Summary

  

This chapter discussed the benefits of and how to implement the ECC algorithm as a service provider. The mathematics were introduced into this chapter as simply as possible. For a more complex understanding of the modular arithmetic, there are many advanced mathematics books. In addition, this chapter discussed how to implement a key exchange and ECC using Java's Service Provider Interface (SPI).

When I worked on ECC, I wish I had had this chapter as a reference. As presented in this chapter, the mathematics of curves and modular arithmetic for ECC require only a handful of algorithms and functions to implement a key exchange. The ECCDH only requires a handful of steps to implement. ECCDH has a lot of promise, and I am surprised that DH and RSA are shipped with JDK 1.4, but not ECC. There are a few companies that are working to provide ECC such as www.cryptix.com . ECC is a hard-to-break algorithm and is lightning fast, so I would think that there would be more products using ECC.

  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net