Published March 24, 2010
| Version 6572
Journal article
Open
New DES based on Elliptic Curves
Description
It is known that symmetric encryption algorithms are
fast and easy to implement in hardware. Also elliptic curves have
proved to be a good choice for building encryption system. Although
most of the symmetric systems have been broken, we can create a
hybrid system that has the same properties of the symmetric
encryption systems and in the same time, it has the strength of
elliptic curves in encryption. As DES algorithm is considered the
core of all successive symmetric encryption systems, we modified
DES using elliptic curves and built a new DES algorithm that is hard
to be broken and will be the core for all other symmetric systems.
Files
6572.pdf
Files
(598.3 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:fc32eeb9877bd1f7fe79fc1fdb1e00c4
|
598.3 kB | Preview Download |
Additional details
References
- Hugo Fruehauf , "Encryption Fundamentals," in Zyfers, October 2001.
- W. Mao, "Modern Cryptography Theory and Practice (Book style).," Prentice Hall PTR July 25.
- W. Stallings, "Cryptography and Network Security Principles and Practices," Fourth Edition, Prentice Hall, November 16, 2005.
- N. Torri, K. Yokoyama, "Elliptic Curve Cryptosystems," Fujtsu Sci. Tech. J. pp. 140-146, December 2002.
- W. M. Daley, "Specifications for the data encryption standard (DES)," FIPS PUB 46-3, Federal information processing standards publication, Reaffirmed, October25th, 1999.
- R. Zuccherato, "Practical Cryptology and Web Security," Entrust, May 9, 2000.
- Pk Yuen, "Elliptic Curve Cryptography Support in Entrust," Pearson Education Limited 2006.
- D. Hankerson, Menezes. A, Vanstone S., "Guide to Elliptic Curve Cryptography," Springer, (c) 2004, Springer-Verlag New York, Inc.
- Matthew England, "The Weierstrass Theory For Elliptic Functions," Department of Mathematics, MACS Heriot Watt University, Edinburgh, The Burn 2007.