Elliptic Curve Cryptography (ECC) : Mustafa Demirhan Bhaskar Anepu Ajit Kunjal
Elliptic Curve Cryptography (ECC) : Mustafa Demirhan Bhaskar Anepu Ajit Kunjal
(ECC)
Mustafa Demirhan
Bhaskar Anepu
Ajit Kunjal
Contents
Introduction
Addition Law
Elliptic Curves Mod n
Encryption Example
Decryption Example
General Diffie-Hellman Key Exchange Scheme
Diffie Hellman Method with Elliptic Curves
Conclusions
Introduction
An elliptic curve
E: y2 = x3 + ax + b
x3 = m2 - x1 - x2
y3 = m (x1 - x3) - y1
P + (-P) = O
Multiplication
k.P = P + P + P + …. + P (k times)
where k is an integer
Elliptic Curves Mod n
Let E: y2 ≡ x3 + 2x + 3 (mod 5)
The points on E are pairs (x, y) mod 5 that satisfy the equation
x ≡ 0 y2 ≡ 3 (mod 5) no solutions
x ≡ 1 y2 ≡ 6 (mod 5) y ≡ 1, 4
x ≡ 2 y2 ≡ 15 (mod 5) y ≡ 0
x ≡ 3 y2 ≡ 36 (mod 5) y ≡ 1, 4
x ≡ 4 y2 ≡ 75 (mod 5) y ≡ 0
Let E: y2 ≡ x3 + 2x + 3 (mod 5)
Let E: y2 ≡ x3 + 2x + 3 (mod 5)
m = 4/1 = 4 C
x3 = 16-2-3 = 1 (mod 5)
y3 = 4(2-1)-0 = 4
Hence, P = (1,4)
An Example Usage of Elliptic Curves
The crucial property of an elliptic curve is that we can define a
rule for "adding" two points which are on the curve, to obtain a
third point which is also on the curve
Cryptography can be done as follows:
Alice, Bob, Cathy and David… agree on a (non-secret) elliptic
curve and a (non-secret) fixed curve point F. Alice chooses a
secret random integer KA which is her secret key, and publishes
the curve point PA = KA*F as her public key. Bob, Cathy and
David do the same
Now suppose Alice wishes to send a message to Bob. One
method is for Alice to simply compute KA*PB and use the result
as the secret key for a conventional symmetric block cipher (say
DES)
Bob can compute the same number by calculating KB * PA, since
KB*PA = KB*(KA*F) = (KB*KA)*F = KA*(KB*F) = KA*PB
The security of the scheme is based on the assumption that it is
difficult to compute k given F and k*F.
General Diffie-Hellman Key Exchange