Professional Documents
Culture Documents
08co55-Elliptic Curve Crypto
08co55-Elliptic Curve Crypto
Introduction
The Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. Security of Public-Key Cryptography depends on the difficulty of solving the Hard Problems defined in Complexity Theory.
Elliptic Curve
An elliptic curve is the set of solutions of an equation of the form y2 = x3 + ax + b . Where the co-efficeints a and b are elements of the field and 4a3 + 27b2 0. Each value of the 'a' and 'b' gives a different elliptic curve. One interesting property of set of solutions of elliptic curve is that it forms a group which enables us to do Cryptography. The public key is a point in the curve and the private key is a random number. The public key is obtained by multiplying the private key with the generator point G in the curve.
5
Source ::
http://en.wikipedia.org/wiki/File:EllipticCurveCatalog.svg
6
Graphical Representation
Y axis
X axis
Point addition is the addition of two points J and K on an elliptic curve to obtain another point L on the same elliptic curve.
Point Addition
An extra point at infinity O is added to the curve, which lies infinitely far on the vertical axis. This point O will become the identity of the elliptic curve group. Let J=(x1,y1) and K=(x2,y2) then the sum of J and K (where none of them is O) is , L=J+K where L=(x3,y3) where x3 = 2 - x1 - x2 y3 = (x1 - x3) - y1 and is the slope of the line and is given by following formula = (3x12+a)/2y1 if x1 = x2 = (y2-y1)/(x2-x1) otherwise
9
Point Doubling
Point doubling is the addition of a point J on the elliptic curve to itself to obtain another point L on the same elliptic curve.
10
Point Multiplication
In point multiplication a point P on the elliptic curve is multiplied with a scalar k using elliptic curve equation to obtain another point Q on the same elliptic curve i.e. kP=Q Point multiplication is achieved by two basic elliptic curve operations Point addition Point doubling,
11
Imposes a significant load in storing and processing keys and messages. An alternative is to use elliptic curves that offers same security with smaller bit sizes. The security of ECC depends on the difficulty of Elliptic Curve Discrete Logarithm Problem. Let P and Q be two points on an elliptic curve such that kP = Q, where k is a scalar. Given P and Q, it is computationally infeasible to obtain k, if k is sufficiently large. k is the discrete logarithm of Q to the base P.
12
For generating a shared secret between A and B using ECDH, both have to agree up on Elliptic Curve domain parameters.
14
ECDH.
Both end have a key pair consisting of a private key d (a randomly selected integer less than n) and a public key Q = d * G (G is the generator point, an elliptic curve domain parameter). Let (dA, QA) be the private key - public key pair of A and (dB, QB) be the private key - public key pair of B
The end A computes K = (xK, yK) = dA * QB The end B computes L = (xL, yL) = dB * QA Since dAQB = dAdBG = dBdAG = dBQA. Therefore K = L and hence xK = xL Hence the shared secret is xK.
It is practically impossible to find the private key dA or dB from the public key K or L, its not possible to obtain the shared secret for a third party.
15
17
Applications of ECC
Many devices are small and have limited storage and computational power Where can we apply ECC?
o Wireless communication devices o Smart cards o Web servers that need to handle many encryption sessions o Any application where security is needed but lacks the power, storage and computational power that is necessary for our current cryptosystems
18
Benefits of ECC
Same benefits of the other cryptosystems: confidentiality, integrity, authentication and nonrepudiation but Shorter key lengths
o Encryption, Decryption and Signature Verification speed up o Storage and bandwidth savings
19
References
http://www.dkrypt.com/home/ecc http://en.wikipedia.org/wiki/Elliptic_Curve_DSA Elliptic Curves and Their Application to Cryptography-An Introduction By Andreas En.ge ,KLUWER ACADEMIC PUBLISHERS. HANDBOOK OF ELLIPTIC AND HYPERELLIPTIC CURVE CRYPTOGRAPHY by HENRY COHEN & GERHARD FREY , Roberto Avanzi, Christophe Doche, Tanja Lange,Kim Nguyen, and Frederik Vercauteren CHAPMAN & HALL/CRC,TAYLOR & FRANCIS GROUP , Boca Raton London New York Singapore. http://citeseer.ist.psu.edu/old/392717.html http://www.secg.org/download/aid-385/sec1_final.pdf http://www.secg.org/download/aid-386/sec2_final.pdf http://www.certicom.com/index.php?action=ecc_tutorial,home
20
21