Courbes Elliptiques et Cryptographie

PDF

Authors
  1. Rostand, J.
Corporate Authors
Defence Research Establishment Ottawa, Ottawa ONT (CAN)
Abstract
Public key cryptography is widely used nowadays for electronic data protection. One of the most promising public key technique is based on the theory of elliptic curves. The objective of this document is to describe elliptic curve cryptography (ECC). We will start with recalling some basic notions of algebraic structures. Then, we will define the concept of elliptic curves and groups over elliptic curves and we will see how those groups can be used to construct a public key cryptosystem. Thereafter, we ill discuss the case of some particular elliptic curves that are known to be insecure in cryptography. Finally, we will wind up with a review of the international standards that are related to ECC.

Il y a un résumé en français ici.

Keywords
Courbes elliptiques;Cryptographie;Signature électronic;Cryptage;Echange de clés;Normes;ECC;Public key systems;Public Key Infrastructure
Report Number
DREO-TM-2001-095 — Technical Memorandum
Date of publication
01 Oct 2001
Number of Pages
64
DSTKIM No
CA020864
CANDIS No
517601
Format(s):
Hardcopy;Document Image stored on Optical Disk

Permanent link

Document 1 of 1

Date modified: