loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Author: Luigi Maria Bottasso

Affiliation: AgustaWestland, Italy

ISBN: 978-989-758-117-5

Keyword(s): Elliptic Curve Cryptography, Direct Embedding Schemes, Public Key Infrastructure, Social Networking.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Security and Privacy in Social Networks ; Security Deployment ; Security in Information Systems

Abstract: A new library of modular arithmetic and cryptographic functions was coded, and then used for the development of a crypto tool. We present the architecture and functionality of a hybrid ECC-AES cryptosystem which can be quickly deployed even in absence of Public Key Infrastructures and associated Certification Authorities. The tool was conceived for use in combination with readily available resources, e.g. email and possibly social networks. It allows secure exchange of files with associated ECDSA digital signature, providing the user with substantial flexibility and control of the security settings. Established protocols were used in an original way, notably exploiting direct embedding of the AES session key into an elliptic curve. The code has been developed in C++ entirely from scratch, with no use of pre-existing libraries. The implementation is associated with a web site http://www.elcrypto.com, www.elcrypto.com aimed at promoting the benefits of Elliptic Curve Cryptography.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.227.249.234

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Maria Bottasso, L. (2015). A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange.In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 194-201. DOI: 10.5220/0005511801940201

@conference{secrypt15,
author={Luigi Maria Bottasso.},
title={A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={194-201},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005511801940201},
isbn={978-989-758-117-5},
}

TY - CONF

JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange
SN - 978-989-758-117-5
AU - Maria Bottasso, L.
PY - 2015
SP - 194
EP - 201
DO - 10.5220/0005511801940201

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.