Professional Documents
Culture Documents
Siddharth Singal
3/3/2014
Abstract
In this paper, we will explore cryptography based on a group created by elliptic curves.
Cryptography in the past had been based on math operations like taught in grade school such as
multiplication and exponentiation. Elliptic curves redefine addition and multiplication as new
operations called point addition and point multiplication. Solving elliptic curve based equations
prove to be much more complex and provide increased security, speed, and memory. Elliptic
curves are widely used in cryptography and are applied in various ways, including key exchange
and digital signature algorithms.
1
Introduction
Why use EC
2.1
2
Point Addition
Karl
where
. However,
suppose we were to do the following change
of variables:
Figure 2: How
geometrically
to
calculate
then
when
Point Doubling
If
, point addition is simply redefined
as point doubling. Figure 3 below shows an
(
)(
)(
)
(
geometrically
where
2.3
Identity:
Associative: (
Figure 4: Secant line only touching two points of
elliptic curve
Commutative:
One important thing to note about these four
properties is that they make elliptic curves
for
the
equation
in
, ( )
( )( )(
) (
)(
),
giving a total of 24 points. The graph looks
like Figure 6 below.
2
20
y value
15
10
3.2
{(
20
are
in
Modified Formulas
|
where
25
15
x value
Figure 6: A graph of
Modified Weierstrass
Equation
10
(
,
).
)
5
where
DLP
For
Time
0
ECDLP
Applications ECDH
Initialization
| (
)|
, where
is called the
Applications ECDSA
Initialization
Alice
2.
3.
4.
5.
6.
7.
8.
Bob
Bob
has
now
received
the
document/message and now he must verify
the document by using the signature. He is
mainly checking for
authentication,
integrity, and non-repudiation.
1. Bob must obviously check if and
are in the interval
.
2. He must then compute
( ),
using the same hashing function as
Alice.
3. He will also compute by finding
like Alice did and finding the
leftmost bits of .
4. He will compute
.
Proof of Verification
)
)
(Alice-5)
(rewritten)
(distribution)
(Bob-3)
(Bob-5)
(
)
(P-multiplication)
(distribution)
(Alice-1)
(Bob-6)
Because is the value of and is the
value of ,
as seen from the last step
of the proof above.
7.5
Eve/Choosing Random
Bibliography