PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Implementation and Analysis of Elliptic Curves-Based Cryptographic Algorithms in the Integrated Programming Environment

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The paper presents the implementation of the Elliptic Curves Cryptography (ECC) algorithms to ensure security in the distributed measurement system. The algorithms were deployed in the LabWindows/CVI environment and are a part of its cryptographic library. Their functionality is identical with the OpenSSL package. The effectiveness of implemented algorithms is presented with the comparison of the ECDSA against the DSA systems. The paper is concluded with future prospects of the implemented library.
Twórcy
  • Institute of Radioelectronics, Warsaw University of Technology, Warsaw, Poland
autor
  • Institute of Radioelectronics, Warsaw University of Technology, Warsaw, Poland
autor
  • Institute of Radioelectronics, Warsaw University of Technology, Warsaw, Poland
  • Department of Applied Informatics, Warsaw University of Life Sciences, Warsaw, Poland
  • Institute of Radioelectronics, Warsaw University of Technology, Warsaw, Poland
Bibliografia
  • [1] W. Winiecki, T. Adamski, P. Bobinski, and R. Lukaszewski, „Bezpieczeństwo rozproszonych systemow pomiarowo-sterujacych (rsps)”, Przegląd Elektrotechniczny, vol. LXXXIV, pp. 220-227, May 2008, in Polish.
  • [2] P. Bilski and W. Winiecki, „Multi-core implementation of the symmetric cryptography algorithms in the measurement system”, Measurement, no. 43, pp. 1049-1060, 2010.
  • [3] The basics of ecc. [Online]. Available: http://www.certicom.com/index.php/the-basics-of-ecc
  • [4] A. Menezes, P. Oorschot, and S. Vanstone, Eds., Handbook of Applied Cryptography. CRC Press Inc., 1997.
  • [5] T. Good and M. Benaissa, „Aes on fpga: from the fastest to the smallest”, in Proc. Cryptographic Hardware and Embedded Systems (CHES '2005), Edinburgh, United Kingdom, Aug 2005, pp. 427-440.
  • [6] B. Schneier, Applied Cryptography, 2nd ed. New York: John Wiley & Sons, 1996.
  • [7] D. Mermin, „Breaking rsa encryption with a quantum computer: Shor's factoring algorithm”, Lecture notes on Quantum computation, pp. 481-681, 2006.
  • [8] N. Koblitz, Algebraic Aspects of Cryptography. Springer-Verlang Gmbh, 1999.
  • [9] D. Henderson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography. Springer-Verlang Gmbh, 2004.
  • [10] E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, Recommendation for Key Management Part 1: General (Revised), National Institute of Standards and Technology (NIST) Recommendation for Cryptographic Key Management Standard 800-57, March 2007. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2 Mar08-2007.pdf
  • [11] N. S. Agency. Nsa suite b cryptography. [Online]. Available: http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml
  • [12] A. Silberschatz, P. B. Galvin, and G. Gagne, Operating System Concepts. John Wiley & Sons, 2003.
  • [13] Microsoft. How to use queryperformancecounter to time code. [Online]. Available: http://support.microsoft.com/kb/172338
  • [14] Microsoft. Queryperformancefrequency function. [Online]. Available: http://msdn.microsoft.com/en-us/library/ms644905(VS.85).aspx
  • [15] P. Bilski and W. Winiecki, „Time optimization of soft real-time virtual instrument design”, IEEE Transactions on Instrumentation and Measurement, vol. 54, no. 4, pp. 1412-1416, Aug 2005.
  • [16] R. Lukaszewski and M. Sobieszek, „Biblioteka kryptograficzna w labwindows”, in Metrologia dziś i jutro, Gdańsk, Poland, 2009, pp. 113- 120, in Polish.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BWAK-0026-0003
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.