elliptic curve cryptography


Also found in: Dictionary, Thesaurus, Medical, Acronyms, Wikipedia.

elliptic curve cryptography

A public key cryptography method that provides fast decryption and digital signature processing. Elliptic curve cryptography (ECC) uses points on an elliptic curve to derive a 163-bit public key that is equivalent in strength to a 1024-bit RSA key. The public key is created by agreeing on a standard generator point in an elliptic curve group (elliptic curve mathematics is a branch of number theory) and multiplying that point by a random number (the private key). Although the starting point and public key are known, it is extremely difficult to backtrack and derive the private key.

Once the public key is computed by ECC, it can be used in various ways to encrypt and decrypt. One way is to encrypt with the public key and decrypt with the private one. Another is to use the Diffie-Hellman method which uses a key exchange to create a shared secret key by both parties. Finally, ECC allows a digital signature to be signed with a private key and verified with the public key. For an in-depth look at elliptic curve cryptography, visit Certicom's website at www.certicom.com. There are live examples that show the math and methods. See Diffie-Hellman.
References in periodicals archive ?
Oliveira, Michael Scott, Martin Collier, and Ricardo Dahab, "NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks," in Proc.
This modification was the results of applying the modified algorithm that uses the Elliptic Curve Cryptography with Diffie-Helman methods.
"Research Issues on Elliptic Curve Cryptography and Its applications", International Journal of Computer Science and Network Security, 9(6): 19-22.
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, 2011.
Ning, "TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks," in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN '08), pp.
He, (2011) "Comments on A Password Authentication and Update Scheme Based on Elliptic Curve Cryptography," Cryptology EPrint Archive Report 2011/411.
(1.) Sullivan, N., "A (relatively easy to understand) primer on elliptic curve cryptography," ars technica, October 2013.
The elliptic curve cryptography processor server farm accomplished the consecutive jobs in the order the data were received.
[2] proposed the Elliptic Curve Cryptography. In this method encoding and decoding a text in the implementation of Elliptic Curve Cryptography is a public key cryptography using Koblitz's method [7, 8].
Elliptic curve cryptography is an alternative building block for cryptograpic scheme similar to the conventional RSA, but it is widely believed to be much more secure when implemented using the same key size.
Verify that secure boot capabilities start from a hardware-based root-of-trust and use authentication algorithms such as RSA 2048/4096 or elliptic curve cryptography.