SlideShare a Scribd company logo
1 of 62
Mathematics Towards Elliptic Curve Cryptography by Dr. R. Srinivasan Dean R & D and Post Graduate Studies RNS Institute of Technology, Bangalore Comp Sc. Dept, Mysore  10.9..2011
Cryptography Definitions 1 .  Cryptography  (or  cryptology ; from Greek κρυπτός,  kryptos ,  "hidden, secret "; and  γράφειν ,  graphein ,  "writing",  or  -λογία ,  -logia , "study", respectively) [1]  is the  practice  and study of  hiding information . Modern cryptography  intersects  the disciplines of  mathematics, computer science , and  electrical engineering .  2 .  Cryptography  is the  science of information security . The word is derived from the Greek  kryptos , meaning hidden. Cryptography is closely related to the disciplines of cryptology and cryptanalysis      3.  Discipline or techniques  employed in  protecting integrity or secrecy  of electronic messages by  converting  them into  unreadable  (cipher text) form. Only the use of a  secret key  can convert the cipher text back into human readable (clear text) form.  Cryptography software and/or hardware devices use  mathematical formulas  (algorithms) to change text from one form to another. Source: Internet
Evolution of Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hieroglyphs Hieroglyphs  showing the words for Father, Mother, Son,  Egyptian Hieroglyphs for Kids ! Source:  Internet
Zimmermann’s Telegram – January 16, 1917 The message came as a  coded telegram  dispatched by the  Foreign Secretary of the German Empire,  ARTHUR ZIMMERMANN, on January 16, 1917, to the German ambassador in Washington D.C., Johann von Bernstorff, at the height ofWorld War I. On January 19, Bernstorff, per Zimmermann's request, forwarded the telegram to the German ambassador in Mexico, Heinrich von Eckardt.  Source: Internet
Source: Internet
Hopes and Assumptions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples – bad and terrifying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study – an intelligent Hacker ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptography RS-RNSIT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RS-RNSIT Whitfield Diffie Martin Hellman Pioneers of Public – Key Cryptography
The Algorithms RS-RNSIT ,[object Object],[object Object],[object Object],[object Object],[object Object]
Three Important Points to Note ,[object Object],[object Object],[object Object],[object Object],[object Object]
Large Key Size RS-RNSIT Y = KX ,  Y- encrypted message of Plain Text Message “x” with Key K X = K -1 Y  – Inverse operation must be difficult –  larger the key more   difficult
One-Way Functions ,[object Object],[object Object],[object Object],[object Object],October 1, 2011 Practical Aspects of Modern Cryptography
The Fundamental Equation ,[object Object],[object Object],October 1, 2011 Practical Aspects of Modern Cryptography
The Fundamental Equation ,[object Object],[object Object],October 1, 2011 Practical Aspects of Modern Cryptography
The Fundamental Equation ,[object Object],[object Object],October 1, 2011 Practical Aspects of Modern Cryptography
Diffie-Hellman Key Exchange ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],October 1, 2011 Practical Aspects of Modern Cryptography B a  = Y ba  = Y ab  = A b
Diffie-Hellman Key Exchange ,[object Object],[object Object],[object Object],[object Object],[object Object],October 1, 2011 Practical Aspects of Modern Cryptography
Three Mathematical Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Three Mathematical Problems(contd.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Problems with RSA & DH ,[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Using Elliptic Curves In Cryptography ,[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Diffie-Hellman Vs ECC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Evolution of Elliptic curves- Cubic Equations RS-RNSIT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
If  p≠2  Weierstrass equation can be simplified by transformation to get the equation for some constants  d,e,f  and if  p≠3  by transformation to get equation ELIPTIC CURVES - GENERALITY An elliptic curve over  where  p  is a prime is the set of points  (x,y)  satisfying so-called Weierstrass equation for some constants  u,v,a,b,c  together with a single element  0 , called the point of infinity.
Typical Elliptic Curves ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Prime Elliptic Curves ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Real Elliptic Curve Examples RS-RNSIT a = - 4 and b = 0.7
Three Mathematical Problems (contd)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Example of an Elliptic Curve Group over Fp ,[object Object],[object Object],RS-RNSIT
Example of an Elliptic Curve Group over Fp (contd.) ,[object Object],RS-RNSIT
Example of an Elliptic Curve Group over Fp (contd.) RS-RNSIT
Elliptic Curve Groups over F 2 n  (contd.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Finite fields of the form  GF 2 n  (contd.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Finite fields of the form  GF 2 n  (contd.) RS-RNSIT n      {113, 131, 163, 193, 233, 239, 283, 409, 571} Ref: Secg-talk@lists.certicom.com Field  Reduction Polynomials F 2 113 f(x) = x 113  + x 9  + 1 F 2 131 f(x) = x 131  + x 8  + x 3  + x 2  + 1 F 2 163 f(x) = x 163  + x 7  + x 6  + x 3  +1 F 2 193 f(x) = x 193  + x 15  + 1 F 2 233 f(x) = x 233  + x 74  + 1 F 2 239 f(x) = x 239  + x 36  + 1 F 2 283 f(x) = x 283  + x 12  + x 7  + x 5  +1 F 2 409 f(x) = x 409  + x 87  + 1
Elliptic Curve Groups over F 2 n   RS-RNSIT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Elliptic Curve Groups over F 2 n  (contd.) RS-RNSIT Ex. g 5   = (g 4 )(g) = (g+1)g = g 2  + g = 0110 g 6  = g 4 .g 2  = (g+1)g 2  = g 3 +g 2  = 1100 g0 = 0001 g4 = 0011 g8 = 0101 g12 = 1111 g1 = 0010 g5 = 0110 g9 = 1010 g13 = 1101 g2 = 0100 g6 = 1100 g10 = 0111 g14 = 1001 g3 = 1000 g7 = 1011 g11 = 1110 g15 = 0001
Elliptic Curve Groups over F 2 n  (contd.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Elliptic Curve Groups over F 2 n  (contd.) RS-RNSIT
Adding Points P + Q on E -   - P Q P+Q R
Doubling a Point P on E -   - P 2*P R Tangent Line to E at P
Vertical Lines and an Extra Point at Infinity Add an extra point  O  “at infinity.” The point  O  lies on every vertical line. -   - Vertical lines have no third intersection point Q O P Q = –P
Properties of “Addition” on E ,[object Object],[object Object],[object Object],[object Object],[object Object],In other words, the addition law + makes the points of E into a  commutative group . All of the group properties are trivial to check  except  for the associative law (c). The associative law can be verified by a lengthy computation using explicit formulas, or by using more advanced algebraic or analytic methods. -   -
A Numerical Example Using the tangent line construction, we find that 2P = P + P = (-7/4, -27/8). Using the secant line construction, we find that 3P = P + P + P = (553/121, -11950/1331) Similarly,  4P = (45313/11664, 8655103/1259712). As you can see, the coordinates become complicated. -   - E : Y 2  = X 3  – 5X + 8 The point  P = (1,2)  is on the curve E.
Algebraic Description of Addition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Algebraic Description of Addition  (contd.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ECC Diffie-Hellman ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
ECC Encryption/Decryption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Mapping Messages into Points of Elliptic Curves ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mapping Messages into Points of Elliptic Curves (2) ,[object Object],[object Object],[object Object],[object Object]
RS-RNSIT Elliptic Curve Digital Signature Algorithm (ECDSA) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RS-RNSIT Elliptic Curve Digital Signature Algorithm (ECDSA) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RS-RNSIT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Elliptic Curve Authenticated Encryption Scheme (ECAES)
RS-RNSIT Elliptic Curve Authenticated Encryption Scheme (ECAES) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why use ECC? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RS-RNSIT
Advantages of ECC Hence, ECC offers equivalent security with much small key size. Practical advantages of ECC : 1 Faster 2 Low power consumption 3 Low memory usage 4 Low CPU utilization 5 Benefits of over its competitors increases with increase in the security needs.
Key References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RS-RNSIT Key References ,[object Object],[object Object],[object Object],[object Object],[object Object]
RS-RNSIT Additional References : ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RS-RNSIT Thank You !

More Related Content

What's hot

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms WorkCheapSSLsecurity
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptographyBarani Tharan
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1RAMESHBABU311293
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption TechniqueJohn Adams
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computingVajira Thambawita
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 

What's hot (20)

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption Technique
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computing
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 

Viewers also liked

Elliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of mathsElliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of mathsMartijn Grooten
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindAyan Sengupta
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofArunanand Ta
 
TOR - The Onion Router
TOR - The Onion Router TOR - The Onion Router
TOR - The Onion Router Marcello Viti
 
Information Cryptography Security
Information Cryptography SecurityInformation Cryptography Security
Information Cryptography SecurityAchmad Solichin
 
Introduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve CryptographyIntroduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve CryptographyDavid Evans
 
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer SystemsPatterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer SystemsMarcel Winandy
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyKelly Bresnahan
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasJames McGivern
 
(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms OverviewEL Bachir Nouni
 
JTAG Interface (Intro)
JTAG Interface (Intro)JTAG Interface (Intro)
JTAG Interface (Intro)Nitesh Bhatia
 
Mã hóa đường cong Elliptic
Mã hóa đường cong EllipticMã hóa đường cong Elliptic
Mã hóa đường cong EllipticLE Ngoc Luyen
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion routerAshly Liza
 
SFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEESFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEELinaro
 
HKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting ReviewHKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting ReviewLinaro
 
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3Linaro
 
Genetic Algorithms Made Easy
Genetic Algorithms Made EasyGenetic Algorithms Made Easy
Genetic Algorithms Made EasyPrakash Pimpale
 
Introduction to VLSI
Introduction to VLSI Introduction to VLSI
Introduction to VLSI illpa
 

Viewers also liked (20)

Elliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of mathsElliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of maths
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behind
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
 
TOR - The Onion Router
TOR - The Onion Router TOR - The Onion Router
TOR - The Onion Router
 
Information Cryptography Security
Information Cryptography SecurityInformation Cryptography Security
Information Cryptography Security
 
Introduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve CryptographyIntroduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve Cryptography
 
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer SystemsPatterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-Ninjas
 
(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview
 
JTAG Interface (Intro)
JTAG Interface (Intro)JTAG Interface (Intro)
JTAG Interface (Intro)
 
Mã hóa đường cong Elliptic
Mã hóa đường cong EllipticMã hóa đường cong Elliptic
Mã hóa đường cong Elliptic
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
SFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEESFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEE
 
HKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting ReviewHKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting Review
 
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
 
Genetic Algorithms Made Easy
Genetic Algorithms Made EasyGenetic Algorithms Made Easy
Genetic Algorithms Made Easy
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Introduction to VLSI
Introduction to VLSI Introduction to VLSI
Introduction to VLSI
 

Similar to Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan

Security Systems for Digital Data
Security Systems for Digital DataSecurity Systems for Digital Data
Security Systems for Digital DataBernhard Hofer
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAadya Vatsa
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practiceFraboni Ec
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practiceLuis Goldster
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practiceJames Wong
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practiceTony Nguyen
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practiceDavid Hoen
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practiceHarry Potter
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practiceYoung Alista
 
Evolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptographyEvolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptographyjiricejka
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAbhishek Nand
 
cryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptcryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptJohnree4
 
sabith.pptx
sabith.pptxsabith.pptx
sabith.pptxsabith15
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYijcisjournal
 

Similar to Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan (20)

Security Systems for Digital Data
Security Systems for Digital DataSecurity Systems for Digital Data
Security Systems for Digital Data
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practice
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practice
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practice
 
Evolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptographyEvolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptography
 
Itt project
Itt projectItt project
Itt project
 
Fv3111451146
Fv3111451146Fv3111451146
Fv3111451146
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
cryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptcryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.ppt
 
sabith.pptx
sabith.pptxsabith.pptx
sabith.pptx
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
MAT255_Final_Paper_RSA_Encryption
MAT255_Final_Paper_RSA_EncryptionMAT255_Final_Paper_RSA_Encryption
MAT255_Final_Paper_RSA_Encryption
 
Edward Schaefer
Edward SchaeferEdward Schaefer
Edward Schaefer
 

Recently uploaded

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan

  • 1. Mathematics Towards Elliptic Curve Cryptography by Dr. R. Srinivasan Dean R & D and Post Graduate Studies RNS Institute of Technology, Bangalore Comp Sc. Dept, Mysore 10.9..2011
  • 2. Cryptography Definitions 1 . Cryptography (or cryptology ; from Greek κρυπτός, kryptos , "hidden, secret "; and γράφειν , graphein , "writing", or -λογία , -logia , "study", respectively) [1] is the practice and study of hiding information . Modern cryptography intersects the disciplines of mathematics, computer science , and electrical engineering . 2 . Cryptography is the science of information security . The word is derived from the Greek kryptos , meaning hidden. Cryptography is closely related to the disciplines of cryptology and cryptanalysis    3. Discipline or techniques employed in protecting integrity or secrecy of electronic messages by converting them into unreadable (cipher text) form. Only the use of a secret key can convert the cipher text back into human readable (clear text) form. Cryptography software and/or hardware devices use mathematical formulas (algorithms) to change text from one form to another. Source: Internet
  • 3.
  • 4. Hieroglyphs Hieroglyphs showing the words for Father, Mother, Son, Egyptian Hieroglyphs for Kids ! Source: Internet
  • 5. Zimmermann’s Telegram – January 16, 1917 The message came as a coded telegram dispatched by the Foreign Secretary of the German Empire, ARTHUR ZIMMERMANN, on January 16, 1917, to the German ambassador in Washington D.C., Johann von Bernstorff, at the height ofWorld War I. On January 19, Bernstorff, per Zimmermann's request, forwarded the telegram to the German ambassador in Mexico, Heinrich von Eckardt. Source: Internet
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. RS-RNSIT Whitfield Diffie Martin Hellman Pioneers of Public – Key Cryptography
  • 12.
  • 13.
  • 14. Large Key Size RS-RNSIT Y = KX , Y- encrypted message of Plain Text Message “x” with Key K X = K -1 Y – Inverse operation must be difficult – larger the key more difficult
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. If p≠2 Weierstrass equation can be simplified by transformation to get the equation for some constants d,e,f and if p≠3 by transformation to get equation ELIPTIC CURVES - GENERALITY An elliptic curve over where p is a prime is the set of points (x,y) satisfying so-called Weierstrass equation for some constants u,v,a,b,c together with a single element 0 , called the point of infinity.
  • 28.
  • 29.
  • 30. Real Elliptic Curve Examples RS-RNSIT a = - 4 and b = 0.7
  • 31.
  • 32.
  • 33.
  • 34. Example of an Elliptic Curve Group over Fp (contd.) RS-RNSIT
  • 35.
  • 36.
  • 37. Finite fields of the form GF 2 n (contd.) RS-RNSIT n  {113, 131, 163, 193, 233, 239, 283, 409, 571} Ref: Secg-talk@lists.certicom.com Field Reduction Polynomials F 2 113 f(x) = x 113 + x 9 + 1 F 2 131 f(x) = x 131 + x 8 + x 3 + x 2 + 1 F 2 163 f(x) = x 163 + x 7 + x 6 + x 3 +1 F 2 193 f(x) = x 193 + x 15 + 1 F 2 233 f(x) = x 233 + x 74 + 1 F 2 239 f(x) = x 239 + x 36 + 1 F 2 283 f(x) = x 283 + x 12 + x 7 + x 5 +1 F 2 409 f(x) = x 409 + x 87 + 1
  • 38.
  • 39. Elliptic Curve Groups over F 2 n (contd.) RS-RNSIT Ex. g 5 = (g 4 )(g) = (g+1)g = g 2 + g = 0110 g 6 = g 4 .g 2 = (g+1)g 2 = g 3 +g 2 = 1100 g0 = 0001 g4 = 0011 g8 = 0101 g12 = 1111 g1 = 0010 g5 = 0110 g9 = 1010 g13 = 1101 g2 = 0100 g6 = 1100 g10 = 0111 g14 = 1001 g3 = 1000 g7 = 1011 g11 = 1110 g15 = 0001
  • 40.
  • 41. Elliptic Curve Groups over F 2 n (contd.) RS-RNSIT
  • 42. Adding Points P + Q on E - - P Q P+Q R
  • 43. Doubling a Point P on E - - P 2*P R Tangent Line to E at P
  • 44. Vertical Lines and an Extra Point at Infinity Add an extra point O “at infinity.” The point O lies on every vertical line. - - Vertical lines have no third intersection point Q O P Q = –P
  • 45.
  • 46. A Numerical Example Using the tangent line construction, we find that 2P = P + P = (-7/4, -27/8). Using the secant line construction, we find that 3P = P + P + P = (553/121, -11950/1331) Similarly, 4P = (45313/11664, 8655103/1259712). As you can see, the coordinates become complicated. - - E : Y 2 = X 3 – 5X + 8 The point P = (1,2) is on the curve E.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58. Advantages of ECC Hence, ECC offers equivalent security with much small key size. Practical advantages of ECC : 1 Faster 2 Low power consumption 3 Low memory usage 4 Low CPU utilization 5 Benefits of over its competitors increases with increase in the security needs.
  • 59.
  • 60.
  • 61.

Editor's Notes

  1. See text for detailed rules of addition and relation to zero point O. Can derive an algebraic interpretation of addition, based on computing gradient of tangent and then solving for intersection with curve. This is what is used in practice.
  2. This is an analog of the ElGamal public-key encryption algorithm. Note that the ciphertext is a pair of points on the elliptic curve. The sender masks the message using random k, but also sends along a “clue” allowing the receiver who know the private-key to recover k and hence the message.