Preview

Elliptic Curves in Public Key Cryptography

Better Essays
Open Document
Open Document
3024 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Elliptic Curves in Public Key Cryptography
Elliptic Curves in Public Key Cryptography: The Diffie Hellman Key Exchange Protocol and its relationship to the Elliptic Curve Discrete Logarithm Problem Public Key Cryptography Public key cryptography is a modern form of cryptography that allows different parties to exchange information securely over an insecure network, without having first to agree upon some secret key. The main use of public key cryptography is to provide information security in computer science, for example to transfer securely email, credit card details or other secret information between sender and recipient via the internet. There are three steps involved in transferring information securely from person A to person B over an insecure network. These are encryption of the original information, called the plaintext, transfer of the encrypted message, or ciphertext, and decryption of the ciphertext back into plaintext. Since the transfer of the ciphertext is over an insecure network, any spy has access to the ciphertext and thus potentially has access to the original information, provided he is able to decipher the message. Thus, a successful cryptosystem must be able encrypt the original message in such a way that only the intended receiver can decipher the ciphertext. The goal of public key cryptography is to make the problem of deciphering the encrypted message too difficult to do in a reasonable time (by say brute-force) unless certain key facts are known. Ideally, only the intended sender and receiver of a message should know these certain key facts. Any certain piece of information that is essential in order to decrypt a message is known as a key. A key(s) specifies the particular function that transforms the original message into ciphertext and vice versa. Public key cryptography relies on two keys, a

private key and a public key. The public key is published in a place where anyone has access to it. However, each individual person or computer also chooses a private key that should



References: Enge, A. Elliptic Curves and their Applications to Cryptography; an Introduction (1999). Koblitz, N. A Course in Number Theory and Cryptography (1994). Koblitz, N. Algebraic Aspects of Cryptography (1998). Koblitz, N. Towards a Quarter-Century of Public Key Cryptography (2000). Silverman, J. and Tate, J. Rational Points on Elliptic Curves (2000).

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    1. Public Keys and Public Certificates can be stored in the Central Repository. It is not the same as the Public Key Infrastructure, but it is not the same.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit Btec Diploma It

    • 950 Words
    • 4 Pages

    Public Key: a public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures…

    • 950 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unsecured Networks – Risk from using unsecured networks can be mitigated but not eliminated. Us encryption technologies to protect the confidentiality and integrity of communications, as well as using mutual authentication mechanisms to verify the identities of both endpoints…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    7. What do you need if you want to decrypt encrypted messages and fi les from a trusted sender?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    A PKI is a structure that provides all the necessary components to enable different users and entities to communicate in a secure and a predictable manner.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Satisfactory Essays

    It Info 1

    • 420 Words
    • 2 Pages

    OK, and how would you use public-private key cryptography to identify the sender of a message?…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Georgie Belcher 012

    • 933 Words
    • 3 Pages

    information which are stored on the computer must have the encryption software which design to encrypt computer data in a way that it cannot be recovered without access to the key.…

    • 933 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a "tunnel" that cannot be "entered" by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses [ (Rouse, 2007) ].…

    • 735 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Paper

    • 408 Words
    • 2 Pages

    OK, and how would you use public-private key cryptography to identify the sender of a message?…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Public Key Infrastructure

    • 2215 Words
    • 9 Pages

    RFC 2822 (Internet Security Glossary) defines public-key infrastructure (PKI) as the set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography. The principal objective for developing a PKI is to enable secure, convenient, and efficient acquisition of public keys. The Internet Engineering Task Force (IETF) Public Key Infrastructure X.509 (PKIX) working group has been the driving force behind setting up a formal (and generic) model based on X.509 that is suitable for deploying a certificate-based architecture on the Internet. This section describes the PKIX model.…

    • 2215 Words
    • 9 Pages
    Good Essays

Related Topics