Elliptic and Hyper Elliptic Curve Cryptography Over Finite Field Fp

Ganesan R*, Gobi M **, K. Vivekanandan***
*Senior Lecturer, Department of MCA, PSG College of Arts and Science, Coimbatore.
**Senior Lecturer, Department of MCA, PSG College of Arts and Science, Coimbatore.
***Faculty Member, Government College of Technology, IBRA, Oman.
Periodicity:October - December'2008
DOI : https://doi.org/10.26634/jse.3.2.248

Abstract

It has recently been reported that elliptic and hyper-elliptic curve cryptography are the two public key cryptographic techniques used to implement the cryptosystems more efficiently and effectively. Many researches are being done to implement these in both hardware and software fields. In this paper, the basic concepts of elliptic and hyper-elliptic curves are discussed. The algorithms for private key, public key generation, encryption and decryption for both elliptic curve and hyper-elliptic curve cryptography are described. Also, the performance of both ECC and HECC are demonstrated. Finally, the comparative study between these two is analyzed.

Keywords

Cryptography, Elliptic curve cryptography, Hyper-elliptic curve cryptography, Encryption, Decryption, Key generation

How to Cite this Article?

Ganesan R, Gobi M and Vivekanandan K (2008). Elliptic and Hyper Elliptic Curve Cryptography Over Finite Field Fp. i-manager’s Journal on Software Engineering, 3(2),43-48. https://doi.org/10.26634/jse.3.2.248

References

[1]. Christophe Doche and Tanja Lange, “Arithmetic of elliptic curves Chapter 13” from “Handbook of Elliptic and Hyper elliptic curve cryptography” by Henri Cohen, Gerhard Frey, Chapman and Hall/CRC, Taylor and Francis Group.
[2]. Colm O hEigeartaigh, “A comparison of point counting methods for Hyper elliptic curve over prime fields and field of characteristics of 2”, School of computing, Dublin City University, Dublin, Ireland.
[4]. Roberto M. Avanzi and Tanja Lange, “Introduction to Public key cryptography Chapter 1” from “Handbook of Elliptic and Hyper elliptic curve cryptography” by Henri Cohen, Gerhard Frey, Chapman and Hall/CRC, Taylor and Francis.
[5]. Roberto Maria Avanzi, “Aspects of hyperelliptic curves over large prime fields in software implementations”, Institute for Experimental Mathematics (IEM), Ellernstrasse 29, D-45326 Essen, Germany, December 17, 2003.
[6]. Sylvain Duquesne and Tanja Lange, “Arithmetic of Hyper elliptic curves Chapter 14” from “Handbook of Elliptic and Hyper elliptic curve cryptography” by Henri Cohen, Gerhard Frey, Chapman and Hall/CRC, Taylor and Francis Group
[7]. Thomas Wollinger, Jan Pelzl, Volker Wittelsberger, and Christof Paar, “Elliptic & Hyperelliptic Curves on Embedded Microprocessor”, ACM Special issue Security and Embedded Systems, March 2003.
[8]. Thompson S.M. “An introduction to Elliptic curve cryptosystems”, 1998, National Westminster Bank Plc.
[9]. Tong Jin, “Researching and Implementing on AKS Algorithm”, University of Bath, May 2005.
[10]. William Stallings, “Cryptography and Network nd Security, Principles and Practice”, 2 Edition, Pearson Education.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.