tailieunhanh - CRYPTOGRAPHY AND NETWORK SECURITY: Principles and Practice

For an equivalent level of security, elliptic curve cryptography uses shorter key sizes and is considered to be an excellent candidate for constrained environments like wireless/mobile communications. In FIPS 186-2, NIST recommends several finite fields to be used in the elliptic curve digital signature algorithm (ECDSA). Of the ten recommended finite fields, five are binary extension fields with degrees ranging from 163 to 571. The fundamental building block of the ECDSA, like any ECC based protocol, is elliptic curve scalar mul- tiplication. This operation is also the most computationally intensive. In many situations it may be desirable to accelerate the elliptic curve scalar multiplication with specialized hardware | Cryptography and Network Security Principles and Practice Second Edition William Stallings Prentice Hall Upper Saddle River New Jersey 07458 Library of Congress Cataloging-in-Publication Data Stallings William. Cryptography and network security principles and practice William Stallings. -- 2nd ed. p. cm. Rev. ed. of Network and Internetwork Security. Includes bibliographical references and index. ISBN O-13-869017-0 Computer networks--Security measures. 2. Data encryption Computer science 3. Coding theory. 4. Computer security. Stallings William. Cryptography and network security. II. Title. 199X dc21 98-15676 ClP Acquisitions editor Laura Steele Editorial production supervision Rose Kernan Editor-in-chief Marcia Horton Managing editor Bayani Mendoza de Leon Copy editing Patricia Daly Art director and cover designer Heather Scott Director ofproduction and manufacturing David W. Riccardi Manufacturing Buyer Donna Sullivan and Pat Brown Editorial assistant Catherine Kaibni 1999 1995 by Prentice-Hall Inc. Simon Schuster A Viacom Company Upper Saddle River New Jersey 07458 The author and publisher of this book have used their best efforts in preparing this book. These efforts include the development research and testing of the theories and programs to determine their etiectiveness. The author and publisher make no warranty of any kind expressed or implied. with regard to these programs or the documentation contained in this book. The author and publisher shall not be liable in any event for incidental or consequential damages in connection with or arising out of the furnishing performance or use of these programs. All right reserved. No part of this book may be reproduced in any form or by any means without permission in writing from the publisher. Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 ISBN D-ia-flbiOlT-O Prentice-Hall International UK Limited London Prentice-Hall of Australia Pty. Limited Sydney Prentice-Hall Canada Inc. .