SlideShare a Scribd company logo
1 of 4
Task 1: (2 points)
In your own words, explain how ECC works. Use at least one diagram
which is your own drawing. Explain the discrete log problem (DLP) in
ECC. Explain the differences of the DLP in ECC to the large integer
factorization problem in RSA. (Minimum 3 pages).
Working of ECC:
Elliptic curve cryptography (ECC) is a public key encryption technology that uses elliptic curve theory to
generate quicker, smaller, and more efficient cryptographic keys. Instead of the traditional approach of
generating keys as the product of extremely large prime numbers, ECC produces keys using the features
of the elliptic curve equation.
Most public key encryption methods, such as RSA and Diffie-Hellman, can be utilized in combination
with this technology. Some researchers believe that ECC can offer the same level of security with a 164-
bit key that other systems require with a 1,024-bit key. Because ECC allows for equal security while
consuming less computer resources and battery capacity, it is increasingly being employed in mobile
applications.
An elliptic curve is a collection of points that satisfy a mathematical equation. The equation for an elliptic
curve is y2=x3+ax+b. Elliptic Curve Cryptography (ECC) is not capable of encrypting data. ECC may be
used to negotiate keys for symmetric encryption using Elliptic Curve Diffie-Hellman key exchange, as
well as for digital signatures.
ECC operates on an elliptic curve over a finite field, which is a set of discrete points in 2D space rather
than a smooth line. These points have several intriguing qualities, such as the ability to add them in a
certain way, with the result being another point from the curve, or rather from the collection of discrete
points that is the elliptic curve over finite field.
This is how an elliptic curve may look over real numbers:
This is how it may look over a finite field - just a set of points:
When you deal with ordinary numbers and start adding 3 to itself, you get 6, 9, 12, 15... And so on. If I
told you that I added 3 to itself an unknown number of times and the result is 30, you'd quickly realize
that the unknown number is 10... Since 10 * 3 = 30.
If you deal with a set of points that is an elliptic curve over a finite field and conduct that specific addition
operation and add a point to itself an indefinite number of times, you will eventually arrive at some point.
But, unlike conventional numbers, it is now nearly difficult for anyone to determine how many times you
performed that addition when you tell them where you started and where you ended up - only you know
that.
ECDSA - elliptic curve digital signature algorithm - makes use of this characteristic. It cannot directly
encrypt data, but it may be used to demonstrate your knowledge of the secret - the number of times you
completed the particular elliptic curve addition. You can digitally sign a communication to establish that
it came from you and could not have been falsified by someone else.
Discrete log problem (DLP) in ECC:
Public key cryptography and key exchange protocols are frequently based on functions that are simple to
compute but difficult to reverse. The goal is to employ such a function to generate a shared secret or
another value that may be used in encryption.
In the Diffie-Hellman key exchange protocol, for example, the two sides publicly agree on a pair of
integers, g,p, such that p is prime. They next each choose a number a,b that the other side does not know.
One sends ga, while the other sends gb (all numbers modulo p ). Gabmodp may now be calculated by both
parties as a shared secret.
Given g,a,p, it is simple to compute c=gamodp. It is difficult to compute a given c,g,p. The "discrete
logarithm problem" is the challenge of determining the exponent. Nobody knows how to accomplish it
quickly.
The discrete logarithm problem in ECC is based on the assumption that all points on an elliptic curve form
a cyclic group under specific circumstances. The public key on an elliptic curve is a random multiple of
the generator point, whereas the private key is a randomly determined integer used to produce the multiple.
In other words, a private key is an integer picked at random, and a public key is a point on the curve. The
discrete logarithm problem is used to discover the private key (an integer) that lies between all points on
the elliptic curve. A subsequent equation demonstrates this accurately. Consider the following elliptic
curve E, which has two constituents P and T.
The discrete logarithmic problem is to find the integer d, where 1 <= d <= #E, such that: P + P + . . . +P
= d P = T.
T denotes the public key (a point on the curve), and d denotes the private key. To put it another way, the
public key is a random multiple of the generator, but the private key is the integer used to produce the
multiple. #E denotes the elliptic curve's order, which essentially signifies the number of points in the
elliptic curve's cyclic group. A cyclic group is made up of points on the elliptic curve and points at infinity.
A key pair is associated with elliptic curve domain parameters. Domain parameters include field size,
field representation, two field elements a and b, two field elements Xg and Yg, order n of point G
determined as G=(Xg, Yg), and the co-factor h = #E(Fq)/n.
DLP in ECC and Large integer factorization in RSA.
DLP in ECC:
 Set of rational points satisfying some cubic equation
Group structure given by chord and tangent rule
 Given E over a finite field K,
Given P 2 E(K), given Q 2 G :=< P >,
Find k 2 Z such that Q = kP.
 In practice K is often a prime field, a binary field with
prime extension, or Fpn with n relatively small.
 Common belief : best algorithms are generic ones
(at least for the parameters used in practice)
160-bit ECDLP ≈ 2048-bit DLP or factoring
Transferring ECDLP to a simpler" DLP problem through a group
homorphism:
 MOV reduction if jGj divides qm - 1 [MOV93]
Use pairings to transfer ECDLP to DLP on Km
I Polynomial time for anomalous curves [SA98,S98,S99]
Transfer ECDLP to a p-adic elliptic logarithm if jGj = jKj
 Weil descent for some curves over Fpn [GS99,GHS00]
Transfer ECDLP to the Jacobian of an hyper elliptic curve
 Only work for specific families
Generalmethod to solve discrete logarithm problems:
 Define a factor basis F ⊂ G
 Relation search : find about jFj relations
aiP + biQ = X
Pj2F
eijPj
 Do linear algebra modulo jGj on the relations to get
aP + bQ = 0
 Define F s.t. there is an efficient" algorithm for Step 2
 Balance relation search and linear algebra
Large integerfactorization in RSA:
 Given a composite number n, compute its (unique)
factorization n = Q pi^ei where pi are prime numbers
 Equivalently : compute one non-trivial factor pi
 We will assume n = pq, where p and q are primes
Factorizationvs discrete logarithms:
 Discrete logarithm and factoring algorithms are similar
 Exceptions:
- Quasi-polynomial time algorithm for discrete logarithms
in small to medium characteristic
- Elliptic curve factorization method
 Hardness of large characteristic field discrete logarithms
and integer factorization is comparable today

More Related Content

Similar to Assignment 2 (1) (1).docx

Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsDiscrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsNIT Sikkim
 
Cryptography Baby Step Giant Step
Cryptography Baby Step Giant StepCryptography Baby Step Giant Step
Cryptography Baby Step Giant StepSAUVIK BISWAS
 
CP4151 Advanced data structures and algorithms
CP4151 Advanced data structures and algorithmsCP4151 Advanced data structures and algorithms
CP4151 Advanced data structures and algorithmsSheba41
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 
01 - DAA - PPT.pptx
01 - DAA - PPT.pptx01 - DAA - PPT.pptx
01 - DAA - PPT.pptxKokilaK25
 
CP4151 ADSA unit1 Advanced Data Structures and Algorithms
CP4151 ADSA unit1 Advanced Data Structures and AlgorithmsCP4151 ADSA unit1 Advanced Data Structures and Algorithms
CP4151 ADSA unit1 Advanced Data Structures and AlgorithmsSheba41
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
 
ellipticcurvecryptography.pptx
ellipticcurvecryptography.pptxellipticcurvecryptography.pptx
ellipticcurvecryptography.pptxAYUSHJAIN152065
 
Eucledian algorithm for gcd of integers and polynomials
Eucledian algorithm for gcd of integers and polynomialsEucledian algorithm for gcd of integers and polynomials
Eucledian algorithm for gcd of integers and polynomialsSWAMY J S
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Sienna 1 intro
Sienna 1 introSienna 1 intro
Sienna 1 introchidabdu
 
Time and space complexity
Time and space complexityTime and space complexity
Time and space complexityAnkit Katiyar
 
Computers and Algorithms - What can they do and what can they not?
Computers and Algorithms - What can they do and what can they not?Computers and Algorithms - What can they do and what can they not?
Computers and Algorithms - What can they do and what can they not?VNIT-ACM Student Chapter
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyKelly Bresnahan
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...TELKOMNIKA JOURNAL
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMijcisjournal
 
Algorithm Analysis
Algorithm AnalysisAlgorithm Analysis
Algorithm AnalysisMegha V
 

Similar to Assignment 2 (1) (1).docx (20)

Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsDiscrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
 
Cryptography Baby Step Giant Step
Cryptography Baby Step Giant StepCryptography Baby Step Giant Step
Cryptography Baby Step Giant Step
 
CP4151 Advanced data structures and algorithms
CP4151 Advanced data structures and algorithmsCP4151 Advanced data structures and algorithms
CP4151 Advanced data structures and algorithms
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
01 - DAA - PPT.pptx
01 - DAA - PPT.pptx01 - DAA - PPT.pptx
01 - DAA - PPT.pptx
 
ALGO.ppt
ALGO.pptALGO.ppt
ALGO.ppt
 
CP4151 ADSA unit1 Advanced Data Structures and Algorithms
CP4151 ADSA unit1 Advanced Data Structures and AlgorithmsCP4151 ADSA unit1 Advanced Data Structures and Algorithms
CP4151 ADSA unit1 Advanced Data Structures and Algorithms
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
ellipticcurvecryptography.pptx
ellipticcurvecryptography.pptxellipticcurvecryptography.pptx
ellipticcurvecryptography.pptx
 
Eucledian algorithm for gcd of integers and polynomials
Eucledian algorithm for gcd of integers and polynomialsEucledian algorithm for gcd of integers and polynomials
Eucledian algorithm for gcd of integers and polynomials
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Sienna 1 intro
Sienna 1 introSienna 1 intro
Sienna 1 intro
 
Time and space complexity
Time and space complexityTime and space complexity
Time and space complexity
 
Computers and Algorithms - What can they do and what can they not?
Computers and Algorithms - What can they do and what can they not?Computers and Algorithms - What can they do and what can they not?
Computers and Algorithms - What can they do and what can they not?
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
 
Algorithm Analysis
Algorithm AnalysisAlgorithm Analysis
Algorithm Analysis
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 

More from pinstechwork

More from pinstechwork (7)

Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
References.docx
References.docxReferences.docx
References.docx
 
Screenshots 2.0.docx
Screenshots 2.0.docxScreenshots 2.0.docx
Screenshots 2.0.docx
 
Report 2.0.docx
Report 2.0.docxReport 2.0.docx
Report 2.0.docx
 
Report 1.0.docx
Report 1.0.docxReport 1.0.docx
Report 1.0.docx
 
movie_notebook.pdf
movie_notebook.pdfmovie_notebook.pdf
movie_notebook.pdf
 
Saqib Application.docx
Saqib Application.docxSaqib Application.docx
Saqib Application.docx
 

Recently uploaded

3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdfSwaraliBorhade
 
ARt app | UX Case Study
ARt app | UX Case StudyARt app | UX Case Study
ARt app | UX Case StudySophia Viganò
 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsCharles Obaleagbon
 
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...ankitnayak356677
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptxVanshNarang19
 
Design Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryDesign Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryWilliamVickery6
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130Suhani Kapoor
 
How to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our SiteHow to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our Sitegalleryaagency
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Gariahat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Roomdivyansh0kumar0
 
NATA 2024 SYLLABUS, full syllabus explained in detail
NATA 2024 SYLLABUS, full syllabus explained in detailNATA 2024 SYLLABUS, full syllabus explained in detail
NATA 2024 SYLLABUS, full syllabus explained in detailDesigntroIntroducing
 
Cosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable BricksCosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable Bricksabhishekparmar618
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Delhi Call girls
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentationamedia6
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...Call Girls in Nagpur High Profile
 
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)jennyeacort
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Douxkojalkojal131
 
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
PORTAFOLIO   2024_  ANASTASIYA  KUDINOVAPORTAFOLIO   2024_  ANASTASIYA  KUDINOVA
PORTAFOLIO 2024_ ANASTASIYA KUDINOVAAnastasiya Kudinova
 
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf
 
ARt app | UX Case Study
ARt app | UX Case StudyARt app | UX Case Study
ARt app | UX Case Study
 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past Questions
 
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptx
 
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Design Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryDesign Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William Vickery
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
 
How to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our SiteHow to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our Site
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
 
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Gariahat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
 
NATA 2024 SYLLABUS, full syllabus explained in detail
NATA 2024 SYLLABUS, full syllabus explained in detailNATA 2024 SYLLABUS, full syllabus explained in detail
NATA 2024 SYLLABUS, full syllabus explained in detail
 
Cosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable BricksCosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable Bricks
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentation
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
 
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
 
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
PORTAFOLIO   2024_  ANASTASIYA  KUDINOVAPORTAFOLIO   2024_  ANASTASIYA  KUDINOVA
PORTAFOLIO 2024_ ANASTASIYA KUDINOVA
 
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
 

Assignment 2 (1) (1).docx

  • 1. Task 1: (2 points) In your own words, explain how ECC works. Use at least one diagram which is your own drawing. Explain the discrete log problem (DLP) in ECC. Explain the differences of the DLP in ECC to the large integer factorization problem in RSA. (Minimum 3 pages). Working of ECC: Elliptic curve cryptography (ECC) is a public key encryption technology that uses elliptic curve theory to generate quicker, smaller, and more efficient cryptographic keys. Instead of the traditional approach of generating keys as the product of extremely large prime numbers, ECC produces keys using the features of the elliptic curve equation. Most public key encryption methods, such as RSA and Diffie-Hellman, can be utilized in combination with this technology. Some researchers believe that ECC can offer the same level of security with a 164- bit key that other systems require with a 1,024-bit key. Because ECC allows for equal security while consuming less computer resources and battery capacity, it is increasingly being employed in mobile applications. An elliptic curve is a collection of points that satisfy a mathematical equation. The equation for an elliptic curve is y2=x3+ax+b. Elliptic Curve Cryptography (ECC) is not capable of encrypting data. ECC may be used to negotiate keys for symmetric encryption using Elliptic Curve Diffie-Hellman key exchange, as well as for digital signatures. ECC operates on an elliptic curve over a finite field, which is a set of discrete points in 2D space rather than a smooth line. These points have several intriguing qualities, such as the ability to add them in a certain way, with the result being another point from the curve, or rather from the collection of discrete points that is the elliptic curve over finite field. This is how an elliptic curve may look over real numbers:
  • 2. This is how it may look over a finite field - just a set of points: When you deal with ordinary numbers and start adding 3 to itself, you get 6, 9, 12, 15... And so on. If I told you that I added 3 to itself an unknown number of times and the result is 30, you'd quickly realize that the unknown number is 10... Since 10 * 3 = 30. If you deal with a set of points that is an elliptic curve over a finite field and conduct that specific addition operation and add a point to itself an indefinite number of times, you will eventually arrive at some point. But, unlike conventional numbers, it is now nearly difficult for anyone to determine how many times you performed that addition when you tell them where you started and where you ended up - only you know that. ECDSA - elliptic curve digital signature algorithm - makes use of this characteristic. It cannot directly encrypt data, but it may be used to demonstrate your knowledge of the secret - the number of times you completed the particular elliptic curve addition. You can digitally sign a communication to establish that it came from you and could not have been falsified by someone else. Discrete log problem (DLP) in ECC: Public key cryptography and key exchange protocols are frequently based on functions that are simple to compute but difficult to reverse. The goal is to employ such a function to generate a shared secret or another value that may be used in encryption. In the Diffie-Hellman key exchange protocol, for example, the two sides publicly agree on a pair of integers, g,p, such that p is prime. They next each choose a number a,b that the other side does not know. One sends ga, while the other sends gb (all numbers modulo p ). Gabmodp may now be calculated by both parties as a shared secret.
  • 3. Given g,a,p, it is simple to compute c=gamodp. It is difficult to compute a given c,g,p. The "discrete logarithm problem" is the challenge of determining the exponent. Nobody knows how to accomplish it quickly. The discrete logarithm problem in ECC is based on the assumption that all points on an elliptic curve form a cyclic group under specific circumstances. The public key on an elliptic curve is a random multiple of the generator point, whereas the private key is a randomly determined integer used to produce the multiple. In other words, a private key is an integer picked at random, and a public key is a point on the curve. The discrete logarithm problem is used to discover the private key (an integer) that lies between all points on the elliptic curve. A subsequent equation demonstrates this accurately. Consider the following elliptic curve E, which has two constituents P and T. The discrete logarithmic problem is to find the integer d, where 1 <= d <= #E, such that: P + P + . . . +P = d P = T. T denotes the public key (a point on the curve), and d denotes the private key. To put it another way, the public key is a random multiple of the generator, but the private key is the integer used to produce the multiple. #E denotes the elliptic curve's order, which essentially signifies the number of points in the elliptic curve's cyclic group. A cyclic group is made up of points on the elliptic curve and points at infinity. A key pair is associated with elliptic curve domain parameters. Domain parameters include field size, field representation, two field elements a and b, two field elements Xg and Yg, order n of point G determined as G=(Xg, Yg), and the co-factor h = #E(Fq)/n. DLP in ECC and Large integer factorization in RSA. DLP in ECC:  Set of rational points satisfying some cubic equation Group structure given by chord and tangent rule  Given E over a finite field K, Given P 2 E(K), given Q 2 G :=< P >, Find k 2 Z such that Q = kP.  In practice K is often a prime field, a binary field with prime extension, or Fpn with n relatively small.  Common belief : best algorithms are generic ones (at least for the parameters used in practice) 160-bit ECDLP ≈ 2048-bit DLP or factoring Transferring ECDLP to a simpler" DLP problem through a group homorphism:  MOV reduction if jGj divides qm - 1 [MOV93] Use pairings to transfer ECDLP to DLP on Km I Polynomial time for anomalous curves [SA98,S98,S99] Transfer ECDLP to a p-adic elliptic logarithm if jGj = jKj
  • 4.  Weil descent for some curves over Fpn [GS99,GHS00] Transfer ECDLP to the Jacobian of an hyper elliptic curve  Only work for specific families Generalmethod to solve discrete logarithm problems:  Define a factor basis F ⊂ G  Relation search : find about jFj relations aiP + biQ = X Pj2F eijPj  Do linear algebra modulo jGj on the relations to get aP + bQ = 0  Define F s.t. there is an efficient" algorithm for Step 2  Balance relation search and linear algebra Large integerfactorization in RSA:  Given a composite number n, compute its (unique) factorization n = Q pi^ei where pi are prime numbers  Equivalently : compute one non-trivial factor pi  We will assume n = pq, where p and q are primes Factorizationvs discrete logarithms:  Discrete logarithm and factoring algorithms are similar  Exceptions: - Quasi-polynomial time algorithm for discrete logarithms in small to medium characteristic - Elliptic curve factorization method  Hardness of large characteristic field discrete logarithms and integer factorization is comparable today