67
Views
8
CrossRef citations to date
0
Altmetric
Articles

Demystifying elliptic curve cryptography: Curve selection, implementation and countermeasures to attacks

, &
 

Abstract

Elliptic curve cryptography (ECC) has been the main choice for the security experts from some time now. As the IoT has enveloped the world around us; ECC has became more popular as security solution for the resource-constrained devices which covers the physical layer of IoT. Different libraries are available for ECC. In this paper we have discussed various important aspects in the implementation of ECC, such as finite fields, selection of curve model and curves along with the attacks on ECC. Implementation of ECC has been carried out on NIST curve P-256 with ElGamal encryption.

Subject Classification:

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.