Danh mục

CRYPTOGRAPHY AND NETWORK SECURITY: Principles and Practice

Số trang: 588      Loại file: pdf      Dung lượng: 18.87 MB      Lượt xem: 8      Lượt tải: 0    
Jamona

Xem trước 10 trang đầu tiên của tài liệu này:

Thông tin tài liệu:

For an equivalent level of security, elliptic curve cryptography uses shorter key sizes and isconsidered to be an excellent candidate for constrained environments like wireless/mobilecommunications. In FIPS 186-2, NIST recommends several finite fields to be used in theelliptic curve digital signature algorithm (ECDSA). Of the ten recommended finite fields,five are binary extension fields with degrees ranging from 163 to 571. The fundamentalbuilding block of the ECDSA, like any ECC based protocol, is elliptic curve scalar mul-tiplication. This operation is also the most computationally intensive. In many situationsit may be desirable to accelerate the elliptic curve scalar multiplication with specializedhardware....
Nội dung trích xuất từ tài liệu:
CRYPTOGRAPHY AND NETWORK SECURITY: Principles and Practice

Tài liệu được xem nhiều: