-
1
-
-
84882090620
-
-
When implenmenting RSA, the PKCS #1 standard (v2.1) is by far the most important resource. It describes the OAEP and PSS padding techniques, CRT exponentiation, and the ASN. 1 definitions required for interoperability. For FIPS 180-2 DSS compliance, the ANSI X9.31 standard must be used
-
When implenmenting RSA, the PKCS #1 standard (v2.1) is by far the most important resource. It describes the OAEP and PSS padding techniques, CRT exponentiation, and the ASN. 1 definitions required for interoperability. For FIPS 180-2 DSS compliance, the ANSI X9.31 standard must be used.
-
-
-
-
2
-
-
85013754173
-
-
When implementing ECC, the ANSI X9.62 standard specifies EC-DSA and is used by FIPS 180-2 DSS. The ANSI X9.63 standard specifies ECC encryption, key storage, and a few authentication schemes (a couple of which have patents). Currently, NIST is working on SP800-56A, which specifies ANSI X9.42 using discrete logarithm systems (like ElGamal), and X9.63 using ECC. An additional specification SP800-56B specifies ANSI X9. 44 (RSA encryption). It is more likely that SP800-56A will become more popular in the future, as it uses ECC as oppose to RSA
-
When implementing ECC, the ANSI X9.62 standard specifies EC-DSA and is used by FIPS 180-2 DSS. The ANSI X9.63 standard specifies ECC encryption, key storage, and a few authentication schemes (a couple of which have patents). Currently, NIST is working on SP800-56A, which specifies ANSI X9.42 using discrete logarithm systems (like ElGamal), and X9.63 using ECC. An additional specification SP800-56B specifies ANSI X9. 44 (RSA encryption). It is more likely that SP800-56A will become more popular in the future, as it uses ECC as oppose to RSA.
-
-
-
-
3
-
-
85013818232
-
-
A good reference for the large integer operations is BigNum Math, which discusses the creation of a portable and efficient multiple precision large integer operations. That book uses both pseudo code and real production C source code to demonstrate the math to the reader. It is by no means a hard read and is well suited for the target audience of this text., Syngress
-
Denis Tom St, Rose Greg BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic 2006, A good reference for the large integer operations is BigNum Math, which discusses the creation of a portable and efficient multiple precision large integer operations. That book uses both pseudo code and real production C source code to demonstrate the math to the reader. It is by no means a hard read and is well suited for the target audience of this text., Syngress.
-
(2006)
BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
-
-
Denis, T.S.1
Rose, G.2
-
4
-
-
11244267013
-
-
For implementing ECC math, the reader is strongly encouraged to obtain a copy of the Guide to Elliptic Curve Cryptography, Springer
-
Hankerson D., Menezes A., Vanstone S. Guide to Elliptic Curve Cryptography 2004, For implementing ECC math, the reader is strongly encouraged to obtain a copy of the Guide to Elliptic Curve Cryptography, Springer.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
5
-
-
85013831259
-
-
The LibTomCrypt package provides PKCS #1 compliant RSA and ANSI X9.62 compliant EC-DSA. It uses a modified key derivation function and key storage that is incompatible with X9.63. LibTomCrypt employs the use of CRT exponentiation for RSA. It uses Jacobian-affine co-ordinates for the ECC math. It provides both a sliding window random point multiplier and a fixed point multiplier. Since the code is well commented and public domain, it is a valuable source of implementation insight
-
The LibTomCrypt package provides PKCS #1 compliant RSA and ANSI X9.62 compliant EC-DSA. It uses a modified key derivation function and key storage that is incompatible with X9.63. LibTomCrypt employs the use of CRT exponentiation for RSA. It uses Jacobian-affine co-ordinates for the ECC math. It provides both a sliding window random point multiplier and a fixed point multiplier. Since the code is well commented and public domain, it is a valuable source of implementation insight.
-
-
-
|