CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Diffie-Hellman Key Agreement with Elliptic Curve Discrete Logarithm Problem

by Samta Gajbhiye, Sanjeev Karmakar, Monisha Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 12
Year of Publication: 2015
Authors: Samta Gajbhiye, Sanjeev Karmakar, Monisha Sharma
10.5120/ijca2015907030

Samta Gajbhiye, Sanjeev Karmakar, Monisha Sharma . Diffie-Hellman Key Agreement with Elliptic Curve Discrete Logarithm Problem. International Journal of Computer Applications. 129, 12 ( November 2015), 25-27. DOI=10.5120/ijca2015907030

@article{ 10.5120/ijca2015907030,
author = { Samta Gajbhiye, Sanjeev Karmakar, Monisha Sharma },
title = { Diffie-Hellman Key Agreement with Elliptic Curve Discrete Logarithm Problem },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 12 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number12/23126-2015907030/ },
doi = { 10.5120/ijca2015907030 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:14.129085+05:30
%A Samta Gajbhiye
%A Sanjeev Karmakar
%A Monisha Sharma
%T Diffie-Hellman Key Agreement with Elliptic Curve Discrete Logarithm Problem
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 12
%P 25-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Since the invention of public -key cryptography, numerous public -key cryptographic systems have been proposed. Each of these systems relies on a difficult mathematical problem for its security. Today, three types of systems, classified according to the mathematical problem on which they are based, are generally considered both secure and efficient. The systems are:the integer factorization systems (of which RSA is the best known example), the discrete logarithm systems (such as the U.S. Government’s DSA), the elliptic curve discrete logarithm systems (also known as elliptic curve cryptosystems). This paper focuses on implementing cryptographic services with elliptic curve cryptography (ECC). The principle attraction of ECC is that it appears to offer equal security for a far smaller key size, thereby reducing processor overhead. This paper implements Diffie –Hellman Key aggrement Procotocol using Elliptic Curve as the mathematical technique over prime field Fp

References
  1. N. Koblitz. “Elliptic Curve Cryptosystems”. Mathematics of Computation, Vol. 48, pp 203-209, 1987
  2. V. Miller. “Uses of Elliptic Curves in cryptography”. CRYPT’85, LNCS 218, pp 417-426, 1986.
  3. P. Bulens, G. M. de Dormale and J. J. Quisqauter. “Hardware for collision search on Elliptic Curve over GF (2m)”. SHARCS, Ecrypt Workshop, 2006.
  4. Williams Stallings, Cryptography and Network Security, Prentice Hall, 4th Edition, 2006
  5. Diffie and M. E. Hellman. “New directions in cryptography”. IEEE Transactions on Infornation Theory, Vol. 22, No. 6, pp 644-654, 1976.
  6. Harper, G., Menezes, A., and Vanstone, S., “Public -key cryptosystems with very small key lengths,” Advance in Cryptology, EUROCRYPT ’92 - Lecture Notes in Computer Science, Volume 658, Springer-Verlag, pages 163-173, 1993.
  7. D. Hankerson, A. Menezes and S. Vanstone. Guide to Elliptic Curve Cryptography. Springer-Verlag, New York, NY, 2004. (book)
  8. M. S. Anoop. “Elliptic curve cryptography – an implementation tutorial”. Technical Report, Tata Elxsi Ltd, 2007.
  9. S. Kumar, et al. “Embedded end-to-end wireless security with ECDH key exchange”. In Proceedings of 46th IEEE International Midwest Symposium on Circuits and Systems, 2003
  10. Koblitz, N., A Course in Number Theory and Cryptography, Springer-Verlag, Second Edition,1994.(book)
Index Terms

Computer Science
Information Sciences

Keywords

Diffie-Hellman key Agreement protocol. Elliptic curve cryptography Elliptic Curve Diffiee Hellman(ECDH)