EllipticCurveCryptography Handout
EllipticCurveCryptography Handout
It is denoted by {F, +, x}
where + and x are the group operators
Group, Ring, Field
Why Elliptic Curve Cryptography?
More Secure
Comparable Key Sizes for
Equivalent Security
Symmetric Encryption RSA and Diffie-Hellman ECC Key Size
(Key Size in bits) (modulus size in bits) in bits
56 512 112
80 1024 160
Gx = 771507216262649826170648268565579889907769254176
Gy = 390157510246556628525279459266514995562533196655
y2 = x3 + 317689081251325503476317476413827693272746955927x +
790528966078787587181205720257185354321100651934
Gx and Gy constitute the agreed upon base point (P) and the numbers in
the above equation are values for the parameters a and b
ECC Security
➢ relies on elliptic curve logarithm problem
➢ fastest method is “Pollard rho method”
➢ compared to factoring, can use much
smaller key sizes than with RSA etc
➢ for equivalent key lengths computations
are roughly equivalent
➢ hence for similar security ECC offers
significant computational advantages
Elliptic Curve Schemes
This is how we know that the verification works the way we want it to:
We have, s = k-1(e + dr) mod n which we can rearrange to obtain, k = s -1(e + dr) which is
s-1e + s-1rd
The plaintext message is split into two parts: part C representing the data
elements requiring confidentiality and part V representing the data elements
presented in plaintext. Both the parts are signed. The signature is generated
as follows:
The signature pair (s,e) is transmitted together with the portion V of the
plaintext.
ECPVS
Signature Verification