Tytuł artykułu
Autorzy
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The paper presents the implementation of the Elliptic Curves Cryptography (ECC) algorithms to ensure security in the distributed measurement system. The algorithms were deployed in the LabWindows/CVI environment and are a part of its cryptographic library. Their functionality is identical with the OpenSSL package. The effectiveness of implemented algorithms is presented with the comparison of the ECDSA against the DSA systems. The paper is concluded with future prospects of the implemented library.
Rocznik
Tom
Strony
257--262
Opis fizyczny
Bibliogr. 16 poz., wykr.
Twórcy
autor
- Institute of Radioelectronics, Warsaw University of Technology, Warsaw, Poland
autor
- Institute of Radioelectronics, Warsaw University of Technology, Warsaw, Poland
autor
- Institute of Radioelectronics, Warsaw University of Technology, Warsaw, Poland
- Department of Applied Informatics, Warsaw University of Life Sciences, Warsaw, Poland
- Institute of Radioelectronics, Warsaw University of Technology, Warsaw, Poland
Bibliografia
- [1] W. Winiecki, T. Adamski, P. Bobinski, and R. Lukaszewski, „Bezpieczeństwo rozproszonych systemow pomiarowo-sterujacych (rsps)”, Przegląd Elektrotechniczny, vol. LXXXIV, pp. 220-227, May 2008, in Polish.
- [2] P. Bilski and W. Winiecki, „Multi-core implementation of the symmetric cryptography algorithms in the measurement system”, Measurement, no. 43, pp. 1049-1060, 2010.
- [3] The basics of ecc. [Online]. Available: http://www.certicom.com/index.php/the-basics-of-ecc
- [4] A. Menezes, P. Oorschot, and S. Vanstone, Eds., Handbook of Applied Cryptography. CRC Press Inc., 1997.
- [5] T. Good and M. Benaissa, „Aes on fpga: from the fastest to the smallest”, in Proc. Cryptographic Hardware and Embedded Systems (CHES '2005), Edinburgh, United Kingdom, Aug 2005, pp. 427-440.
- [6] B. Schneier, Applied Cryptography, 2nd ed. New York: John Wiley & Sons, 1996.
- [7] D. Mermin, „Breaking rsa encryption with a quantum computer: Shor's factoring algorithm”, Lecture notes on Quantum computation, pp. 481-681, 2006.
- [8] N. Koblitz, Algebraic Aspects of Cryptography. Springer-Verlang Gmbh, 1999.
- [9] D. Henderson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography. Springer-Verlang Gmbh, 2004.
- [10] E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, Recommendation for Key Management Part 1: General (Revised), National Institute of Standards and Technology (NIST) Recommendation for Cryptographic Key Management Standard 800-57, March 2007. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2 Mar08-2007.pdf
- [11] N. S. Agency. Nsa suite b cryptography. [Online]. Available: http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml
- [12] A. Silberschatz, P. B. Galvin, and G. Gagne, Operating System Concepts. John Wiley & Sons, 2003.
- [13] Microsoft. How to use queryperformancecounter to time code. [Online]. Available: http://support.microsoft.com/kb/172338
- [14] Microsoft. Queryperformancefrequency function. [Online]. Available: http://msdn.microsoft.com/en-us/library/ms644905(VS.85).aspx
- [15] P. Bilski and W. Winiecki, „Time optimization of soft real-time virtual instrument design”, IEEE Transactions on Instrumentation and Measurement, vol. 54, no. 4, pp. 1412-1416, Aug 2005.
- [16] R. Lukaszewski and M. Sobieszek, „Biblioteka kryptograficzna w labwindows”, in Metrologia dziś i jutro, Gdańsk, Poland, 2009, pp. 113- 120, in Polish.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BWAK-0026-0003