<< 1 >>
Rating:  Summary: Good book Review: I think this is one of the best introductions to elliptic curve cryptosystems. This book have all the last algorithms in the field.
Rating:  Summary: Good compact book on elliptic curves in cryptography Review: This book gives a good summary of the current algorithms and methodologies employed in elliptic curve cryptography. The book is short (less than 200 pages), so most of the mathematical proofs of the main results are omitted. The authors instead concentrate on the mathematics needed to implement elliptic curve cryptography. The book is written for the reader with some experience in cryptography and one who has some background in the theory of elliptic curves. A reader coming to the field for the first time might find the reading difficult. The authors do give a brief summary in Chapter 1 on the idea of doing cryptography based on group theory. They then move on to discuss finite field arithmetic in Chapter 2. The reader is expected to know some of the basic notions of multiprecision arithmetic for integers. The authors choose to work with 2^16. Psuedocode is given for doing modular arithmetic with Montgomery arithmetic given special attention. The last section of the chapter gives a good summary of arithmetic in fields of characteristic 2. Chapter 3 discusses very compactly arithmetic in elliptic curves. This is where the reader should already have the background in the theory of elliptic curves, since the reading is very fast and formal. The authors do a good job of summarizing how modular polynomials come into play in elliptic curve cryptography and give some explicit examples of these polynomials. The most important chapter of the book is Chapter 4, where the authors give a discussion of how to implement elliptic curves efficiently in cryptosystems. This chapter is nicely written and pseudocode appears many times with lots of nice examples. This chapter serves as background for the next one on the discrete logarithm problem using elliptic curves over finite fields. The MOV attack, the anomalous attack, and the baby step/giant step methods are discussed very nicely. Random methods, such as the tame and wild kangaroo are discussed at the end of the chapter. The next three chapters concentrate on how to actually generate elliptic curves for cryptosystems, with particular attention payed to the Schoof Algorithm. The chapter on Schoof's algorithm is more detailed than the rest of the chapters and this makes for better reading. The authors do discuss how to generate curves using complex multiplication although the discussion is somewhat hurried. The next chapter discusses how elliptic curves have been applied to other areas in cryptography, such as factoring, etc. A good discussion of the ECPP algorithm on proving primality ends the chapter. The authors end the chapter with a discussion of hyperelliptic cryptography. Anyone familiar with the theory of elliptic curves and how they are applied to cryptography will naturually ask if hyperelliptic curves have any advantages over the elliptic case. The authors never really address this explicity but do give examples on just what is involved in implementing hyperelliptic curves in cryptography. Overall a fine addition to the literature on elliptic curves in cryptography. One would hope that the authors would write a follow-up book on hyperelliptic curves and maybe on general algebraic curves and their possible use in this area.
Rating:  Summary: too much math Review: This is a fairly complete treatment of elliptic curve cryptography. It suffers from a very uneven treatment. The chapters on implementation are well written and easy to read. The material on the logarithm problem, however, is much too advanced and will only be accessible to research mathematicians. A big omission in the book are protocols such as signatures and encryption.
<< 1 >>
|