Outline Acknowledment Some references RSA and ECC challenges
Outline Acknowledment Some references RSA and ECC challenges
Outline Acknowledment Some references RSA and ECC challenges
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Definition of P+Q = R<br />
Definition of P+(-P)<br />
P)<br />
CPE5021 - Advanced Network Security 13<br />
CPE5021 - Advanced Network Security 14<br />
Definition of P+P (where y!=0)<br />
Definition of P+P (where y=0)<br />
CPE5021 - Advanced Network Security 15<br />
CPE5021 - Advanced Network Security 16<br />
Elliptic Curve : An Algebraic Approach<br />
Finite Elliptic Curves on discrete Fields<br />
1. Adding distinct points P <strong>and</strong> Q (1)<br />
When P = (x(<br />
,y P P ) <strong>and</strong> Q = (x(<br />
Q ,y Q<br />
) <strong>and</strong> P≠ P Q, P ≠ -Q,<br />
P + Q = R(x R<br />
, y ) with x R R = s 2 - x P<br />
- x <strong>and</strong> y Q R = s(x P<br />
- x R<br />
) - y P<br />
where s = (y(<br />
P<br />
- y ) / (x(<br />
Q P - x Q )<br />
2. Doubling the point P (2)<br />
When y P<br />
is not O,<br />
2P = R(x R,<br />
y ) with x R R = s 2 - 2x <strong>and</strong> y P R = s(x P<br />
- x R<br />
) -y P<br />
where s = (3x P2<br />
+ a) / (2y P<br />
)<br />
3. P + (-P)(<br />
=O = (3)<br />
4. If P = (x(<br />
,y P P ) <strong>and</strong> y P<br />
=0, then P + P = 2P = O (4)<br />
• Cryptography works with finite field <strong>and</strong><br />
Elliptic curve cryptography uses curves<br />
whose variables <strong>and</strong> coefficients are finite<br />
• There are two commonly used <strong>ECC</strong> families:<br />
prime curves E p (a,b) defined over Z p<br />
• use modulo with a prime number p<br />
• efficient in software<br />
binary curves E 2m(a,b)<br />
defined over GF(2 n )<br />
• use polynomials with binary coefficients<br />
• efficient in hardware<br />
CPE5021 - Advanced Network Security 17<br />
CPE5021 - Advanced Network Security 18<br />
3