
Research Article
\(EW_{256357}\): A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ Security
@INPROCEEDINGS{10.1007/978-3-030-63095-9_19, author={Nilanjan Sen and Ram Dantu and Kirill Morozov}, title={\textbackslash(EW_\{256357\}\textbackslash): A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ Security}, proceedings={Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II}, proceedings_a={SECURECOMM PART 2}, year={2020}, month={12}, keywords={Elliptic curve Cryptography ECC Security}, doi={10.1007/978-3-030-63095-9_19} }
- Nilanjan Sen
Ram Dantu
Kirill Morozov
Year: 2020
\(EW_{256357}\): A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ Security
SECURECOMM PART 2
Springer
DOI: 10.1007/978-3-030-63095-9_19
Abstract
Selection of a proper elliptic curve is the most important aspect of Elliptic Curve Cryptography (ECC). Security of ECC is based on the Elliptic Curve Discrete Logarithm Problem which is believed to be unsolvable. Some of the well-known elliptic curve standards are NIST FIPS 186-2, Brainpool, and ANSI X9.62. Among these, NIST-recommended curves are a popular choice for industrial applications, in particular, for Internet security as a part of TLS/SSL, and even in real-time media encryption which uses Voice over IP (VoIP) technology. Specifically, NIST P-256 curve is widely used in these applications. Some NIST curves have disadvantages related to security issues, and therefore it is important to search for secure alternatives. In our work, we propose a new secure short Weierstrass curve(EW_{256357})at the 128-bit security level and compare it with the NIST P-256 curve. Our proposed curve is compatible with NIST P-256 curve but features better security. Based on the performance analysis of related curves in our previous and present works in terms of delay and jitter, we say that our proposed curve is suitable for the real-time media encryption.