메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Cryptography for Developers

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85013774683     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-1-59749-104-4.X5000-6     Document Type: Book
Times cited : (21)

References (5)
  • 1
    • 84882090620 scopus 로고    scopus 로고
    • When implenmenting RSA, the PKCS #1 standard (v2.1) is by far the most important resource. It describes the OAEP and PSS padding techniques, CRT exponentiation, and the ASN. 1 definitions required for interoperability. For FIPS 180-2 DSS compliance, the ANSI X9.31 standard must be used
    • When implenmenting RSA, the PKCS #1 standard (v2.1) is by far the most important resource. It describes the OAEP and PSS padding techniques, CRT exponentiation, and the ASN. 1 definitions required for interoperability. For FIPS 180-2 DSS compliance, the ANSI X9.31 standard must be used.
  • 2
    • 85013754173 scopus 로고    scopus 로고
    • When implementing ECC, the ANSI X9.62 standard specifies EC-DSA and is used by FIPS 180-2 DSS. The ANSI X9.63 standard specifies ECC encryption, key storage, and a few authentication schemes (a couple of which have patents). Currently, NIST is working on SP800-56A, which specifies ANSI X9.42 using discrete logarithm systems (like ElGamal), and X9.63 using ECC. An additional specification SP800-56B specifies ANSI X9. 44 (RSA encryption). It is more likely that SP800-56A will become more popular in the future, as it uses ECC as oppose to RSA
    • When implementing ECC, the ANSI X9.62 standard specifies EC-DSA and is used by FIPS 180-2 DSS. The ANSI X9.63 standard specifies ECC encryption, key storage, and a few authentication schemes (a couple of which have patents). Currently, NIST is working on SP800-56A, which specifies ANSI X9.42 using discrete logarithm systems (like ElGamal), and X9.63 using ECC. An additional specification SP800-56B specifies ANSI X9. 44 (RSA encryption). It is more likely that SP800-56A will become more popular in the future, as it uses ECC as oppose to RSA.
  • 3
    • 85013818232 scopus 로고    scopus 로고
    • A good reference for the large integer operations is BigNum Math, which discusses the creation of a portable and efficient multiple precision large integer operations. That book uses both pseudo code and real production C source code to demonstrate the math to the reader. It is by no means a hard read and is well suited for the target audience of this text., Syngress
    • Denis Tom St, Rose Greg BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic 2006, A good reference for the large integer operations is BigNum Math, which discusses the creation of a portable and efficient multiple precision large integer operations. That book uses both pseudo code and real production C source code to demonstrate the math to the reader. It is by no means a hard read and is well suited for the target audience of this text., Syngress.
    • (2006) BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
    • Denis, T.S.1    Rose, G.2
  • 4
    • 11244267013 scopus 로고    scopus 로고
    • For implementing ECC math, the reader is strongly encouraged to obtain a copy of the Guide to Elliptic Curve Cryptography, Springer
    • Hankerson D., Menezes A., Vanstone S. Guide to Elliptic Curve Cryptography 2004, For implementing ECC math, the reader is strongly encouraged to obtain a copy of the Guide to Elliptic Curve Cryptography, Springer.
    • (2004) Guide to Elliptic Curve Cryptography
    • Hankerson, D.1    Menezes, A.2    Vanstone, S.3
  • 5
    • 85013831259 scopus 로고    scopus 로고
    • The LibTomCrypt package provides PKCS #1 compliant RSA and ANSI X9.62 compliant EC-DSA. It uses a modified key derivation function and key storage that is incompatible with X9.63. LibTomCrypt employs the use of CRT exponentiation for RSA. It uses Jacobian-affine co-ordinates for the ECC math. It provides both a sliding window random point multiplier and a fixed point multiplier. Since the code is well commented and public domain, it is a valuable source of implementation insight
    • The LibTomCrypt package provides PKCS #1 compliant RSA and ANSI X9.62 compliant EC-DSA. It uses a modified key derivation function and key storage that is incompatible with X9.63. LibTomCrypt employs the use of CRT exponentiation for RSA. It uses Jacobian-affine co-ordinates for the ECC math. It provides both a sliding window random point multiplier and a fixed point multiplier. Since the code is well commented and public domain, it is a valuable source of implementation insight.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.