12.07.2015 Views

Contributors - CyberSecurity Malaysia

Contributors - CyberSecurity Malaysia

Contributors - CyberSecurity Malaysia

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

20.Elliptic Curve CryptographyIntroductionECC - Elliptic CurveThis article is to introduce readers to the subject of EllipticCurve Cryptography. Topics that will be discussed herecover the basics of Elliptic Curve Cryptography and someof the basic mathematical calculations used over theelliptic curve.Elliptic Curve Cryptography (ECC) was introduced by NealKoblitz and Victor S. Miller in 1985. It is an approach topublic-key cryptography based on the algebraic structureof the elliptic curve over finite fields. Two advantages ofECC compared to RSA are: ECC is faster than RSA, and ECCuses a smaller key size compared to RSA. This comparisonis made at a point where both ECC and RSA provide thesame level of security. ECC is better than RSA because itis based on the elliptic curve discrete logarithm problem,a much harder problem than factoring integers. Table 1shows the comparison of security level in terms of keysizes in ECC and RSA.a) GF(p)The field GF(p) uses numbers from 0 to p-1, and thevalue of its computations end by taking the remainderon division by p. For example, in GF(11), the fieldcreates the integers from 0 to 10, and every operationwithin this field will result in an integer between 0 to 10.An elliptic curve with the essential field of GF(p) can beformed by choosing the variable of a and b within thefield of GF(p). The elliptic curve includes all points (x,y)which satisfy the elliptic curve equation modulo p wherethe value of x and y are numbers in GF(p).Example 1:y2 mod p = x3 + ax + b mod p has an underlying field ofGF(p) if the value of a and b are in GF(p).An elliptic curve group over GF(p) consists of the pointson the corresponding elliptic curve, together with aspecial point O called the point at infinity. There aremany points on an elliptic curve.For example, lets say we have an elliptic curve over thefield GF(p) with the value of a = 3 and b = 7. Then theelliptic curve equation is y2 = x3 +3x + 7.Table 1: Comparison of Security Levels in terms of Key Sizebetween ECC and RSA.Each cryptosystem, is based on a hard mathematicalproblem, which means it is computationally infeasibleto solve. The Elliptic Curve Cryptography relies on thedifficulty of solving the discrete logarithm problem for agroup of elliptic curves over finite fields such as GaloisFields (GF) and integers modulo a prime number.An elliptic curve is a plane curve defined by an equationof the form y2 = x3 + ax + b, where a, b, x and y are realnumbers. The elliptic curve can be changed with variousvalues of a and b. An elliptic curve over real numbersconsists of the points on the corresponding elliptic curve.ECC makes use of the additional operation of ellipticcurves.The nine points which satisfy this equation are:(1, 0) (5, 2) (5, 9) (8, 2) (8, 9) (9, 2) (9, 9) (10, 5) (10,6)All the points above can be achieved using the ellipticcurve equation as mentioned before. For example,below is the method on how to get all the points.The point (9, 2) satisfies this equation since:y2 mod p = x3 + 3x + 7 mod p22 mod 11 = 93 + 3(9) + 7 mod 114 mod 11 = 763 mod 114 = 4.There are two types of finite fields used in Elliptic CurveCryptography: fields of the form GF(p) with p as a primenumber, and fields of the form GF(2n) with n as a positiveinteger.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!