EconPapers    
Economics at your fingertips  
 

Implementation of Elliptic Curve25519 in Cryptography

Intan Muchtadi-Alamsyah and Yanuar Bhakti Wira Tama

A chapter in Theorizing STEM Education in the 21st Century from IntechOpen

Abstract: Bernstein's design implementation of elliptic Curve25519 in key exchange is claimed to be highly secure and efficient. This curve is, for example, used in the key exchange scheme of TextSecure for Instant Messaging. In this paper, we present an implementation of elliptic Curve25519 in the simplified Elliptic Curve Integrated Encryption Scheme, thus showing that elliptic Curve25519 can also serve other purposes than key exchange. The curve is in Montgomery form, which makes it possible to use Montgomery ladder. Point compression, point decompression, encryption, and decryption algorithms are presented for the simplified Elliptic Curve Integrated Encryption Scheme.

Keywords: elliptic curve; cryptography; Montgomery ladder; integrated encryption scheme (search for similar items in EconPapers)
JEL-codes: I23 (search for similar items in EconPapers)
References: Add references at CitEc
Citations:

Downloads: (external link)
https://www.intechopen.com/chapters/68653 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ito:pchaps:197305

DOI: 10.5772/intechopen.88614

Access Statistics for this chapter

More chapters in Chapters from IntechOpen
Bibliographic data for series maintained by Slobodan Momcilovic ().

 
Page updated 2025-04-09
Handle: RePEc:ito:pchaps:197305