skip to main content
10.1145/3064814.3064818acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
research-article

Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications

Published: 04 April 2017 Publication History

Abstract

Elliptic curve cryptography (ECC) is a relatively newer form of public key cryptography that provides more security per bit than other forms of cryptography still being used today. We explore the mathematical structure and operations of elliptic curves and how those properties make curves suitable tools for cryptography. A brief historical context is given followed by the safety of usage in production, as not all curves are free from vulnerabilities. Next, we compare ECC with other popular forms of cryptography for both key exchange and digital signatures, in terms of security and speed. Traditional applications of ECC, both theoretical and in-practice, are presented, including key exchange for web browser usage and DNSSEC. We examine multiple uses of ECC in a mobile context, including cellular phones and the Internet of Things. Modern applications of curves are explored, such as iris recognition, RFID, smart grid, as well as an application for E-health. Finally, we discuss how ECC stacks up in a post-quantum cryptography world.

References

[1]
James S. Milne. 2006. Elliptic Curves. BookSurge Publishing, Charleston, SC.
[2]
Alfred J. Menezes, Tatsuaki Okamoto, and Scott A. Vanstone. 2002. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. IEEE Transactions on Information Theory 39, 5 (Aug. 2002), 1639--1646.
[3]
Neal Koblitz. 1987. Elliptic Curve Cryptosystems. Mathematics of Computation 48, 177 (Jan. 1987), 203--209.
[4]
Victor S. Miller. 1985. Use of Elliptic Curves in Cryptography. In CRYPTO '85 Advances in Cryptology. Springer-Verlag, 417--426.
[5]
M. Sudhakar, R.V. Kamala, and M.B. Srinivas. 2007. A Unified, Reconfigurable Architecture for Montgomery Multiplication in Finite Fields GF(p) and GF(2^n). In 20th International Conference on VLSI Design held jointly with 6th International Conference on Embedded Systems (VLSID'07). IEEE, Bangalore, India, 750--755.
[6]
Jean Karim Zinzindohoué, Evmorfia-Iro Bartzia, and Karthikeyan Bhargavan. 2016. A Verified Extensible Library of Elliptic Curves. In 2016 IEEE 29th Computer Security Foundations Symposium (CSF). IEEE, Lisbon, 296--309.
[7]
Daniel J. Bernstein. 2006. Curve25519: New Diffie-Hellman Speed Records. In International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg, 207--228.
[8]
Elaine B. Barker, William C. Barker, William E. Burr, William T. Polk, and Miles E. Smid. 2007. Recommendation for Key Management - Part 1: General (Revision 3). National Institute of Standards & Technology, Gaithersburg.
[9]
Non Thiranant, Young Sil Lee, and Hoonjae Lee. 2015. Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication. In 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops. IEEE, Gwangiu, 278--282.
[10]
OpenSSL. 2016. OpenSSL Cryptography and SSL/TLS Toolkit. (December 2016). Retrieved from https://www.openssl.org/
[11]
Alexa. 2016. Alexa Top 500 Global Sites. (December 2016). Retrieved from http://www.alexa.com/topsites
[12]
Roland van Rijswijk-Deij, Kaspar Hageman, Anna Sperotto, and Aiko Pras. 2016. The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation. IEEE/ACM Transactions on Networking PP, 99 (Sep. 2016), 1--13.
[13]
Wuqiong Pan, Fangyu Zheng, Yuan Zhao, Wen-Tao Zhu, and Jiwu Jing. 2016. An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. IEEE Transactions on Information Forensics and Security 12, 1 (Aug. 2016), 111--122.
[14]
Alavalapati Goutham Reddy, Ashok Kumar Das, Eun-Jun Yoon, and Kee-Young Yoo. 2016. A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. IEEE Access 4 (July 2016), 4394--4407.
[15]
Pranjali Deepak Nikam and Vanita Raut. 2015. Improoved MANET Security Using Elliptic Curve Cryptography and EAACK. In 2015 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, Jabalpur, 1125--1129.
[16]
V L Shivraj, M A Rajan, Meena Singh, and P Balamuralidhar. 2015. One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW). IEEE, Riyadh, 1--6.
[17]
Tarun Kumar Goyal and Vineet Sahula. 2016. Lightweight Security Algorithm for Low Power IoT Devices. In 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, Jaipur, 1725--1729.
[18]
Debiao He, Huaqun Wang, Muhammad Khurram Khan, and Lina Wang. 2016. Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Communications 10, 14 (Sep. 2016), 1795--1802.
[19]
Amit Dua, Neeraj Kumar, Mukesh Singh, M. S. Obaidat, and Kuei-Fang Hsiao. 2016. Secure Message Communication Among Vehicles Using Elliptic Curve Cryptography in Smart Cities. In 2016 International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE, Kunming, 1--6.
[20]
Mustapha Benssalah, Mustapha Djeddou, and Karim Drouiche. 2016. Design and Implementation of a New Active RFID Authentication Protocol Based on Elliptic Curve Encryption. In 2016 SAI Computing Conference (SAI). IEEE, London, 1076--1081.
[21]
Sasank Venkata Vishnubhatla. 2015. An Elliptic Curve Algorithm for Iris Pattern Recognition. In 2015 Annual Global Online Conference on Information and Computer Technology (GOCICT). IEEE, Louisville, KY, 51--59.
[22]
Bart Preneel. 1993. Analysis and Design of Cryptographic Hash Functions.
[23]
Golnaz Sahebi, Amin Majd, Masoumeh Ebrahimi, Juha Plosila, Jaber Karimpour, and Hannu Tenhunen. 2016. SEECC: A Secure and Efficient Elliptic Curve Cryptosystem for E-health Applications. In 2016 International Conference on High Performance Computing & Simulation (HPCS). IEEE, Innsbruck, 492--500.
[24]
Peter W. Shor. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing 26, 5 (Oct. 1997), 1484--1509.
[25]
Lieven M. K. Vandersypen, Matthias Steffen, Gregory Breyta, Costantino S. Yannoni, Mark H. Sherwood, and Isaac L. Chuang. 2001. Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance. Nature 414, 6866 (Dec. 2001), 883--887.
[26]
Nikesh S. Dattani and Nathaniel Bryans. 2014. Quantum factorization of 56153 with only 4 qubits. (November 2014). Retrieved from https://arxiv.org/abs/1411.6758v3
[27]
John Proos and Christof Zalka. 2003. Shor's discrete logarithm quantum algorithm for elliptic curves. Quantum Information & Computation 3, 4 (July 2003), 317--344.
[28]
Chaohui Du and Guoqiang Ba. 2016. High-Performance Software Implementation of Discrete Gaussian Sampling for Lattice-Based Cryptography. In 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference. IEEE, Chongqing, 220--224.
[29]
Li Tian and Wansu Bao. 2010. A Medium Field Multivariate Public Key Signature Scheme with External Perturbation. In 2010 Third International Symposium on Intelligent Information Technology and Security Informatics. IEEE, Jinggangshan, 753--757.
[30]
Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani, and David Jao. 2016. Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves. IEEE Transactions on Circuits and Systems I: Regular Papers 64, 1 (Oct. 2016), 86--99.

Cited By

View all
  • (2024)Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECCAdvances in Science, Technology and Engineering Systems Journal10.25046/aj0903089:3(84-91)Online publication date: Jul-2024
  • (2024)Image Encryption Design Based on Henon Mapping2024 Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)10.1109/IPEC61310.2024.00055(280-285)Online publication date: 12-Apr-2024
  • (2024)A New 12-Bit Chaotic Image Encryption Scheme Using a 12 × 12 Dynamic S-BoxIEEE Access10.1109/ACCESS.2024.337421812(37631-37642)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CISRC '17: Proceedings of the 12th Annual Conference on Cyber and Information Security Research
    April 2017
    106 pages
    ISBN:9781450348553
    DOI:10.1145/3064814
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 April 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. diffie-hellman (DH)
    2. digital signature algorithm (DSA)
    3. elliptic curve DSA (ECDSA)
    4. elliptic curve cryptography (ECC)
    5. elliptic curve diffie-hellman (ECDH)

    Qualifiers

    • Research-article

    Conference

    CISRC'17

    Acceptance Rates

    CISRC '17 Paper Acceptance Rate 8 of 22 submissions, 36%;
    Overall Acceptance Rate 69 of 136 submissions, 51%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)72
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECCAdvances in Science, Technology and Engineering Systems Journal10.25046/aj0903089:3(84-91)Online publication date: Jul-2024
    • (2024)Image Encryption Design Based on Henon Mapping2024 Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)10.1109/IPEC61310.2024.00055(280-285)Online publication date: 12-Apr-2024
    • (2024)A New 12-Bit Chaotic Image Encryption Scheme Using a 12 × 12 Dynamic S-BoxIEEE Access10.1109/ACCESS.2024.337421812(37631-37642)Online publication date: 2024
    • (2024)Hybrid Cryptographic Approach: For Secure Data Communication using Block Cipher TechniquesE3S Web of Conferences10.1051/e3sconf/202455601048556(01048)Online publication date: 9-Aug-2024
    • (2024)3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of ThingsWireless Personal Communications10.1007/s11277-024-11051-0135:2(727-762)Online publication date: 4-May-2024
    • (2024)Constructing a non-degenerate n-dimensional hyper chaotic map model over GF(p) with application in elliptic curve-based PRNGNonlinear Dynamics10.1007/s11071-024-10771-zOnline publication date: 17-Dec-2024
    • (2024)An Efficient Method for Encrypting and Protecting Electricity Usage Privacy DataComputer Applications10.1007/978-981-97-9674-8_25(331-347)Online publication date: 31-Dec-2024
    • (2023)ELLIPTIC CURVE CRYPTOGRAPHY AND ITS PRACTICAL APPLICATIONCybersecurity: Education, Science, Technique10.28925/2663-4023.2023.21.48641:21(48-64)Online publication date: 2023
    • (2023)ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreementComputers and Electrical Engineering10.1016/j.compeleceng.2023.108759109(108759)Online publication date: Aug-2023
    • (2023)Efficient implementation of cancelable face recognition based on elliptic curve cryptographyOptical and Quantum Electronics10.1007/s11082-023-04641-y55:9Online publication date: 15-Jul-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media