000, 1--24.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Koblitz N. Elliptic curve cryptosystem. Mathematics in Computation. (48), 1987, 203--209.]]Google ScholarGoogle Scholar
  6. Koblitz N. A Course in Number Theory and Crytography, Springer Verlag. 2nd Ed, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Koblitz N. CM-curves with good cryptographic properties. Advances in Cryptology-CRYPTO '91. LNCS 576, Springer-Verlag, 1992, 279--287.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Koblitz N., Menezes A. J., and Vanstone S. A. The state of elliptic curve cryptography. Design, Codes, and Cryptography. Vol 19, Issue 2-3, 2000, 173--193.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Lenstra A., and Verheul E. Selecting cryptographic key sizes. Third International Workshop on Practice and Theory in Public Key Cryptography-PKC 2000. LNCS 1751, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Miller V. Use of elliptic curves in cryptography. Advances in Cryptography-Crypto '85. LNCS 218, Springer Verlag, 1986, 417--426.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Menezes A. J. Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Menezes A. J., van Oorschot P. C., and Vanstone S. A. Handbook of Applied Cryptography. CRC Press, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Menezes A. J., Teske E., and Weng A. Weak fields for ECC. CORR 2003-15, Technical Report, University of Waterloo, 2003.]]Google ScholarGoogle Scholar
  14. McEliece R. J. Finite Fields for Computer Scientists and Engineers Kluwer Academic Publishers, 1987.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Rivest R., Schamir A. and Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, 1978, 120--126.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Schoof R. Elliptic curves over finite fields and the computation of square roots mod p. Math. Comp., 44, 1985, 483--494.]]Google ScholarGoogle Scholar
  17. Solinas J. An improved algorithm for arithmetic on a family of elliptic curves. Advances in Cryptology, Proc. Crypto '9. LNCS 1294 Kaliski B., Ed., Springer-Verlag, 1997, 357--371.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Solinas J. Efficient arithmetic on Koblitz curves. Design, Codes and Cryptography, 19, 2000, 195--249.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. The openSSL project, http://www.openSSL.org. 1998-2003.]]Google ScholarGoogle Scholar

Index Terms

  1. Elliptic curve cryptography: Java implementation

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum development
          October 2004
          147 pages
          ISBN:1595930485
          DOI:10.1145/1059524

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 October 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate18of23submissions,78%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader