메뉴 건너뛰기




Volumn 39, Issue 3, 2015, Pages 244-269

Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme

Author keywords

data encryption; elliptic curves; Java; public key cryptography; standards

Indexed keywords


EID: 84936846260     PISSN: 01611194     EISSN: 15581586     Source Type: Journal    
DOI: 10.1080/01611194.2014.988363     Document Type: Article
Times cited : (25)

References (64)
  • 1
    • 84936847858 scopus 로고    scopus 로고
    • DHIES: An Encryption Scheme Based on the Diffie-Hellman Problem. Contribution to IEEE P1363a.
    • M.Abdalla,, M.Bellare, and P.Rogaway. 1998. DHIES: An Encryption Scheme Based on the Diffie-Hellman Problem. Contribution to IEEE P1363a. http://cseweb.ucsd.edu/users/mihir/papers/dhaes.pdf
    • (1998)
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 2
    • 84937579774 scopus 로고    scopus 로고
    • The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES,
    • M.Abdalla,, M.Bellare, and P.Rogaway. 2001. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES, Lecture Notes in Computer Science, 2020:143–158.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 3
    • 84936847859 scopus 로고    scopus 로고
    • The CAST-128 Encryption Algorithm. Internet Engineering Task Force, RFC 2144.
    • C.Adams, 1997. The CAST-128 Encryption Algorithm. Internet Engineering Task Force, RFC 2144. http://www.ietf.org/rfc/rfc2144.txt
    • (1997)
    • Adams, C.1
  • 7
    • 33646760559 scopus 로고    scopus 로고
    • Minimizing the Use of Random Oracles in Authenticated Encryption Schemes,
    • M.Bellare,, and P.Rogaway. 1997. Minimizing the Use of Random Oracles in Authenticated Encryption Schemes, Lecture Notes in Computer Science, 1334:1–16.
    • (1997) Lecture Notes in Computer Science , vol.1334 , pp. 1-16
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84936847860 scopus 로고    scopus 로고
    • Related-key Cryptanalysis of the Full AES-192 and AES-256. Cryptology ePrint Archive, Report 2009/317.
    • A.Biryukov,, and D.Khovratovich. 2009. Related-key Cryptanalysis of the Full AES-192 and AES-256. Cryptology ePrint Archive, Report 2009/317. http://eprint.iacr.org/2009/317.pdf
    • (2009)
    • Biryukov, A.1    Khovratovich, D.2
  • 11
    • 84936847861 scopus 로고    scopus 로고
    • Biclique Cryptanalysis of the Full AES. Cryptology ePrint Archive, Report 2011/449.
    • A.Bogdanov,, D.Khovratovich, and C.Rechberger. 2011. Biclique Cryptanalysis of the Full AES. Cryptology ePrint Archive, Report 2011/449. http://eprint.iacr.org/2011/449.pdf.
    • (2011)
    • Bogdanov, A.1    Khovratovich, D.2    Rechberger, C.3
  • 12
    • 84936847862 scopus 로고    scopus 로고
    • Brainpool, ECC Brainpool Standard Curves and Curve Generation,
    • Brainpool. 2005. ECC Brainpool Standard Curves and Curve Generation, http://www.ecc-brainpool.org/download/Domain-parameters.pdf
    • (2005)
  • 13
    • 84936847863 scopus 로고    scopus 로고
    • Brainpool, Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation. IETF RFC 5639.
    • Brainpool. 2010. Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation. IETF RFC 5639. http://tools.ietf.org/html/rfc5639
    • (2010)
  • 14
    • 84936847864 scopus 로고    scopus 로고
    • Bundesamt für Sicherheit in der Informationstechnik, Elliptic Curve Cryptography. BSI TR 03111.
    • Bundesamt für Sicherheit in der Informationstechnik. 2009. Elliptic Curve Cryptography. BSI TR 03111. http://www.bsi.de/literat/tr/tr03111/BSI-TR-03111.pdf
    • (2009)
  • 18
    • 84936847865 scopus 로고    scopus 로고
    • Lessons Learned on Implementing ECDSA on a Java Smart Card. In Proceedings of Nord Sec 2000. Reykjavik, Iceland, p. 1–12.
    • T.Elo, 2000. Lessons Learned on Implementing ECDSA on a Java Smart Card. In Proceedings of Nord Sec 2000. Reykjavik, Iceland, p. 1–12.
    • (2000)
    • Elo, T.1
  • 19
    • 78349279256 scopus 로고    scopus 로고
    • A Comparison of the Standardized Versions of ECIES. In Sixth International Conference on Information Assurance and Security (IAS 2010), Atlanta, GA, USA, p. 1–4.
    • V.Gayoso Martínez,, F.Hernández Álvarez, L.Hernández Encinas, and C.Sánchez Ávila. 2010. A Comparison of the Standardized Versions of ECIES. In Sixth International Conference on Information Assurance and Security (IAS 2010), Atlanta, GA, USA, p. 1–4.
    • (2010)
    • Gayoso Martínez, V.1    Hernández Álvarez, F.2    Hernández Encinas, L.3    Sánchez Ávila, C.4
  • 21
    • 84936847867 scopus 로고    scopus 로고
    • Implementing the ECC Brainpool Curve Generation Procedure Using Open Source Software. In WorldComp 2013—International Conference on Security & Management (SAM'13), 22–25 July 2013, Las Vegas, CA, pp. 162–197.
    • V.Gayoso Martínez,, and L.Hernández Encinas. 2013. Implementing the ECC Brainpool Curve Generation Procedure Using Open Source Software. In WorldComp 2013—International Conference on Security & Management (SAM'13), 22–25 July 2013, Las Vegas, CA, pp. 162–197.
    • (2013)
    • Gayoso Martínez, V.1    Hernández Encinas, L.2
  • 22
    • 84936847868 scopus 로고    scopus 로고
    • A Java Implementation of the Elliptic Curve Integrated Encryption Scheme. In WorldComp 2010—International Conference on Security & Management (SAM'10), 12–15 July 2010, Vol. II, Las Vegas, CA, pp. 495–501.
    • V.Gayoso Martínez,, L.Hernández Encinas, and C.Sánchez Ávila. 2010. A Java Implementation of the Elliptic Curve Integrated Encryption Scheme. In WorldComp 2010—International Conference on Security & Management (SAM'10), 12–15 July 2010, Vol. II, Las Vegas, CA, pp. 495–501.
    • (2010)
    • Gayoso Martínez, V.1    Hernández Encinas, L.2    Sánchez Ávila, C.3
  • 23
    • 84936847869 scopus 로고    scopus 로고
    • SHA-512/256. Cryptology ePrint Archive, Report 2010/548.
    • S.Gueron,, S.Johnson, and J.Walker. 2010. SHA-512/256. Cryptology ePrint Archive, Report 2010/548. http://eprint.iacr.org/2010/548.pdf
    • (2010)
    • Gueron, S.1    Johnson, S.2    Walker, J.3
  • 25
    • 84936847870 scopus 로고    scopus 로고
    • Institute of Electrical and Electronics Engineers, Standard Specifications for Public Key Cryptography—Amendment 1: Additional Techniques. IEEE 1363a.
    • Institute of Electrical and Electronics Engineers. 2004. Standard Specifications for Public Key Cryptography—Amendment 1: Additional Techniques. IEEE 1363a.
    • (2004)
  • 26
    • 84936847871 scopus 로고    scopus 로고
    • International Organization for Standardization / International Electrotechnical Commission, Information Technology – Security Techniques – Hash-functions – Part 3: Dedicated Hash-functions. ISO/IEC 10118–3.
    • International Organization for Standardization / International Electrotechnical Commission. 2004. Information Technology – Security Techniques – Hash-functions – Part 3: Dedicated Hash-functions. ISO/IEC 10118–3.
    • (2004)
  • 27
    • 84936847872 scopus 로고    scopus 로고
    • International Organization for Standardization / International Electrotechnical Commission, Information Technology – Security Techniques – Encryption Algorithms – Part 2: Asymmetric Ciphers. ISO/IEC 18033–2.
    • International Organization for Standardization / International Electrotechnical Commission. 2006. Information Technology – Security Techniques – Encryption Algorithms – Part 2: Asymmetric Ciphers. ISO/IEC 18033–2.
    • (2006)
  • 28
    • 84936847597 scopus 로고    scopus 로고
    • An Elliptic Curve Based User Authentication Scheme with Smart Cards,
    • Z.Jia,, and Y.Zhang. 2006. An Elliptic Curve Based User Authentication Scheme with Smart Cards, Journal of Information Assurance and Security, 1:283–292.
    • (2006) Journal of Information Assurance and Security , vol.1 , pp. 283-292
    • Jia, Z.1    Zhang, Y.2
  • 30
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems,
    • N.Koblitz, 1987. Elliptic Curve Cryptosystems, Mathematics of Computation, 48:203–209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 31
    • 84936847873 scopus 로고    scopus 로고
    • HMAC: Keyed Hashing for Message Authentication. Internet Engineering Task Force, RFC 2104.
    • H.Krawczyk,, M.Bellare, and R.Canetti. 1997. HMAC: Keyed Hashing for Message Authentication. Internet Engineering Task Force, RFC 2104. http://www.ietf.org/rfc/rfc2104.txt
    • (1997)
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 32
    • 84936847874 scopus 로고    scopus 로고
    • The SEED Encryption Algorithm. Internet Engineering Task Force, RFC 4269.
    • H.J.Lee,, S.J.Lee, J.H.Yoon, D.H.Cheon, and J.I.Lee. 2005. The SEED Encryption Algorithm. Internet Engineering Task Force, RFC 4269. http://www.ietf.org/rfc/rfc4269.txt
    • (2005)
    • Lee, H.J.1    Lee, S.J.2    Yoon, J.H.3    Cheon, D.H.4    Lee, J.I.5
  • 33
    • 84936847875 scopus 로고    scopus 로고
    • Comments to NIST Concerning AES Modes of Operations: CTR-mode Encryption. National Institute of Standards and Technology.
    • H.Lipmaa,, P.Rogaway, and D.Wagner. 2000. Comments to NIST Concerning AES Modes of Operations: CTR-mode Encryption. National Institute of Standards and Technology. http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ctr/ctr-spec.pdf
    • (2000)
    • Lipmaa, H.1    Rogaway, P.2    Wagner, D.3
  • 36
    • 0003508558 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, NIST FIPS 197.
    • National Institute of Standards and Technology. 2001. Advanced Encryption Standard. NIST FIPS 197.
    • (2001) Advanced Encryption Standard
  • 37
    • 0013091373 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, NIST FIPS 198.
    • National Institute of Standards and Technology. 2002. The Keyed-hash Message Authentication Code. NIST FIPS 198.
    • (2002) The Keyed-hash Message Authentication Code
  • 38
    • 84936846550 scopus 로고    scopus 로고
    • National Institute of Standards and Technology,
    • National Institute of Standards and Technology. 2005. NIST Comments on Cryptanalytic Attacks on SHA-1. http://csrc.nist.gov/groups/ST/hash/statement.html
    • (2005) NIST Comments on Cryptanalytic Attacks on SHA-1
  • 41
    • 33751508709 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, NIST SP 800–57.
    • National Institute of Standards and Technology. 2007. Recommendation for Key Management. Part 1: General. NIST SP 800–57.
    • (2007) Recommendation for Key Management. Part 1: General
  • 43
    • 84883277124 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, NIST FIPS 180–4.
    • National Institute of Standards and Technology. 2012. Secure Hash Standard. NIST FIPS 180–4.
    • (2012) Secure Hash Standard
  • 46
    • 84936847876 scopus 로고    scopus 로고
    • Oracle Corp, Java Card Classic Platform SE 6. — System.
    • Oracle Corp. 2013. Java Card Classic Platform SE 6. — System. http://docs.oracle.com/javase/6/docs/api/java/lang/System.html#nanoTime%28%29.
    • (2013)
  • 47
    • 84936847877 scopus 로고    scopus 로고
    • Oracle Corp, Java Technology.
    • Oracle Corp. 2013. Java Technology. http://java.com/en/about.
    • (2013)
  • 48
    • 84936847878 scopus 로고    scopus 로고
    • Oracle Corp, Oracle Java Archieve
    • Oracle Corp. 2013. Oracle Java Archieve http://www.oracle.com/technetwork/java/archive-139210.html
    • (2013)
  • 49
    • 84936847879 scopus 로고    scopus 로고
    • Oracle Corporation, Java Card Classic Platform Specification 3.0.4
    • Oracle Corporation. 2012. Java Card Classic Platform Specification 3.0.4 http://www.oracle.com/technetwork/java/javame/javacard/download/specs-jsp-136430.html
    • (2012)
  • 50
    • 84936847880 scopus 로고    scopus 로고
    • Oracle Corporation, Java Card Platform Specification 2.2.2.
    • Oracle Corporation. 2012. Java Card Platform Specification 2.2.2. http://www.oracle.com/technetwork/java/javacard/specs-138637.html
    • (2012)
  • 51
    • 84936847881 scopus 로고    scopus 로고
    • ECIES — Security Evaluation of the Encryption Scheme and Primitives. Cryptrec.
    • J.Quisquater,, and F.Koeune. 2002. ECIES — Security Evaluation of the Encryption Scheme and Primitives. Cryptrec. http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1015_ECIES_report.pdf
    • (2002)
    • Quisquater, J.1    Koeune, F.2
  • 52
    • 84974554584 scopus 로고
    • Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext attack,
    • C.Rackoff,, and D.R.Simon. 1992. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext attack, Lecture Notes in Computer Science, 576:433–444.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 53
    • 68049120635 scopus 로고    scopus 로고
    • Elliptic Curve Cryptography with the TI-83,
    • B.Rice,, and B.Yankosky. 2009. Elliptic Curve Cryptography with the TI-83, Cryptologia, 33(2):125–141.
    • (2009) Cryptologia , vol.33 , Issue.2 , pp. 125-141
    • Rice, B.1    Yankosky, B.2
  • 54
    • 58549106211 scopus 로고    scopus 로고
    • New Collision Attacks Against up to 24-Step SHA-2,
    • S.Sanadhya,, and P.Sarkar. 2008. New Collision Attacks Against up to 24-Step SHA-2, Lecture Notes in Computer Science, 5365:91–103.
    • (2008) Lecture Notes in Computer Science , vol.5365 , pp. 91-103
    • Sanadhya, S.1    Sarkar, P.2
  • 55
    • 84936847882 scopus 로고    scopus 로고
    • Schneier on Security.
    • B.Schneier, 2011. Schneier on Security. http://www.schneier.com/blog/archives/2011/08/new_attack_on_a_1.html
    • (2011)
    • Schneier, B.1
  • 57
    • 84936847883 scopus 로고    scopus 로고
    • A Proposal for an ISO Standard for Public Key Encryption. Cryptology ePrint Archive, Report 2001/112.
    • V.Shoup, 2001. A Proposal for an ISO Standard for Public Key Encryption. Cryptology ePrint Archive, Report 2001/112. http://www.shoup.net/papers/iso-2_1.pdf
    • (2001)
    • Shoup, V.1
  • 58
    • 84936847884 scopus 로고    scopus 로고
    • Standards for Efficient Cryptography Group, Test Vectors for SEC 1. SECG GEC 2.
    • Standards for Efficient Cryptography Group. 1999. Test Vectors for SEC 1. SECG GEC 2. http://www.secg.org/download/aid-390/gec2.pdf
    • (1999)
  • 59
    • 84936847885 scopus 로고    scopus 로고
    • Standards for Efficient Cryptography Group, Recommended Elliptic Curve Domain Parameters. SECG SEC 1 ver. 2.
    • Standards for Efficient Cryptography Group. 2009. Recommended Elliptic Curve Domain Parameters. SECG SEC 1 ver. 2. http://www.secg.org/download/aid-780/sec1-v2.pdf
    • (2009)
  • 60
    • 84936847886 scopus 로고    scopus 로고
    • Evaluation Report on the ECIES Cryptosystem. Cryptrec.
    • J.Stern, 2002. Evaluation Report on the ECIES Cryptosystem. Cryptrec. http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1016_Stern.ECIES.pdf
    • (2002)
    • Stern, J.1
  • 62
    • 84936847887 scopus 로고    scopus 로고
    • Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004/199.
    • X.Wang,, D.Feng, X.Lai, and H.Yu. 2004. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004/199. http://eprint.iacr.org/2004/199.pdf
    • (2004)
    • Wang, X.1    Feng, D.2    Lai, X.3    Yu, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.