Ch10 Crypto6e
Ch10 Crypto6e
Sixth Edition
by William Stallings
Binary
curves Prime
over curves
GF(2m) over Zp
Cm = {kG, Pm+kPB}
• To decrypt the ciphertext, B multiplies the first point in the pair by
B’s secret key and subtracts the result from the second point:
Pm+kPB–nB(kG) = Pm+k(nBG)–nB(kG) = Pm
Vietnam – Korea University
of Information and Communication Technology
Security of Elliptic Curve Cryptography
Note:Vietnam
L =– Korea
size of public key, N = size of private key
University
of Information and Communication Technology
Pseudorandom Number Generation
(PRNG) Based on Asymmetric Cipher
• Diffie-Hellman Key
Exchange • Elliptic curve arithmetic
– The algorithm • Abelian groups
– Key exchange protocols • Elliptic curves over real
– Man-in-the-middle attack numbers
• Elgamal cryptographic • Elliptic curves over Zp
system • Elliptic curves over
• Elliptic curve GF(2m)
cryptography • Pseudorandom number
– Analog of Diffie-Hellman generation based on
key exchange
– Elliptic curve
an asymmetric cipher
encryption/decryption • PRNG based on RSA
– Security of elliptic curve • PRNG based on elliptic
cryptography curve cryptography
Vietnam – Korea University
of Information and Communication Technology