Elliptic Curve Cryptography in Practice

In this paper, the authors perform a review of Elliptic Curve Cryptography (ECC), as it is used in practice today, in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. They study four popular protocols that make use of this type of public-key cryptography: bitcoin, Secure SHell (SSH), Transport Layer Security (TLS), and the Austrian e-ID card. They are pleased to observe that about 1 in 10 systems support ECC across the TLS and SSH protocols.

Provided by: University of Peloponnese Topic: Security Date Added: Dec 2013 Format: PDF

Find By Topic