elliptic curve cryptography 65–79 algorithm info types 110 curve generation 262 examples

acceleration table 273–280 key pair generation 268–270 key retrieval 271–272 parameter generation 260–264 parameter retrieval 264–267

interoperability 90 key 72, 100, 262 key info types 115 output considerations 276 recommendations 90 RSA algorithm vs. 90 scalar multiplication 70

See also ECDSA, Elliptic Curve Authenticated Encryption Scheme, Elliptic Curve Diffie-Hellman key agreement, elliptic curve parameters

Elliptic Curve Diffie-Hellman key agreement 77–80

example 280–284

output considerations 283 private value 78, 283 public value 78

elliptic curve discrete logarithm problem 65 elliptic curve parameters 66–71

base point 71 characteristic 67, 68, 90 coefficients 68–69 cofactor 71

even characteristic 67–68optimal normal basis 72 polynomial basis 72 representation 72

example 260–264 field 66, 67 odd prime 66 order 70, 100 point 69

point at infinity 69, 70 summary 71

emergency access See key escrow, secret sharing 89

encoding

BER vs. ASCII 125 entropy 93

envelope See digital envelope error code 10, 128 examples

ASCII encoding 172–176 BER encoding 124–125 DES with CBC 178–183

Diffie-Hellman key agreement 249–259

Digital Signature Algorithm 239248 ECDSA 284–291

Elliptic Curve Authenticated Encryption Scheme 297–303

Elliptic Curve Diffie-Hellman 280–284 HMAC 161–164

message digest (SHA1) 152–156password-based encryption 206–211random numbers 165–171

RC2 with CBC 184–190 RC4 9

RC5 with CBC 190–196 RC6 with CBC 196–201 RSA algorithm 214–232 secret sharing 305–311 surrender function 119

F

factoring 54, 98 feedback mode 41 Fermat 4 129 FIPS compliance 4

G

Generating an EC Key Pair 293

H

hardware 111 See also BHAPI

hardware accelerator perform DES encryption 148

hash function See message digest hash-basedmessage authentication code

(HMAC) 49 example 161–164 Hellman, Martin 62

HMAC 2

HMAC See hash-based message authentication code

I

include files choos_c.c 116 tstdlib.c 18, 336

initialization vector 41, 179 uniqueness 94

input constraints 126

K

key 97 DES 97 DSA 60

elliptic curve 72, 100

I n d e x

3 5 1

Page 373
Image 373
RSA Security 5.2.2 manual D e