Title :
Elliptic curve cryptography on constraint environments
Author :
De Santos, María Miguel ; Sanchez-Avila, C. ; Sanchez-Reillo, R.
Author_Institution :
E.T.S.I. Telecomunicacion, Univ. Politecnica de Madrid, Spain
Abstract :
The main target of this work is to expose the capacities that make elliptic curve cryptography the most suitable one to be implemented in environments with several constraints related to processor speed, bandwidth, security and memory. We have analyzed several elliptic curve cryptosystems with other public key ones. We have made a comparison among different public key cryptosystems (such as ElGamal for encryption and Diffie-Hellman for key exchanging) and the corresponding ones based on elliptic curve theory; highlighting algorithm speed characteristics.
Keywords :
public key cryptography; Diffie-Hellman; ElGamal; constraint environments; elliptic curve cryptography; elliptic curve theory; encryption; key exchange; public key cryptosystems; Bandwidth; Elliptic curve cryptography; Elliptic curves; Galois fields; Public key; Public key cryptography; Safety; Security; Telecommunications; Testing;
Conference_Titel :
Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on
Print_ISBN :
0-7803-8506-3
DOI :
10.1109/CCST.2004.1405395