# A review about public cryptography protocols based on RSA or elliptic curves

Antonio Corbo Esposito; Cristian Tirelli

Rendiconto dell’Accademia delle Scienze Fisiche e Matematiche (2019)

- Volume: 86, Issue: 1, page 123-146
- ISSN: 0370-3568

## Access Full Article

top## Abstract

top## How to cite

topCorbo Esposito, Antonio, and Tirelli, Cristian. "A review about public cryptography protocols based on RSA or elliptic curves." Rendiconto dell’Accademia delle Scienze Fisiche e Matematiche 86.1 (2019): 123-146. <http://eudml.org/doc/296411>.

@article{CorboEsposito2019,

abstract = {We provide the basic deﬁnitions regarding computational complexity theory and review some basic cryptography protocols based on RSA or elliptic curves. These protocols summarize the history of the last ﬁfty years in cryptography and are actually ubiquitous in applications, as for example SSL (secure socket layers), smartcards, creation of a bitcoin wallet etc. Since it is known they are in the polynomial class for the Shor’s algorithm, the possible development of quantum computers, needed to run such algorithm, will represent a dramatic shift in cryptography research and in applications.},

author = {Corbo Esposito, Antonio, Tirelli, Cristian},

journal = {Rendiconto dell’Accademia delle Scienze Fisiche e Matematiche},

keywords = {RSA; Difﬁe-Hellman; Discrete Logarithm; Elliptic Curve},

language = {eng},

month = {12},

number = {1},

pages = {123-146},

publisher = {Società Nazione di Scienze, Lettere e Arti in Napoli; Giannini},

title = {A review about public cryptography protocols based on RSA or elliptic curves},

url = {http://eudml.org/doc/296411},

volume = {86},

year = {2019},

}

TY - JOUR

AU - Corbo Esposito, Antonio

AU - Tirelli, Cristian

TI - A review about public cryptography protocols based on RSA or elliptic curves

JO - Rendiconto dell’Accademia delle Scienze Fisiche e Matematiche

DA - 2019/12//

PB - Società Nazione di Scienze, Lettere e Arti in Napoli; Giannini

VL - 86

IS - 1

SP - 123

EP - 146

AB - We provide the basic deﬁnitions regarding computational complexity theory and review some basic cryptography protocols based on RSA or elliptic curves. These protocols summarize the history of the last ﬁfty years in cryptography and are actually ubiquitous in applications, as for example SSL (secure socket layers), smartcards, creation of a bitcoin wallet etc. Since it is known they are in the polynomial class for the Shor’s algorithm, the possible development of quantum computers, needed to run such algorithm, will represent a dramatic shift in cryptography research and in applications.

LA - eng

KW - RSA; Difﬁe-Hellman; Discrete Logarithm; Elliptic Curve

UR - http://eudml.org/doc/296411

ER -

## References

top- Bernstein, D.J., Buchmann, J., Dahmen, E. (2009) Post-Quantum Cryptography. Springer, pp.1-32 MR2590642DOI10.1007/978-3-540-88702-7
- Blackburn, S. R., Cid, C., Mullan, C. (2010) Group Theory in Cryptography. Department of Mathematics, Royal Holloway, University of London Egham, Surrey TW20 0EX, United Kingdom, pp. 2-6 Zbl1244.94031MR2858854
- Cohen, H., Frey, G., Avanzi, R., Doche, C., Lange, T., Nguyen, K., Vercauteren, F. (2005) Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman and Hall/CRC, pp. 19-35, 268-285, 591-607 Zbl1082.94001MR2162727
- Corbellini, A. (2015) Elliptic Curve Cryptography: A gentle introductionhttp://andrea.corbellini.name/2015/05/17/elliptic-curve-cryptography-a-gentle-introduction
- Hankerson, D., Menezes, A., Vanstone, S.A. (2004) Guide to Elliptic Curve Cryptography, Springer-Verlag, pp. 76-83 Zbl1059.94016MR2054891DOI10.1016/s0012-365x(04)00102-5
- Koblitz, N. (1998), Algebraic Aspects of Cryptography. Springer (Corrected Second Printing 1999), pp. 18-21, 133-136 MR1610535DOI10.1007/978-3-662-03642-6
- McEliece, R. J. (1979) Finite Fields for Computer Scientists and Engineers. Springer, pp. 3-28 MR884528DOI10.1007/978-1-4613-1983-2
- Mermin, N. D. (March 28, 2006). Breaking RSA Encryption with a Quantum Computer: Shors' Factoring Algorithm, Cornell University, Physics 481-681 Lecture Notes
- Schneier, B. (1996), Applied Cryptography. John Wiley & Sons, pp. 238-241, 233-263 Zbl0853.94001
- Shor, P.W. (1994) Algorithms for quantum computation: Discrete logarithms and factoring, Proc. 35th Annu. Symp. Foundations of Computer Science, pp. 124-134. MR1489242DOI10.1109/SFCS.1994.365700
- Silverman, J. H. (1986). The Arithmetic of Elliptic Curves. Graduate Texts in Mathematics, Springer-Verlag, pp. 137-139 MR817210DOI10.1007/978-1-4757-1920-8

## NotesEmbed ?

topTo embed these notes on your page include the following JavaScript code on your page where you want the notes to appear.