{"id":4474,"date":"2022-08-30T08:56:07","date_gmt":"2022-08-30T08:56:07","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?post_type=technology&p=4474"},"modified":"2022-11-23T02:49:13","modified_gmt":"2022-11-23T02:49:13","slug":"ecc-elliptic-curve-cryptography","status":"publish","type":"technology","link":"https:\/\/www.pufsecurity.com\/zh-hans\/technology\/ecc-elliptic-curve-cryptography\/","title":{"rendered":"ECC"},"content":{"rendered":"\n

ECC: Elliptic-Curve Cryptography<\/h2>\n\n\n\n

In contrast to Symmetric Key schemes such as AES<\/a> (Advanced Encryption Standard), the asymmetric key scheme contains a key pair, the public key, and the private key. This is also known as public key cryptography.<\/p>\n\n\n\n

<\/p>\n\n\n\n

Asymmetric Key<\/strong><\/p>\n\n\n\n

Complex mathematical problems underpin the asymmetric key construction, which allows the private key to derive a corresponding public key easily while keeping reverse computation infeasible. Several popular cryptographic schemes have been constructed using the mathematical relation between the public and private keys, such as a digital signature or a key agreement.<\/p>\n\n\n\n

<\/p>\n\n\n\n

ECC Standards<\/strong><\/p>\n\n\n\n

The elliptic curve cryptography (ECC) is an asymmetric key tool based on the elliptic curve discrete logarithm problem (ECDLP). SEC 1 presents the ECC-based signature scheme, encryption and key transport scheme, and key agreements scheme. To assist others with adopting the ECC, SEC 2 proposed 15 domain parameters categorized into five security levels: 80-bit, 112-bit, 128-bit, 192-bit, and 256-bit.<\/p>\n\n\n\n

<\/p>\n\n\n\n

Classical Public key Cryptography<\/strong><\/p>\n\n\n\n

RSA and Diffie-Hellman-Merkle are the first two public key constructions. RSA is based on the integer factorization problem, and Diffie-Hellman-Merkle is based on the finite field discrete logarithm problem (DLP). Due to the existence of sub-exponential time algorithms solving these problems, the key size of these two public key systems is longer than the ECC key size. The ECC cryptography therefore is considered a natural modern successor of RSA and Diffie-Hellman-Merkle, due to the smaller keys and signatures producing the same level of security, while also providing faster key generation, key agreement, and signatures.<\/p>\n\n\n\n

<\/p>\n\n\n\n

SM2<\/strong><\/p>\n\n\n\n

SM2 is a bunch of ECC standards proposed by China. It defines an ECC-based digital signature scheme, an encryption scheme, and a Key exchange scheme. In addition, it also presents its own domain parameters of security level 128-bit, which is different from those in SEC 2.<\/a><\/p>\n\n\n\n

<\/p>\n\n\n\n

PUFcc-provided ECC Functions<\/strong><\/p>\n\n\n\n

PUFcc<\/a> Crypto Coprocessors implements the big number arithmetic computation as the building block for ECC-based cryptographic operations. Additionally, the private key blinding technique can be introduced to the ECC operations to resist a side-channel attack on private key related calculations. Based on the underlying mathematical computation, PUFcc also supports the generation of an ECC private key and public key, the validation of a public key, the elliptic curve digital signature algorithm (ECDSA) elliptic curve Diffie-Hellman (ECDH), and SM2-related functions. These implementations are all certified by NIST CAVP and the office of the state commercial cryptography administration (OSCCA).<\/p>\n","protected":false},"excerpt":{"rendered":"

ECC: Elliptic-Curve Cryptography In contrast to Symmetr […]<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"subjects":[227],"tech-tag":[],"class_list":["post-4474","technology","type-technology","status-publish","hentry","subjects-cryptography"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/technology\/4474"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/technology"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/types\/technology"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=4474"}],"version-history":[{"count":3,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/technology\/4474\/revisions"}],"predecessor-version":[{"id":4604,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/technology\/4474\/revisions\/4604"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=4474"}],"wp:term":[{"taxonomy":"subjects","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/subjects?post=4474"},{"taxonomy":"tech-tag","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/tech-tag?post=4474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}