Elliptic Curve Cryptography in X.509-based PKI
dc.contributor.author | Hick, Sibylle | |
dc.contributor.author | Lo Iacono, Luigi | |
dc.contributor.editor | Alkassar, Ammar | |
dc.contributor.editor | Siekmann, Jörg | |
dc.date.accessioned | 2019-04-03T13:29:08Z | |
dc.date.available | 2019-04-03T13:29:08Z | |
dc.date.issued | 2008 | |
dc.description.abstract | In recent years a new category of digital signature algorithms based on Elliptic Curve Cryptography (ECC) has taken place besides well known schemes as RSA or DSA. So far it is, however, still not obvious how ECC-based signature schemes can be integrated in X.509-based Public Key Infrastructures (PKI).This paper briefly introduces cryptographic basics of signature schemes based on elliptic curves and points out the necessary cryptography parameters that are important in this context. Afterwards the structure and the encoding of X.509 certificates and Certificate Revocation Lists (CRL) are discussed regarding the integration of ECC public keys and ECC signatures respectively. The paper closes with exemplary implementations of ECC-based security systems. | en |
dc.identifier.isbn | 978-3-88579-222-2 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/21472 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e. V. | |
dc.relation.ispartof | SICHERHEIT 2008 – Sicherheit, Schutz und Zuverlässigkeit. Beiträge der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-128 | |
dc.title | Elliptic Curve Cryptography in X.509-based PKI | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 147 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 137 | |
gi.conference.date | 2.- 4. April 2008 | |
gi.conference.location | Saarbrücken | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1