The investigation of the elliptic curve cryptology applies to the new generation protocol

  • Authors:
  • Po-Hsian Huang

  • Affiliations:
  • Department of Computer Science and Information Engineering, Yuanpei University, Hsin Chu, Taiwan, R.O.C.

  • Venue:
  • WSEAS Transactions on Computers
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

We face threats from virus, hacker, electronic eavesdropper, and electronic deceiver in the network environment. The safety issue is truly important. The growth of the computer and network system make the organizations and personal users to depend on the information that circulate in these systems more and more. For the reason, we must protect the data and resources from leak and insure the reliability of data and information. Besides, the system can be protected well when it is suffered any attacks from networks. Not only people start to care about the network security level where they use credit cards to order they want but also they have the idea about the network security. [1] The most well-known and the most extensive applied public key cryptosystem RSA is submitted by Rivet, Shamir and Adelman [2]. Its safety is based on the difficulty of the factorization of big integer. The problem of factorization of big integer is a well-known difficult mathematical question. Up to now, less valid system is mentioned to solve the problem. Therefore, the algorithm of RSA can insure the safety. For the sake of the security of RSA, the bit of key is always in the advance. The more key length will cause the speed of encryption and decryption to decline. Besides, the hardware will become more and more difficult to be accepted. This phenomenon brings very heavy load for RSA applications. For proceeding the large number of safe transactions on E-Commerce also will encounter the same problems. In Elliptic Curve Cryptology, its bytes are less than RSA (Rivest-Shamir-Adleman). It can let computer performance and network transmission become good and fast. Although the next generation protocol modifies from IPv4 and applies to IPSEC, it is not perfect in network security. The unit of IP Security Protocol can't coexist with the unit of IPv6 protocol service when IPv6 packets pass IPv4 protocol and Network Address Transfer's field. For those weaknesses, one will discuss Elliptic Curve Cryptology how to translate in IPv6 protocol and compare the performance of Elliptic Curve Cryptology and RSA in IPv6 protocol.