Efficient implementation of elliptic curve cryptography (ECC) for personal digital assistants (PDAs)

被引:10
作者
Dabholkar, A [1 ]
Yow, KC [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
elliptic curve cryptography; cryptosystem implementation for PDAs;
D O I
10.1023/B:WIRE.0000047066.74117.86
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless devices are characterized by low computational power and memory. In addition to this wireless environment are inherently less secure than their wired counterparts, as anyone can intercept the communication. Hence they require more security. One way to provide more security without adding to the computational load is to use elliptic curve cryptography (ECC) in place of the more traditional cryptosystems such as RSA. As ECC provides the same level of security for far less key sizes, as compared to the traditional cryptosystems, it is ideal for wireless security. In this thesis we will investigate the different ways of implementing ECC on wireless devices such as personal digital assistants (PDAs). We will present our findings and compare the different implementations. In our implementation ECC over the field F-2(n) using optimal normal basis representation gives the best results.
引用
收藏
页码:233 / 246
页数:14
相关论文
共 15 条
  • [1] ANDERSON R, 2002, SECURITY ENG
  • [2] *B KAL RSA LAB, 2000, IPA TAO CRYPT S
  • [3] BERLEKAMP E, 1986, ALGEBRAIC CODING THE
  • [4] *CERT CORP, 2002, ELL CURV CRYPT SMART
  • [5] CHRISTENSEN G, 2001, WIRELESS INFRASTRUCT
  • [6] DABHOLKAR A, 2003, IEEE MOBILE WIRELESS
  • [7] LENSTRA AK, 1999, J CRYPTOLOGY
  • [8] MENZES A, 1993, ELLIPTIC CURVE PUBLI
  • [9] PIETILAINEN H, THESIS U HELSINKI
  • [10] Randall N.K., 2002, WIRELESS SECURITY MO