Elliptic curves, as used in cryptography, are essentially points bounded by a finite prime field which display group properties that facilitate their usage in a cryptosystem. The Discrete Log Problem (DLP) - based on a large prime order subgroup of (Zp)* - constitutes the essence of Elliptic Curve Cryptography (ECC) and can be summed up as such; find an integer, k, such that Q = kP where k = logp(Q) and P, Q ∈ (Zp)*.
Compared to the Integer Factorisation Problem - upon which RSA is constructed - the DLP achieves a greater level of complexity in terms of resistance to attack. This project seeks to describe the mathematical properties that enable ECC to outperform RSA, culminating in the construction of a software system to demonstrate ECC’s ability to securely encipher and decipher files and text, according to the National Security Agency’s (NSA) Cryptographic Interoperability Strategy (CIS) or Suite B Cryptography.
Frequently asked questions
What is the primary topic of "Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field"?
The primary topic is an investigation into elliptic curve cryptography (ECC), including its mathematical properties, its comparison with RSA, the selection of appropriate elliptic curves, and the design of a software system to demonstrate ECC's capabilities.
What are the main objectives of this investigation?
The main objectives are to: Investigate the mathematical properties of elliptic curves as they relate to cryptography; Analyse ECC as an alternate to RSA; Identify and select an appropriate elliptic curve for use in a cryptosystem; Design and develop a cryptographic software system as a vehicle for this investigation.
What are the key themes discussed in the document?
The key themes include: Elliptic curve cryptography (ECC), RSA as a comparison, mathematical construction of elliptic curves, curve parameter selection, software implementation, and a comparison to NSA's Suite B cryptography recommendations.
What is the Discrete Log Problem (DLP) in the context of ECC?
The DLP is the foundation of ECC, expressed as finding an integer 'k' such that Q = kP, where k = logp(Q) and P, Q are points in (Zp).
How does ECC compare to RSA in terms of complexity and resistance to attack?
ECC achieves a greater level of complexity than RSA in terms of resistance to attack, primarily because the DLP is considered harder than the Integer Factorization Problem upon which RSA is based. It requires much smaller keys for the equivalent security level.
What kind of software system will be developed as part of this investigation?
A Java-based system will be developed to enable users to construct an asymmetric cipher key pair based on Elliptic Curves and use those keys to encrypt and decrypt files and text.
Which elliptic curve parameters are considered in the project?
The project considers parameters recommended by NIST, specifically focusing on prime field curves suitable for NSA's Suite B security requirements, especially the P-384 curve.
What external library is used for implementing ECC in Java?
The Bouncy Castle library is used for providing ECC functionality due to Java's limited native support for elliptic curve cryptography.
What encryption scheme is utilized in the software system?
The Elliptic Curve Integrated Encryption Scheme (ECIES) is the encryption scheme utilized in the developed system.
What is the Cipher Block Chaining (CBC) technique used for?
Cipher Block Chaining is used for block encryption to enhance security. Each block depends on the Initialisation Vector (IV) and the preceding cipher block. Meaning, each block in the chain is XOR'd with the preceding block and then encrypted.
Why RSA was excluded from NSA's Cryptographic Interoperability Strategy (CIS) or Suite B Cryptography?
It was explicitly stated that, as the document is only a Language Preview, the reason was not provided, or included in the text. The reader would have to read the full document, or the original source document itself.
What are some of the specific functional requirements of the software system?
Some functional requirements are: Public/Private key pair generation, where users can enter identification information; encryption and decryption of both imported files and user-fed text; secure key ring storage and key viewing; and importing/exporting keys.
What was the conclusion of the investigation?
The final evaluation of the investigation found that ECC was superior in terms of security, in comparison to RSA. It was found to be a viable replacement to RSA.
What are the further works for future development?
The future development recommends that further steps are taken to "examine the implications of creating such protocols" to guard against future attacks.
- Quote paper
- Adrian O'Gara (Author), 2014, Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field, Munich, GRIN Verlag, https://www.grin.com/document/295698