About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II

Research Article

\(EW_{256357}\): A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ Security

Download(Requires a free EAI acccount)
2 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-63095-9_19,
        author={Nilanjan Sen and Ram Dantu and Kirill Morozov},
        title={\textbackslash(EW_\{256357\}\textbackslash): A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ Security},
        proceedings={Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II},
        proceedings_a={SECURECOMM PART 2},
        year={2020},
        month={12},
        keywords={Elliptic curve Cryptography ECC Security},
        doi={10.1007/978-3-030-63095-9_19}
    }
    
  • Nilanjan Sen
    Ram Dantu
    Kirill Morozov
    Year: 2020
    \(EW_{256357}\): A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ Security
    SECURECOMM PART 2
    Springer
    DOI: 10.1007/978-3-030-63095-9_19
Nilanjan Sen1,*, Ram Dantu2, Kirill Morozov2
  • 1: Western Illinois University, Macomb
  • 2: University of North Texas, Denton
*Contact email: N-Sen@wiu.edu

Abstract

Selection of a proper elliptic curve is the most important aspect of Elliptic Curve Cryptography (ECC). Security of ECC is based on the Elliptic Curve Discrete Logarithm Problem which is believed to be unsolvable. Some of the well-known elliptic curve standards are NIST FIPS 186-2, Brainpool, and ANSI X9.62. Among these, NIST-recommended curves are a popular choice for industrial applications, in particular, for Internet security as a part of TLS/SSL, and even in real-time media encryption which uses Voice over IP (VoIP) technology. Specifically, NIST P-256 curve is widely used in these applications. Some NIST curves have disadvantages related to security issues, and therefore it is important to search for secure alternatives. In our work, we propose a new secure short Weierstrass curve(EW_{256357})at the 128-bit security level and compare it with the NIST P-256 curve. Our proposed curve is compatible with NIST P-256 curve but features better security. Based on the performance analysis of related curves in our previous and present works in terms of delay and jitter, we say that our proposed curve is suitable for the real-time media encryption.

Keywords
Elliptic curve Cryptography ECC Security
Published
2020-12-12
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-63095-9_19
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL