2014
DOI: 10.1007/978-3-662-45472-5_11
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Cryptography in Practice

Abstract: Abstract. In this paper, we perform a review of elliptic curve cryptography (ECC), as it is used in practice today, in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. We study four popular protocols that make use of this type of public-key cryptography: Bitcoin, secure shell (SSH), transport layer security (TLS), and the Austrian e-ID card. We are pleased to observe that about 1 in 10 systems support ECC across the TLS and SSH protocols. However, we find that despite t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
94
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2
2

Relationship

1
9

Authors

Journals

citations
Cited by 185 publications
(95 citation statements)
references
References 33 publications
0
94
0
1
Order By: Relevance
“…Nowadays, roughly one out of ten systems on the publicly observable Internet offers cipher suites in the Secure Shell (SSH) and Transport Layer Security (TLS) protocols that contain elliptic-curve-based cryptographic algorithms [16]. Most elliptic curve standards recommend curves for different perceived security levels that are either defined over prime fields or binary extension fields; on the Internet, however, the deployed curves are mostly defined over prime fields [16]. This can be partially explained by the increasing skepticism towards the security of elliptic curves defined over binary extension fields (justified by recent progress on solving the discrete logarithm problem on such curves [26]).…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, roughly one out of ten systems on the publicly observable Internet offers cipher suites in the Secure Shell (SSH) and Transport Layer Security (TLS) protocols that contain elliptic-curve-based cryptographic algorithms [16]. Most elliptic curve standards recommend curves for different perceived security levels that are either defined over prime fields or binary extension fields; on the Internet, however, the deployed curves are mostly defined over prime fields [16]. This can be partially explained by the increasing skepticism towards the security of elliptic curves defined over binary extension fields (justified by recent progress on solving the discrete logarithm problem on such curves [26]).…”
Section: Introductionmentioning
confidence: 99%
“…Generally speaking, HDECC can be applied instead of any use of the classic ECC; i.e., Bitcoin, secure shell (ssl), transport layer security (tls) [14]. Among these applications, one of the most important is certainly tls.…”
Section: Examples Of Practical Uses Of High-dimensional Ellipticmentioning
confidence: 99%
“…Important studies of cryptographic vulnerabilities have included studies of key revocation after the Debian randomness bug [59], studies of factorable RSA keys due to shared prime factors [60], [61], studies of elliptic curve deployment errors in TLS [62], forged TLS certificates in the wild [18] and multiple studies of key sizes and cipher suites used in practice [23], [63], [64]. Our work is largely distinct from these in that we focus on two new aspects of HTTPS (pinning and strict transport security) which are vulnerabilities at the HTTPS (application) level rather than the TLS (cryptographic) level.…”
Section: B Empirical Studies Of Https and Tlsmentioning
confidence: 99%