elliptic curve cryptography


Also found in: Dictionary, Thesaurus, Medical, Acronyms, Wikipedia.

elliptic curve cryptography

A public key cryptography method that provides fast decryption and digital signature processing. Elliptic curve cryptography (ECC) uses points on an elliptic curve to derive a 163-bit public key that is equivalent in strength to a 1024-bit RSA key. The public key is created by agreeing on a standard generator point in an elliptic curve group (elliptic curve mathematics is a branch of number theory) and multiplying that point by a random number (the private key). Although the starting point and public key are known, it is extremely difficult to backtrack and derive the private key.

Once the public key is computed by ECC, it can be used in various ways to encrypt and decrypt. One way is to encrypt with the public key and decrypt with the private one. Another is to use the Diffie-Hellman method which uses a key exchange to create a shared secret key by both parties. Finally, ECC allows a digital signature to be signed with a private key and verified with the public key. For an in-depth look at elliptic curve cryptography, visit Certicom's website at www.certicom.com. There are live examples that show the math and methods. See Diffie-Hellman.
References in periodicals archive ?
SPYRUS was the first security vendor to incorporate support for the strongest "Suite B" cryptographic algorithms (including Elliptic Curve Cryptography with P-384 keys, AES-256, and SHA-384) into its hardware and software products, and WinMagic is now the first provider of Suite B-enabled full-disk encryption solutions.
The need for stronger security is driving the demand for elliptic curve cryptography (ECC), which is recommended by the U.
The Company has more than 350 patents for elliptic curve cryptography (ECC), which is the world's largest intellectual property portfolio for these types of patents.
TSX: CIC) and Nippon Telegraph and Telephone Corporation have signed an agreement to conduct joint research on various aspects of elliptic curve cryptography (ECC).
The panel will focus on the important new application of elliptic curve cryptography (ECC) in Transport Layer Security (TLS) and talk about the industry factors that have spurred this change toward adopting new cryptographic standards.
The new SPYRUS Hydra Privacy Card(R) (Hydra PC) Series II enables the same powerful Windows encryption and authentication services as the SPYRUS Rosetta security devices, and includes Suite B; Elliptic Curve Cryptography, the Advanced Encryption Standard and "SHA-2.
31 /PRNewswire-FirstCall/ -- Certicom (TSX: CIC) today announced that its chief technology officer, Bill Lattin, will speak at the RSA Conference 2007 about the important new application of elliptic curve cryptography (ECC) in TLS.
the Global Information Assurance Company, announced today that it has received the first license for Elliptic Curve Cryptography (ECC) issued by the National Security Agency for 26 U.
Elliptic curve cryptography (ECC) is the only public key used in Suite B, and therefore, is quickly replacing RSA algorithms as the de facto public key used in security mechanisms.
The National Security Agency (NSA) publicly announced in October 2003 its intent to adopt elliptic curve cryptography (ECC), which forms the heart of the Suite B algorithms.
Because of the government's crypto modernization program, elliptic curve cryptography (ECC) is becoming the de facto standard for public key," said Dr.