Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2006.204.229m)]]>RabahKefa .1200651The rapid growth of information technology that has resulted in significant advances in cryptography to protect the integrity and confidentiality of data is astounding. Elliptic curve cryptography is gaining wide acceptance as an alternative to the conventional cryptosystems (DES, RSA, AES, etc.). Elliptic curve cryptosystems require less computational power, memory, communication bandwidth and network connectivity. Elliptic curve ciphers today are based in smartcards, Personal Digital Assistants (PDAs), pagers and mobile phones and can be easily implemented with processors clocked in single digits of MHz. This study describes the basic design principle of Elliptic Curve Crypto (ECC) protocols. The ECC processor is normally used to perform elliptic curve operations for: EC Diffie-Hellman, EC ElGamal and ECDSA protocols. As an example we will implement ECC defined over binary finite field GF(2m).]]>Rabah, K.,20043106132Data Encryption Standard,1977Rabin, M.O.,19791979Rivest, R.L., A. Shamir and L. Adleman,197821120126Menezes, A.J., P.C. van Oorschot and S.A. Vanstone,1997Koblitz, N.,198748203209Miller, V.S.,19861986pp: 417-426pp: 417-426Rabah, K.,20055604633Koblitz, N.,1987Menezes, A.,19931st Edn.,ANSI X9.62,1999Rabah, K.,20054132139Rabah, K.,20054299306Rabah, K.,20054307325US, Department of Commerce/National Institute of Standards and Technology,1997National Institute of Standards and Technology,1999Schroeppel, R., C. Beaver, R. Gonzales, R. Miller and T. Draelos,20022002Schroeppel, R., H. Orman, S. O`Malley and O. Spatscheck,1995pp: 43-56pp: 43-56De Win, E., A. Bosselaers, S. Vandenberghe, P. de Gersem and J. Vandewalle,1996n), Advances in Cryptology-ASIACRYPT `96.]]>pp: 65-76pp: 65-76Lenstra, A. and E. Verheul,20002000Bailey, D.V. and C. Paar,200114153176Woodbury, A.D., D.V. Bailey and C. Paar,20022002pp: 120Beth, T. and F. Schaefer,19911991pp: 252-266pp: 252-266Itoh, T. and S. Tsujii,1988m) using normal basis.]]>78171177Wu, H.,19991999pp: 280291Paar, C., P. Fleischmann and P. Soria-Rodriguez,19994810251034Orlando, G. and C. Paar,2000m) and its applications in cryptographic systems.]]>3611161117Silverman, J.H.,1985Georg-Johann, L. and Z. Horst-Gunter,19941994pp: 250263Seroussi, G.,1998m).]]>1998Lenstra, Jr. H.W. and R. Schoof,198748217231Agnew, G.B., T. Beth, R.C. Mullin and S.A. Vanstone,1993m).]]>6313Mullin, R.C., I. Onyszchuk, S.A. Vanstone and R. Wilson,1989n).]]>22149161Diffie, W. and M.E. Hellman,197622644654Bellovin, S.M. and M. Merritt,19921992pp: 7284Pollard, J.M.,1978p).]]>32918924Hellman, M. and J. Reyneri,19831983Lim, C.H. and P.J. Lee,19971997pp: 249263Koyama, K., U.M. Maurer, T. Okamoto and S.A. Vanstone,19921992pp: 252266Basham, L., D. Johnson and T. Polk,19991999Elgamal, T.,198531469472Diffie, W., P.V. Oorschot and M. Wiener,19922107125Sutikno, S., R. Effendi and A. Surya,19981998pp: 647650Paar, C.,19931993pp: 320324