2010
DOI: 10.17487/rfc5639
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation

Abstract: This memo proposes several elliptic curve domain parameters over finite prime fields for use in cryptographic applications. The domain parameters are consistent with the relevant international standards, and can be used in X.509 certificates and certificate revocation lists (CRLs), for Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
66
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 78 publications
(67 citation statements)
references
References 1 publication
0
66
0
1
Order By: Relevance
“…However, for the moment the method from [34] can be used if one is willing to settle for partially personalized parameters: the finite field and thus the elliptic curve group cardinality are still fully personalized and unpredictable to any third party, but not more than eight choices are available for the Weierstrass equation used for the curve parameterization. Although the resulting parameters are not in compliance with the security criteria adopted by [9] and implied by [39], we point out that there is no indication whatsoever that either of these eight choices offers inadequate security: citing [9] "there is no evidence of serious problems". The choice is between being vulnerable to as yet unknown attacks -as virtually all cryptographic systems are -or being vulnerable to attacks aimed at others by sharing parameters, on top of trusting choices made by others.…”
Section: Introductionmentioning
confidence: 90%
See 2 more Smart Citations
“…However, for the moment the method from [34] can be used if one is willing to settle for partially personalized parameters: the finite field and thus the elliptic curve group cardinality are still fully personalized and unpredictable to any third party, but not more than eight choices are available for the Weierstrass equation used for the curve parameterization. Although the resulting parameters are not in compliance with the security criteria adopted by [9] and implied by [39], we point out that there is no indication whatsoever that either of these eight choices offers inadequate security: citing [9] "there is no evidence of serious problems". The choice is between being vulnerable to as yet unknown attacks -as virtually all cryptographic systems are -or being vulnerable to attacks aimed at others by sharing parameters, on top of trusting choices made by others.…”
Section: Introductionmentioning
confidence: 90%
“…The seven Brainpool curves [39] at seven security levels from 80-bit to 256-bit revert to the verifiably pseudo random approach from [16], while improving it and thereby making it harder to target specific curve properties (but see [6]). The primes p have no special form (except that they are 3 mod 4) and are deterministically determined as a function of a seed that is chosen in a uniform manner based on the binary expansion of π = 3.14159 .…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…The built-in domain parameters are from ECC-Brainpool [20]. We analyzed the implementation for brainpoolP384r1.…”
Section: Description Of the Implementationmentioning
confidence: 99%
“…But it crucially relies on the existence of an injective encoding ι, only a few examples of which are known [13,17,6], all of them for elliptic curves of non-prime order over large characteristic fields. This makes the method inapplicable to implementations based on curves of prime order or on binary fields, which rules out most standardized ECC parameters [15,11,22,1], in particular. Moreover, the rejection sampling involved (when a point P is picked outside ι(S), the protocol has to start over) can impose a significant performance penalty.…”
Section: Introductionmentioning
confidence: 99%