Implementing Elliptic Curve Cryptography

Michael Rosing

1998 | 330 pages
ISBN: 1884777694

Out of print $47.95 Softbound print book  

 

RESOURCES

DESCRIPTION

Implementing Elliptic Curve Cryptography proceeds step-by-step to explain basic number theory, polynomial mathematics, normal basis mathematics and elliptic curve mathematics. With these in place, applications to cryptography are introduced. The book is filled with C code to illustrate how mathematics is put into a computer, and the last several chapters show how to implement several cryptographic protocols. The most important is a description of P1363, an IEEE draft standard for public key cryptography.

The main purpose of Implementing Elliptic Curve Cryptography is to help "crypto engineers" implement functioning, state-of-the-art cryptographic algorithms in the minimum time. With detailed descriptions of the mathematics, the reader can expand on the code given in the book and develop optimal hardware or software for their own applications.

Implementing Elliptic Curve Cryptography assumes the reader has at least a high school background in algebra, but it explains, in stepwise fashion, what has been considered to be a topic only for graduate-level students.

WHAT THE EXPERTS SAY ABOUT THIS BOOK...

"The book provides all the theory and working programs needed to create real applications based on the latest IEEE P1363 standard."
--Reviewed in Cryptologia

ABOUT THE AUTHOR...

With a background that includes nuclear engineering, hardware computer design, and telephony, Michael Rosing has seen how cryptography plays an important role in military and commercial applications. At present he is employed building DSP hardware for brain research at the University of Wisconsin in Madison.

Sample Chapters

The formulas and images in Elliptic Curve Cryptography make conversion to HTML impractical, so we've converted Chapter 5 to PDF format for you to sample.

You can read PDF files with Adobe's Acrobat Reader version 3 or better, available at

http://www.adobe.com/prodindex/acrobat/readstep.html.

WHAT REVIEWERS ARE SAYING

"You do not require an advanced degree in math to read or use this book...If you want to explore the mathematics of elliptic-curve cryptography or if you must implement it in a communication system, consider this book a good place to start."
--ECN Magazine


"This book provides excellent coverage of its topic. All the source code is available form a web site (despite the fact that you can use it to produce very strong, munitions grade, cryptography). The author covers enough theory to help you understand the mechanism and provides copious explanations of the actual cryptographic tools. He also has his feet firmly planted on the ground as relates to the difference between hard-to-break cryptography and security."
--C Vu, the Journal of the ACCU

Source code

The source code from Implementing Elliptic Curve Cryptography is contained in single zip archive, size 282 kilobytes. Free unzip programs for most platforms are available at http://www.download.com.

Download the source code.