Skip to main content
Erschienen in:
Buchtitelbild

2022 | OriginalPaper | Buchkapitel

Elliptic Curve Cryptography (ECC) for a Lightweight Public Key Infrastructure (PKI)

verfasst von : Jalal Laassiri, Yousra Berguig, Sanae Hanaoui, Sara Hassi

Erschienen in: Distributed Sensing and Intelligent Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, the information access, use, and control have become progressively an interesting area of research. The increase in the number of cyberattacks makes network and information security situation bleak. In this chapter, we have presented an overview of cryptography that complements strongly security, we describe and compare symmetric encryption systems and asymmetric encryption systems. Therefore, we give a brief introduction to the elliptic curve cryptography (ECC), performance, characteristics, advantages, and challenges. Also, we investigate the PKI (Public Key Infrastructure) technology for certificate revocation. Then we propose a new approach for a lightweight PKI based in elliptic curve cryptography (ECC); furthermore, we present a public key infrastructure model for certificate revocation, as well we elaborate the deployment of the presented Model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cole, E. (2008). Network security fundamentals. Wiley. Cole, E. (2008). Network security fundamentals. Wiley.
2.
Zurück zum Zitat Barukab, O. M., Khan, A. I., Sharief Shaik, M., Ramana Murthy, M., & Ali Khan, S. (2012). Secure communication using symmetric and asymmetric cryptographic techniques. Int. J. Inf. Eng. Electron. Bus., 4(2), 36–42. Barukab, O. M., Khan, A. I., Sharief Shaik, M., Ramana Murthy, M., & Ali Khan, S. (2012). Secure communication using symmetric and asymmetric cryptographic techniques. Int. J. Inf. Eng. Electron. Bus., 4(2), 36–42.
4.
Zurück zum Zitat Khatua, S. (s.d.). International Journal of Latest Trends in Computing, l2(2), 2(2). Khatua, S. (s.d.). International Journal of Latest Trends in Computing, l2(2), 2(2).
5.
Zurück zum Zitat Uchimi, A. (2003). What is PKI. Kyokai Joho Imeji Zasshi/Journal Inst. Image Inf. Telev. Eng., 57(5), 585–588. Uchimi, A. (2003). What is PKI. Kyokai Joho Imeji Zasshi/Journal Inst. Image Inf. Telev. Eng., 57(5), 585–588.
6.
Zurück zum Zitat Braun, J., Volk, F., Classen, J., Buchmann, J., & Mühlhäuser, M. (2014). CA trust management for the web PKI. Journal of Computer Security, 22(6), 913–959.CrossRef Braun, J., Volk, F., Classen, J., Buchmann, J., & Mühlhäuser, M. (2014). CA trust management for the web PKI. Journal of Computer Security, 22(6), 913–959.CrossRef
7.
Zurück zum Zitat Zhang, L., Choffnes, D., Levin, D., Dumitras, T., Mislove, A., Schulman, A., et al. (2014). Analysis of SSL certificate reissues and revocations in the wake of Heartbleed. In Proceedings of the conference on internet measurement conference (pp. 489–502). ACM. Zhang, L., Choffnes, D., Levin, D., Dumitras, T., Mislove, A., Schulman, A., et al. (2014). Analysis of SSL certificate reissues and revocations in the wake of Heartbleed. In Proceedings of the conference on internet measurement conference (pp. 489–502). ACM.
8.
Zurück zum Zitat Liu, Y., et al. (2015). An end-to-end measurement of certificate revocation in the web’s PKI. In Proceedings of the ACM conference on internet measurement conference (pp. 183–196). ACM. Liu, Y., et al. (2015). An end-to-end measurement of certificate revocation in the web’s PKI. In Proceedings of the ACM conference on internet measurement conference (pp. 183–196). ACM.
9.
Zurück zum Zitat Oppliger, R. (2014). Certification authorities under attack: A plea for certificate legitimation. IEEE Internet Computing, 18(1), 40–47.CrossRef Oppliger, R. (2014). Certification authorities under attack: A plea for certificate legitimation. IEEE Internet Computing, 18(1), 40–47.CrossRef
10.
Zurück zum Zitat Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 3156, 119–132. Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 3156, 119–132.
11.
Zurück zum Zitat Bafandehkar, M., Yasin, S. M., Mahmod, R., & Hanapi, Z. M. (2013). Comparison of ECC and RSA algorithm in resource constrained devices. In 2013 international conference on IT convergence and security. ICITCS. Bafandehkar, M., Yasin, S. M., Mahmod, R., & Hanapi, Z. M. (2013). Comparison of ECC and RSA algorithm in resource constrained devices. In 2013 international conference on IT convergence and security. ICITCS.
Metadaten
Titel
Elliptic Curve Cryptography (ECC) for a Lightweight Public Key Infrastructure (PKI)
verfasst von
Jalal Laassiri
Yousra Berguig
Sanae Hanaoui
Sara Hassi
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-64258-7_1

Premium Partner