【24h】

Implementing Elliptic Curve Cryptography

机译:实施椭圆曲线密码学

获取原文

摘要

The strength of public key cryptography utilizing Elliptic Curves relies on the difficulty of computing discrete logarithms in a finite field. Diffie-Hellman key exchange algorithm also relies on the same fact. There are two flavors of this algorithm, one using Elliptic Curves and another without using Elliptic Curves. Both flavors of the algorithm rely on the difficulty of computing discrete logarithms in a finite field. Other public key cryptographic algorithms, such as RSA, rely on the difficulty of integer factorization. Both flavors of Diffie-Hellman key exchange algorithm will be discussed in this paper, and we will show implementation details of both of them. Additionally, we will describe what Elliptic Curve Cryptography (ECC) is, and how we can implement different cryptographic algorithms in java, such as digital signatures, encryption/decryption and Key exchange. We will not utilize the java built-in implementations of ECC. Instead, we will use the java programming language as a platform to implement several cryptographic algorithms from the ground up, thus revealing the details of each algorithm and the proofs and reasons these algorithms work. We will describe the theory of ECC and show implementation details that would help students, practitioners, and researchers understand, implement and experiment with such algorithms.
机译:利用椭圆曲线的公钥加密的强度依赖于在有限域中计算分立对数的难度。 Diffie-Hellman密钥交换算法也依赖于同样的事实。该算法有两种味道,一个使用椭圆曲线和另一个而不使用椭圆曲线。该算法的两种口味依赖于计算有限字段中的离散对数的难度。其他公钥加密算法,如RSA,依靠整数分解的难度。本文将讨论Diffie-Hellman密钥交换算法的两种口味,我们将显示它们两者的实施细节。此外,我们将描述椭圆曲线密码(ECC)是什么,以及我们如何在Java中实现不同的加密算法,例如数字签名,加密/解密和密钥交换。我们不会利用ECC的Java内置实现。相反,我们将使用Java编程语言作为平台来实现来自地点的多个加密算法,从而揭示了每种算法的细节和这些算法工作的证明和原因。我们将描述ECC的理论,并展示将有助于学生,从业者和研究人员了解,实施和实验此类算法的实施细节。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号