SlideShare a Scribd company logo
1 of 42
Download to read offline
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Arithmetic of Elliptic Curves
Ayan Sengupta
May 5, 2015
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Overview
1 Group Structure of Elliptic Curves
2 Rational Points of Finite Order on Elliptic Curve
3 Group of Rational Points on Elliptic Curve
4 Application in Cryptography
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Motivation
Very important concept and major area of current research
in Number Theory.
Andrew Wiles used in his famour proof of Fermat’s last
theorem.
They are vividly used in many algorithms:
- Lenstra elliptic curve factorization.
- Elliptic curve primality testing.
Elliptic curve cryptography (ECC) is based on the elliptic
curve discrete logarithm problem.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
What is Elliptic Curve ?
An algebraic curve of the form
Y 2
= X3
+ aX2
+ bX + c (1)
where a, b, c ∈ K, field (most popular are Q, Fp), such that
f (X) = X3 + aX2 + bX + c has no repeated root in C.
We also assume a point at infinity O included in elliptic curve,
that is the point where the vertical lines in XY -plane meet.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
What is Elliptic Curve ?
An algebraic curve of the form
Y 2
= X3
+ aX2
+ bX + c (1)
where a, b, c ∈ K, field (most popular are Q, Fp), such that
f (X) = X3 + aX2 + bX + c has no repeated root in C.
We also assume a point at infinity O included in elliptic curve,
that is the point where the vertical lines in XY -plane meet.
(a) One real root of f (X) (b) Three real roots of f (X)
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
What is Elliptic Curve ?
A smooth, projective algebraic curve of genus one with a
pre-assumed point O.
It is nothing related to ellipses!
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Group Structure of Elliptic Curves
Figure : Addition operation on elliptic curve
Explicitely,
x3 = λ2
− a − x1 − x2 (2)
y3 = λx3 + ν (3)
where, λ and ν are respectively the slope and intercept of the
line joining P1, P2.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Group Structure of Elliptic Curves
Figure : Doubling a point
x3 =
x4
1 −2bx2
1 −8cx1+b2−4ac
4x3
1 +4ax2
1 +4bx1+4c
(duplication formula)
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Group Structure of Elliptic Curves
Figure : Inverse of a point
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Group Structure of Elliptic Curves
Using Nine intersection theorem, associativity can be proved.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Group Structure of Elliptic Curves
Points on an elliptic curve form an abelian group under the
above mentioned addition operation.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Group Structure of Elliptic Curves
Concentrate on elliptic curve C over Q and points (x1, y1) such
that both x1, y1 ∈ Q.
It can be shown that such points (rational points) on C form a
subgroup under the same addition operation.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Order of a Point on Elliptic Curve
P is a point (x1, y1) on elliptic curve C with order m if
mP = P + P + · · · + P
m
= O (4)
such that m P = O for all integers 1 ≤ m < m.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Order of a Point on Elliptic Curve
P is a point (x1, y1) on elliptic curve C with order m if
mP = P + P + · · · + P
m
= O (4)
such that m P = O for all integers 1 ≤ m < m.
If no such m exists then P is of infinite order.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Points of Order 2
2P = O if and only if P = −P, i.e. y1 = −y1. So, y1 = 0.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Points of Order 2
2P = O if and only if P = −P, i.e. y1 = −y1. So, y1 = 0.
Number of rational points of order 2 depends on the number of
solutions of the equation f (x) = 0 in Q.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Points of Order 3
3P = O if and only if 2P = P.
From duplication formula,
x4
1 − 2bx2
1 − 8cx1 + b2 − 4ac
4x3
1 + 4ax2
1 + 4bx1 + 4c
= x1 (5)
So, x1 is a root of the equation
3X4 + 4aX3 + 6bX2 + 12cX + (4ac − b2) which is same as
2f (X)f (X) − f (X)
2
.
For each x1 we can get two distinct y1s. So, total there are 9
points in complex field of order 3 (including O).
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Points of Order 3
3P = O if and only if 2P = P.
From duplication formula,
x4
1 − 2bx2
1 − 8cx1 + b2 − 4ac
4x3
1 + 4ax2
1 + 4bx1 + 4c
= x1 (5)
So, x1 is a root of the equation
3X4 + 4aX3 + 6bX2 + 12cX + (4ac − b2) which is same as
2f (X)f (X) − f (X)
2
.
For each x1 we can get two distinct y1s. So, total there are 9
points in complex field of order 3 (including O).
These points are precisely all the inflection points i.e., the
points on the curve C, such that the tangent at that point has
multiplicity 3.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Nagell-Lutz Theorem
This theorem gives the overview of all the rational points that
can have finite order.
Theorem
(Nagell-Lutz) Let
Y 2
= f (X) = X3
+ aX2
+ bX + c (6)
be a non-singular cubic curve with integer coefficients a, b, c;
and let D be the discriminant of the cubic polynomial f (x),
D = −4a3
c + a2
b2
+ 18abc − 4b3
− 27c2
. (7)
Let P = (x, y) be a rational point of finite order. Then x and y
are integers; and either y = 0, or else y|D.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Nagell-Lutz Theorem
Nagell-Lutz theorem is not an if and only if
condition!
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Nagell-Lutz Theorem
Nagell-Lutz theorem is not an if and only if
condition!
To find whether a particular point on C has finite order or not,
we need to check all of its multiples to find the order. Mazur’s
theorem is a very strong result which makes our life easier.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Mazur’s Theorem
Theorem
Let C be a non-singular rational cubic curve, and suppose that
C(Q) contans a point of finite order m. Then either
1 ≤ m ≤ 10 or m = 12.
More precisely, the set of all points of finite order in C(Q)
forms a subgroup, which has one of the following two forms:
a) A cyclic group of order N with 1 ≤ N ≤ 10 or N = 12.
b) The product of a cyclic group of order two and a cyclic
group of order 2N with 1 ≤ N ≤ 4.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Example
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Mordell’s Theorem
Theorem
Let C be a non-singular cubic curve with rational coefficients
and has a rational point. Then the group of rational points
C(Q) is finitely generated.
This theorem tells us that starting from a single rational point
on an elliptic curve and using only the group laws (addition,
duplication, inversion) we can generate the whole set of
rational points.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Mordell’s Theorem
We define a map H : C −→ [0, ∞) such that
H(x, y) = max{|m|, |n|}
where, x = m
n in its irreducible form.
If x = 0, we define H(x, y) = 1. Also H(O) = 1.
We call this map “height”of a point.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Mordell’s Theorem
We define a map H : C −→ [0, ∞) such that
H(x, y) = max{|m|, |n|}
where, x = m
n in its irreducible form.
If x = 0, we define H(x, y) = 1. Also H(O) = 1.
We call this map “height”of a point.
Define “small height”h(x, y) = logH(x, y).
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Proof of Mordell’s Theorem
Theorem
(Descent’s Theorem) If Γ is a abelian group with a function
h : Γ −→ [0, ∞) such that
a) For every real number n, the set {P ∈ Γ : h(P) ≤ n} is finite.
b) For every P0 ∈ Γ, there is a constant k0 such that
h(P + P0) ≤ 2h(P) + k0 (8)
for every P ∈ Γ.
c) There is a constant k such that
h(2P) ≥ 4h(P) − k (9)
for all P ∈ Γ.
d) The subgroup 2Γ has finite index in Γ.
Then Γ is finitely generated.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Proof of Mordell’s Theorem
It can be proved explicitely that C(Q) and the map “little
height”h satisfy the above conditions.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Mordell’s Theorem
We have
C(Q) ∼= Z ⊕ Z ⊕ · · · ⊕ Z
r
⊕Zp1
d1 ⊕ Zp2
d2 ⊕ · · · ⊕ Zps
ds . (10)
r is called rank of Γ and the subgroup
Zp1
d1 ⊕ Zp2
d2 ⊕ · · · ⊕ Zps
ds correspondes to the elements of
finite order in C(Q).
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Example
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Basics of Cryptography
Cryptography is the study of message hiding. The basic model
of cryptography is
Figure : Adversarial model of cryptography
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Secure Systems
For most secure and robust system, we assume that the
adversary has considerable capabilites. He is able to read all
the data transmitted over the channel, has significant
computational resources and has complete descriptions of the
communications protocols and any cryptographic mechanisms
deployed (except for secret keying informations). The challenge
is to design a robust mechanism to secure the communication
from such powerful adversaries.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Public-Key Cryptography
It is a part of cryptography where each entity selects a pair of
keys, consisting of a public key, which is used for encryption
and a private key which is used for decryption. The keys have
the property that the actual plain text can not be computed
effeciently from the knowledge of only cipher text and the
public keys. Public-key cryptosystems rely on the hardness of
some very popular number theoretic problems. e.g.-
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Public-Key Cryptography
It is a part of cryptography where each entity selects a pair of
keys, consisting of a public key, which is used for encryption
and a private key which is used for decryption. The keys have
the property that the actual plain text can not be computed
effeciently from the knowledge of only cipher text and the
public keys. Public-key cryptosystems rely on the hardness of
some very popular number theoretic problems. e.g.-
RSA scheme is based on the intractibility of integer
factorization problem for semiprimes.
ECC schemes depends totally on the hardness of elliptic
curve discrete logarithm problem (ECDLP).
Merkle-Hellman knapsack cryptosystem is based on integer
knapsack problem (also called subset sum problem).
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
ECDLP
Definition
For a point P of order n and a point
Q ∈ {O, P, 2P, · · · , (n − 1)P} find the integer d ∈ [0, n − 1]
such that Q = dP.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
ElGamal Elliptic Curve Cryptographic System
Suppose we have an elliptic curve C defined over a finite field
Fq, where q is a large prime. C, q and a point P ∈ C with
large order n are publicly known. We first represent our
message m as a point M in C(Fq). When A wants to
communicate secretly with B, they proceed thus:
B choose a random integer b ∈ [0, n − 1] and publishes
the point bP as public key and keeps b to himself as the
private key.
A chooses a random integer a ∈ [0, n − 1] and publishes
the point aP. He then sends the pair (aP, M + a(bP)) to
B, where M + a(bP) is the ciphertext. A keeps his secret
key, a to himself.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
ElGamal Elliptic Curve Cryptographic System
To decrypt the message, B first calculates b(aP) using A’s
public key and B’s own private key. As C is an abelian
group, a(bP) = b(aP).
Now, B gets back the message from
M + a(bP) − b(aP) = M. From M, B gets back the
original message m by reversing the imbedding.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
ECDLP
Many protocols like - Elliptic Curve Integrated Encryption
Scheme, Elliptic Curve Digital Signature Algorithm are based
on the intractibility of ECDLP.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
ECDLP
Many protocols like - Elliptic Curve Integrated Encryption
Scheme, Elliptic Curve Digital Signature Algorithm are based
on the intractibility of ECDLP.
There are several algorithms such as Number field sieve,
Pohlig-Hellman algorithm, Pollard’s rho algorithm, Shor’s
algorithm solve this problem. But the best known algorithm so
far is of complexity O(
√
p), where p is the largest prime divisor
of n. But yet no one has been able to prove mathematically the
intractibility of ECDLP.
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
Acknoweledgement
1. http://en.wikipedia.org/wiki
2. https://www.nsa.gov/ia/programs/
suitebcryptography/index.shtml
Arithmetic of
Elliptic Curves
Ayan
Sengupta
Group
Structure of
Elliptic Curves
Rational
Points of
Finite Order
on Elliptic
Curve
Group of
Rational
Points on
Elliptic Curve
Application in
Cryptography
The End

More Related Content

What's hot

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherSHUBHA CHATURVEDI
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standardVasuki Ramasamy
 
Elliptic Curves in Cryptography
Elliptic Curves in CryptographyElliptic Curves in Cryptography
Elliptic Curves in CryptographyCSNP
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 

What's hot (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Hash Function
Hash Function Hash Function
Hash Function
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Key management
Key managementKey management
Key management
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Hash function
Hash function Hash function
Hash function
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Elliptic Curves in Cryptography
Elliptic Curves in CryptographyElliptic Curves in Cryptography
Elliptic Curves in Cryptography
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 

Similar to Elliptic Curve Cryptography: Arithmetic behind

Cryptography Baby Step Giant Step
Cryptography Baby Step Giant StepCryptography Baby Step Giant Step
Cryptography Baby Step Giant StepSAUVIK BISWAS
 
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRASYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRABRNSS Publication Hub
 
Graphs and eularian circuit & path with c++ program
Graphs and eularian circuit & path with c++ programGraphs and eularian circuit & path with c++ program
Graphs and eularian circuit & path with c++ programMuhammad Danish Badar
 
elliptic-curves-modern
elliptic-curves-modernelliptic-curves-modern
elliptic-curves-modernEric Seifert
 
Grovers Algorithm
Grovers Algorithm Grovers Algorithm
Grovers Algorithm CaseyHaaland
 
Mathematics compendium for class ix
Mathematics compendium for class ixMathematics compendium for class ix
Mathematics compendium for class ixAPEX INSTITUTE
 
High-dimensional polytopes defined by oracles: algorithms, computations and a...
High-dimensional polytopes defined by oracles: algorithms, computations and a...High-dimensional polytopes defined by oracles: algorithms, computations and a...
High-dimensional polytopes defined by oracles: algorithms, computations and a...Vissarion Fisikopoulos
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptographyinventy
 
2016--04-07-NCUR-JON (1)
2016--04-07-NCUR-JON (1)2016--04-07-NCUR-JON (1)
2016--04-07-NCUR-JON (1)Jon Scott
 
Efficient Edge-Skeleton Computation for Polytopes Defined by Oracles
Efficient Edge-Skeleton Computation for Polytopes Defined by OraclesEfficient Edge-Skeleton Computation for Polytopes Defined by Oracles
Efficient Edge-Skeleton Computation for Polytopes Defined by OraclesVissarion Fisikopoulos
 
Lesson 8: Determinants III
Lesson 8: Determinants IIILesson 8: Determinants III
Lesson 8: Determinants IIIMatthew Leingang
 
Pshs 3rd yr_functions_young_einstein
Pshs 3rd yr_functions_young_einsteinPshs 3rd yr_functions_young_einstein
Pshs 3rd yr_functions_young_einsteinRenee Tan
 
Pshs 3rd yr_functions
Pshs 3rd yr_functionsPshs 3rd yr_functions
Pshs 3rd yr_functionsRenee Tan
 
3.3 graphs of factorable polynomials and rational functions
3.3 graphs of factorable polynomials and rational functions3.3 graphs of factorable polynomials and rational functions
3.3 graphs of factorable polynomials and rational functionsmath265
 

Similar to Elliptic Curve Cryptography: Arithmetic behind (20)

Cryptography Baby Step Giant Step
Cryptography Baby Step Giant StepCryptography Baby Step Giant Step
Cryptography Baby Step Giant Step
 
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRASYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA
 
LPS talk notes
LPS talk notesLPS talk notes
LPS talk notes
 
Control chap7
Control chap7Control chap7
Control chap7
 
Graphs and eularian circuit & path with c++ program
Graphs and eularian circuit & path with c++ programGraphs and eularian circuit & path with c++ program
Graphs and eularian circuit & path with c++ program
 
Lec12
Lec12Lec12
Lec12
 
elliptic-curves-modern
elliptic-curves-modernelliptic-curves-modern
elliptic-curves-modern
 
Grovers Algorithm
Grovers Algorithm Grovers Algorithm
Grovers Algorithm
 
Mathematics compendium for class ix
Mathematics compendium for class ixMathematics compendium for class ix
Mathematics compendium for class ix
 
Unit 6.5
Unit 6.5Unit 6.5
Unit 6.5
 
High-dimensional polytopes defined by oracles: algorithms, computations and a...
High-dimensional polytopes defined by oracles: algorithms, computations and a...High-dimensional polytopes defined by oracles: algorithms, computations and a...
High-dimensional polytopes defined by oracles: algorithms, computations and a...
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptography
 
2016--04-07-NCUR-JON (1)
2016--04-07-NCUR-JON (1)2016--04-07-NCUR-JON (1)
2016--04-07-NCUR-JON (1)
 
Volume computation and applications
Volume computation and applications Volume computation and applications
Volume computation and applications
 
Efficient Edge-Skeleton Computation for Polytopes Defined by Oracles
Efficient Edge-Skeleton Computation for Polytopes Defined by OraclesEfficient Edge-Skeleton Computation for Polytopes Defined by Oracles
Efficient Edge-Skeleton Computation for Polytopes Defined by Oracles
 
Lesson 8: Determinants III
Lesson 8: Determinants IIILesson 8: Determinants III
Lesson 8: Determinants III
 
Pshs 3rd yr_functions_young_einstein
Pshs 3rd yr_functions_young_einsteinPshs 3rd yr_functions_young_einstein
Pshs 3rd yr_functions_young_einstein
 
Pshs 3rd yr_functions
Pshs 3rd yr_functionsPshs 3rd yr_functions
Pshs 3rd yr_functions
 
3.3 graphs of factorable polynomials and rational functions
3.3 graphs of factorable polynomials and rational functions3.3 graphs of factorable polynomials and rational functions
3.3 graphs of factorable polynomials and rational functions
 
COORDINATE GEOMETRY II
COORDINATE GEOMETRY IICOORDINATE GEOMETRY II
COORDINATE GEOMETRY II
 

More from Ayan Sengupta

Pricing of Apple iPhone
Pricing of Apple iPhonePricing of Apple iPhone
Pricing of Apple iPhoneAyan Sengupta
 
Applications of Machine Learning in High Frequency Trading
Applications of Machine Learning in High Frequency TradingApplications of Machine Learning in High Frequency Trading
Applications of Machine Learning in High Frequency TradingAyan Sengupta
 
Case Study on Housing.com
Case Study on Housing.comCase Study on Housing.com
Case Study on Housing.comAyan Sengupta
 
Cab travel time prediction using ensemble models
Cab travel time prediction using ensemble modelsCab travel time prediction using ensemble models
Cab travel time prediction using ensemble modelsAyan Sengupta
 
Nike Stock Pitch: Analysis and Valuation
Nike Stock Pitch: Analysis and ValuationNike Stock Pitch: Analysis and Valuation
Nike Stock Pitch: Analysis and ValuationAyan Sengupta
 
2-Approximation Algorithm of Semi-Matching Problem
2-Approximation Algorithm of Semi-Matching Problem2-Approximation Algorithm of Semi-Matching Problem
2-Approximation Algorithm of Semi-Matching ProblemAyan Sengupta
 
Existence and Uniqueness of Algebraic Closure
Existence and Uniqueness of Algebraic ClosureExistence and Uniqueness of Algebraic Closure
Existence and Uniqueness of Algebraic ClosureAyan Sengupta
 

More from Ayan Sengupta (7)

Pricing of Apple iPhone
Pricing of Apple iPhonePricing of Apple iPhone
Pricing of Apple iPhone
 
Applications of Machine Learning in High Frequency Trading
Applications of Machine Learning in High Frequency TradingApplications of Machine Learning in High Frequency Trading
Applications of Machine Learning in High Frequency Trading
 
Case Study on Housing.com
Case Study on Housing.comCase Study on Housing.com
Case Study on Housing.com
 
Cab travel time prediction using ensemble models
Cab travel time prediction using ensemble modelsCab travel time prediction using ensemble models
Cab travel time prediction using ensemble models
 
Nike Stock Pitch: Analysis and Valuation
Nike Stock Pitch: Analysis and ValuationNike Stock Pitch: Analysis and Valuation
Nike Stock Pitch: Analysis and Valuation
 
2-Approximation Algorithm of Semi-Matching Problem
2-Approximation Algorithm of Semi-Matching Problem2-Approximation Algorithm of Semi-Matching Problem
2-Approximation Algorithm of Semi-Matching Problem
 
Existence and Uniqueness of Algebraic Closure
Existence and Uniqueness of Algebraic ClosureExistence and Uniqueness of Algebraic Closure
Existence and Uniqueness of Algebraic Closure
 

Recently uploaded

User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationColumbia Weather Systems
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfWildaNurAmalia2
 
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》rnrncn29
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingNetHelix
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxJorenAcuavera1
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...Universidade Federal de Sergipe - UFS
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naJASISJULIANOELYNV
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologycaarthichand2003
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPirithiRaju
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuinethapagita
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPirithiRaju
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxBerniceCayabyab1
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxNandakishor Bhaurao Deshmukh
 

Recently uploaded (20)

User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather Station
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
 
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptx
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by na
 
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort ServiceHot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technology
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
 

Elliptic Curve Cryptography: Arithmetic behind

  • 1. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Arithmetic of Elliptic Curves Ayan Sengupta May 5, 2015
  • 2. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Overview 1 Group Structure of Elliptic Curves 2 Rational Points of Finite Order on Elliptic Curve 3 Group of Rational Points on Elliptic Curve 4 Application in Cryptography
  • 3. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Motivation Very important concept and major area of current research in Number Theory. Andrew Wiles used in his famour proof of Fermat’s last theorem. They are vividly used in many algorithms: - Lenstra elliptic curve factorization. - Elliptic curve primality testing. Elliptic curve cryptography (ECC) is based on the elliptic curve discrete logarithm problem.
  • 4. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography What is Elliptic Curve ? An algebraic curve of the form Y 2 = X3 + aX2 + bX + c (1) where a, b, c ∈ K, field (most popular are Q, Fp), such that f (X) = X3 + aX2 + bX + c has no repeated root in C. We also assume a point at infinity O included in elliptic curve, that is the point where the vertical lines in XY -plane meet.
  • 5. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography What is Elliptic Curve ? An algebraic curve of the form Y 2 = X3 + aX2 + bX + c (1) where a, b, c ∈ K, field (most popular are Q, Fp), such that f (X) = X3 + aX2 + bX + c has no repeated root in C. We also assume a point at infinity O included in elliptic curve, that is the point where the vertical lines in XY -plane meet. (a) One real root of f (X) (b) Three real roots of f (X)
  • 6. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography What is Elliptic Curve ? A smooth, projective algebraic curve of genus one with a pre-assumed point O. It is nothing related to ellipses!
  • 7. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Group Structure of Elliptic Curves Figure : Addition operation on elliptic curve Explicitely, x3 = λ2 − a − x1 − x2 (2) y3 = λx3 + ν (3) where, λ and ν are respectively the slope and intercept of the line joining P1, P2.
  • 8. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Group Structure of Elliptic Curves Figure : Doubling a point x3 = x4 1 −2bx2 1 −8cx1+b2−4ac 4x3 1 +4ax2 1 +4bx1+4c (duplication formula)
  • 9. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Group Structure of Elliptic Curves Figure : Inverse of a point
  • 10. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Group Structure of Elliptic Curves Using Nine intersection theorem, associativity can be proved.
  • 11. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Group Structure of Elliptic Curves Points on an elliptic curve form an abelian group under the above mentioned addition operation.
  • 12. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Group Structure of Elliptic Curves Concentrate on elliptic curve C over Q and points (x1, y1) such that both x1, y1 ∈ Q. It can be shown that such points (rational points) on C form a subgroup under the same addition operation.
  • 13. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Order of a Point on Elliptic Curve P is a point (x1, y1) on elliptic curve C with order m if mP = P + P + · · · + P m = O (4) such that m P = O for all integers 1 ≤ m < m.
  • 14. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Order of a Point on Elliptic Curve P is a point (x1, y1) on elliptic curve C with order m if mP = P + P + · · · + P m = O (4) such that m P = O for all integers 1 ≤ m < m. If no such m exists then P is of infinite order.
  • 15. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Points of Order 2 2P = O if and only if P = −P, i.e. y1 = −y1. So, y1 = 0.
  • 16. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Points of Order 2 2P = O if and only if P = −P, i.e. y1 = −y1. So, y1 = 0. Number of rational points of order 2 depends on the number of solutions of the equation f (x) = 0 in Q.
  • 17. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Points of Order 3 3P = O if and only if 2P = P. From duplication formula, x4 1 − 2bx2 1 − 8cx1 + b2 − 4ac 4x3 1 + 4ax2 1 + 4bx1 + 4c = x1 (5) So, x1 is a root of the equation 3X4 + 4aX3 + 6bX2 + 12cX + (4ac − b2) which is same as 2f (X)f (X) − f (X) 2 . For each x1 we can get two distinct y1s. So, total there are 9 points in complex field of order 3 (including O).
  • 18. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Points of Order 3 3P = O if and only if 2P = P. From duplication formula, x4 1 − 2bx2 1 − 8cx1 + b2 − 4ac 4x3 1 + 4ax2 1 + 4bx1 + 4c = x1 (5) So, x1 is a root of the equation 3X4 + 4aX3 + 6bX2 + 12cX + (4ac − b2) which is same as 2f (X)f (X) − f (X) 2 . For each x1 we can get two distinct y1s. So, total there are 9 points in complex field of order 3 (including O). These points are precisely all the inflection points i.e., the points on the curve C, such that the tangent at that point has multiplicity 3.
  • 19. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Nagell-Lutz Theorem This theorem gives the overview of all the rational points that can have finite order. Theorem (Nagell-Lutz) Let Y 2 = f (X) = X3 + aX2 + bX + c (6) be a non-singular cubic curve with integer coefficients a, b, c; and let D be the discriminant of the cubic polynomial f (x), D = −4a3 c + a2 b2 + 18abc − 4b3 − 27c2 . (7) Let P = (x, y) be a rational point of finite order. Then x and y are integers; and either y = 0, or else y|D.
  • 20. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Nagell-Lutz Theorem Nagell-Lutz theorem is not an if and only if condition!
  • 21. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Nagell-Lutz Theorem Nagell-Lutz theorem is not an if and only if condition! To find whether a particular point on C has finite order or not, we need to check all of its multiples to find the order. Mazur’s theorem is a very strong result which makes our life easier.
  • 22. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Mazur’s Theorem Theorem Let C be a non-singular rational cubic curve, and suppose that C(Q) contans a point of finite order m. Then either 1 ≤ m ≤ 10 or m = 12. More precisely, the set of all points of finite order in C(Q) forms a subgroup, which has one of the following two forms: a) A cyclic group of order N with 1 ≤ N ≤ 10 or N = 12. b) The product of a cyclic group of order two and a cyclic group of order 2N with 1 ≤ N ≤ 4.
  • 23. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Example
  • 24. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Mordell’s Theorem Theorem Let C be a non-singular cubic curve with rational coefficients and has a rational point. Then the group of rational points C(Q) is finitely generated. This theorem tells us that starting from a single rational point on an elliptic curve and using only the group laws (addition, duplication, inversion) we can generate the whole set of rational points.
  • 25. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Mordell’s Theorem We define a map H : C −→ [0, ∞) such that H(x, y) = max{|m|, |n|} where, x = m n in its irreducible form. If x = 0, we define H(x, y) = 1. Also H(O) = 1. We call this map “height”of a point.
  • 26. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Mordell’s Theorem We define a map H : C −→ [0, ∞) such that H(x, y) = max{|m|, |n|} where, x = m n in its irreducible form. If x = 0, we define H(x, y) = 1. Also H(O) = 1. We call this map “height”of a point. Define “small height”h(x, y) = logH(x, y).
  • 27. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Proof of Mordell’s Theorem Theorem (Descent’s Theorem) If Γ is a abelian group with a function h : Γ −→ [0, ∞) such that a) For every real number n, the set {P ∈ Γ : h(P) ≤ n} is finite. b) For every P0 ∈ Γ, there is a constant k0 such that h(P + P0) ≤ 2h(P) + k0 (8) for every P ∈ Γ. c) There is a constant k such that h(2P) ≥ 4h(P) − k (9) for all P ∈ Γ. d) The subgroup 2Γ has finite index in Γ. Then Γ is finitely generated.
  • 28. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Proof of Mordell’s Theorem It can be proved explicitely that C(Q) and the map “little height”h satisfy the above conditions.
  • 29. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Mordell’s Theorem We have C(Q) ∼= Z ⊕ Z ⊕ · · · ⊕ Z r ⊕Zp1 d1 ⊕ Zp2 d2 ⊕ · · · ⊕ Zps ds . (10) r is called rank of Γ and the subgroup Zp1 d1 ⊕ Zp2 d2 ⊕ · · · ⊕ Zps ds correspondes to the elements of finite order in C(Q).
  • 30. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Example
  • 31. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Basics of Cryptography Cryptography is the study of message hiding. The basic model of cryptography is Figure : Adversarial model of cryptography
  • 32. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Secure Systems For most secure and robust system, we assume that the adversary has considerable capabilites. He is able to read all the data transmitted over the channel, has significant computational resources and has complete descriptions of the communications protocols and any cryptographic mechanisms deployed (except for secret keying informations). The challenge is to design a robust mechanism to secure the communication from such powerful adversaries.
  • 33. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Public-Key Cryptography It is a part of cryptography where each entity selects a pair of keys, consisting of a public key, which is used for encryption and a private key which is used for decryption. The keys have the property that the actual plain text can not be computed effeciently from the knowledge of only cipher text and the public keys. Public-key cryptosystems rely on the hardness of some very popular number theoretic problems. e.g.-
  • 34. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Public-Key Cryptography It is a part of cryptography where each entity selects a pair of keys, consisting of a public key, which is used for encryption and a private key which is used for decryption. The keys have the property that the actual plain text can not be computed effeciently from the knowledge of only cipher text and the public keys. Public-key cryptosystems rely on the hardness of some very popular number theoretic problems. e.g.- RSA scheme is based on the intractibility of integer factorization problem for semiprimes. ECC schemes depends totally on the hardness of elliptic curve discrete logarithm problem (ECDLP). Merkle-Hellman knapsack cryptosystem is based on integer knapsack problem (also called subset sum problem).
  • 35. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography ECDLP Definition For a point P of order n and a point Q ∈ {O, P, 2P, · · · , (n − 1)P} find the integer d ∈ [0, n − 1] such that Q = dP.
  • 36. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography ElGamal Elliptic Curve Cryptographic System Suppose we have an elliptic curve C defined over a finite field Fq, where q is a large prime. C, q and a point P ∈ C with large order n are publicly known. We first represent our message m as a point M in C(Fq). When A wants to communicate secretly with B, they proceed thus: B choose a random integer b ∈ [0, n − 1] and publishes the point bP as public key and keeps b to himself as the private key. A chooses a random integer a ∈ [0, n − 1] and publishes the point aP. He then sends the pair (aP, M + a(bP)) to B, where M + a(bP) is the ciphertext. A keeps his secret key, a to himself.
  • 37. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography ElGamal Elliptic Curve Cryptographic System To decrypt the message, B first calculates b(aP) using A’s public key and B’s own private key. As C is an abelian group, a(bP) = b(aP). Now, B gets back the message from M + a(bP) − b(aP) = M. From M, B gets back the original message m by reversing the imbedding.
  • 38. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography ECDLP Many protocols like - Elliptic Curve Integrated Encryption Scheme, Elliptic Curve Digital Signature Algorithm are based on the intractibility of ECDLP.
  • 39. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography ECDLP Many protocols like - Elliptic Curve Integrated Encryption Scheme, Elliptic Curve Digital Signature Algorithm are based on the intractibility of ECDLP. There are several algorithms such as Number field sieve, Pohlig-Hellman algorithm, Pollard’s rho algorithm, Shor’s algorithm solve this problem. But the best known algorithm so far is of complexity O( √ p), where p is the largest prime divisor of n. But yet no one has been able to prove mathematically the intractibility of ECDLP.
  • 40. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography
  • 41. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography Acknoweledgement 1. http://en.wikipedia.org/wiki 2. https://www.nsa.gov/ia/programs/ suitebcryptography/index.shtml
  • 42. Arithmetic of Elliptic Curves Ayan Sengupta Group Structure of Elliptic Curves Rational Points of Finite Order on Elliptic Curve Group of Rational Points on Elliptic Curve Application in Cryptography The End