Abstract
Encryption algorithms are used to protect data, but encrypted data depend on the safety of the key used in the encryption algorithm, so it is very important to generated a key that cannot be easily inferred for a safer protection of data. For this, in order to broaden the choice of keys used in encryption algorithm, this paper proposed the method to generate a key table by expanding the previously proposed elliptic curve algorithm to real number field, and the proposed method was applied to Android-based smartphone cryptosystem for verification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Park, J., Min, H., Jang, J., Cho, Y., Hong, J.: Survey of Security Techniques for Android Platform. Journal of The Korea Computer Congress 38(1B), 52–54 (2011)
Choi, J.-H., Jeong, C.-W., Joo, S.-C.: Design and Implementation of Android Context-based Security Service Based on Ubiquitous Computing. Journal of The Korean Society for Internet Information Autumn Academic Conference 12(2), 107–108 (2011)
Lee, J.-M., Lee, C., Kwon, W.-S.: Design of Programmable and Configurable Elliptic Curve Cryptosystem Coprocessor. Journal of The Institute of Electronics Engineers of Korea 42(6), 67–74 (2005)
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Koblitz, N.: Elliptic curve crypto-systems. Mathematic of Computation 48, 203–209 (1987)
Chung, B., Lee, S., Hong, S.-M., Yoon, H.: Fast Scalar Multiplication Algorithm on Elliptic Curve over Optimal Extension Fields. Journal of The Korea Institute of Information Security & Cryptology 15(3), 65–76 (2005)
Wiener, M., Zuccherato, R.J.: Faster Attacks on Elliptic Curve Cryptosystems. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 190–200. Springer, Heidelberg (1999)
Goo, E.: Elliptic Curve Cryptography over Real Plane. Doctoral Dissertation, Dankook University (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Goo, Eh., Lee, Sd. (2012). A Study on Android-Based Real Number Field Elliptic Curve Key Table Generation. In: Kim, Th., et al. Computer Applications for Security, Control and System Engineering. Communications in Computer and Information Science, vol 339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35264-5_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-35264-5_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35263-8
Online ISBN: 978-3-642-35264-5
eBook Packages: Computer ScienceComputer Science (R0)