Integrating elliptic curve cryptography into the web's security infrastructure

  title={Integrating elliptic curve cryptography into the web's security infrastructure},
  author={Vipul Gupta and Douglas Stebila and Sheueling Chang Shantz},
  booktitle={WWW Alt. '04},
RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make continued reliance on RSA more challenging over time. We offer Elliptic Curve Cryptography (ECC) as a suitable alternative and describe our integration of this technology into several key components of the Web's security infrastructure. We also present experimental results quantifying the benefits of using ECC for… 

Figures and Tables from this paper

Elliptic Curve Cryptography in Constrained Environments: A Review
  • R. Pateriya, Shreeja Vasudevan
  • Computer Science, Mathematics
    2011 International Conference on Communication Systems and Network Technologies
  • 2011
Elliptic Curve Cryptography offers great potential for the future research due to the ever growing demand for compaction of the devices and load balancing for environments where there are memory, bandwidth and computational constrains.
Performance analysis of RSA and ECC in identity-based authenticated new multiparty key agreement protocol
This paper compares the performance of two public key cryptographic systems namely - RSA and Elliptic Curve Cryptosystem (ECC) by computing execution time and memory size for encryption and decryption process and discusses the relevance of an efficient cryptographic protocol in a key agreement protocol.
Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES)
This paper has compared the security of Elliptic curve AES (ECAES) with the Encryption scheme proposed by the authors and an efficient method for Scalar Multiplication is developed.
Shuffling of Elliptic Curve Cryptography Key on Device Payment
This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange that is well secure against intruders and will prevent the unauthorized extraction of information from communication.
Web-Cloud-based Security Services based-on Elliptic Curves Cryptosystem
The paper expounds how ECC is deployed on the SSL/TLS protocol-the dominant security protocol on the web to contain the adversaries and makes an effort to discover why people may make the choice of ECC over other cryptographic systems like RSA and discrete logarithm cryptographic systems.
An enhanced Elliptic Curve Cryptography for biometric
  • O. Althobaiti, Hatim Aboalsamh
  • Computer Science, Mathematics
    2012 7th International Conference on Computing and Convergence Technology (ICCCT)
  • 2012
The idea of biometric signature - a new method to combine biometrics with public key infrastructure (PKI), the security can be increased using the ECC inBiometric signature creation, because the private and public keys are produced without saving and sending any secret information anywhere.
The protocol develops an environment in which the user node which is unfamiliar to the Main server can transfer information without any eavesdropping of unauthenticated nodes, as the protocol utilizes the elliptic curve cryptography.
An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
A simple and efficient authentication protocol for the establishment of secure communication between base station and nodes in mobile networks, designed by employing a most familiar public-key cryptographic scheme, elliptic curve cryptography, and dedicated to mobile networks for authentication of base station.
A cryptographic processor for arbitrary elliptic curves over GF(2m)
A cryptographic processor for Elliptic Curve Cryptography (ECC) is described, capable of handling arbitrary curves without requiring reconfiguration and integrated into the open source toolkit OpenSSL, which implements the Secure Sockets Layer (SSL).
Using the Digital Signature of a Fingerprint by an Elliptic Curve Cryptosystem for Enhanced Authentication
This work suggests the use of digital signatures through elliptic curve cryptosystem that is embedded with the fingerprint, which can provide enhanced authentication and security.


Selecting Cryptographic Key Sizes
Recommendations for the determination of key sizes for symmetric cryptosystems, RSA, and discrete logarithm-based cryptosSystems both over finite fields and over groups of elliptic curves over prime fields are offered.
Elliptic curve cryptosystems
The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Real World SSL Benchmarking
This standard benchmark can be used to evaluate SSL acceleration products and is proposed to be a standard method and metrics for measuring the performance of the Secure Sockets Layer protocol when used to secure Web transactions.
TWIRL and RSA Key Size
The present invention relates to a process for the purification of effluent which results in the textile, paper and leather industries and in the manufacture of dyestuffs, and which contains
TWIRL and RSA Key Size
See, and
  • See, and
  • Kocher, “The SSL3.0 Protocol Version 3.0”
  • 1996
The SSL3.0 Protocol Version 3
  • The SSL3.0 Protocol Version 3
  • 1996
ECC Cipher Suites for TLS " , IETF internet draft <draft-ietf-tls-ecc-05.txt>
  • ECC Cipher Suites for TLS " , IETF internet draft <draft-ietf-tls-ecc-05.txt>
  • 2004
  • See