This document provides an overview of elliptic curve cryptography including what an elliptic curve is, the elliptic curve discrete logarithm problem (ECDLP), Diffie-Hellman key agreement and digital signatures using elliptic curves. It discusses NIST standard curves like P-256 and Curve25519 as well as choosing appropriate curves and potential issues like attacks if randomness is not properly implemented or an invalid curve is used.
The following slides explains about elliptic curves, their interpretation over Gallois finite fields, algorithms that reduces arithmetic computational requirements and primarly applications of the ECC.
For a college course -- CNIT 141: Cryptography for Computer Networks, at City College San Francisco
Based on "Serious Cryptography: A Practical Introduction to Modern Encryption", by Jean-Philippe Aumasson, No Starch Press (November 6, 2017), ISBN-10: 1593278268 ISBN-13: 978-1593278267
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_S19.shtml
Gives a basic idea of Finite field theory and its uses in Elliptic cure cryptography. ECDLP and Diffie Helman key exchange and Elgamal Encryption with ECC.
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
The following slides explains about elliptic curves, their interpretation over Gallois finite fields, algorithms that reduces arithmetic computational requirements and primarly applications of the ECC.
For a college course -- CNIT 141: Cryptography for Computer Networks, at City College San Francisco
Based on "Serious Cryptography: A Practical Introduction to Modern Encryption", by Jean-Philippe Aumasson, No Starch Press (November 6, 2017), ISBN-10: 1593278268 ISBN-13: 978-1593278267
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_S19.shtml
Gives a basic idea of Finite field theory and its uses in Elliptic cure cryptography. ECDLP and Diffie Helman key exchange and Elgamal Encryption with ECC.
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
This Presentation Elliptical Curve Cryptography give a brief explain about this topic, it will use to enrich your knowledge on this topic. Use this ppt for your reference purpose and if you have any queries you'll ask questions.
Public Key Cryptography and RSA algorithmIndra97065
Public Key Cryptography and RSA algorithm.Explanation and proof of RSA algorithm in details.it also describer the mathematics behind the RSA. Few mathematics theorem are given which are use in the RSA algorithm.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Elliptic Curve Cryptography and the basis of elliptic curve arithmetics.
A project which implements the Elliptic Curve Cryptography for the Diffie-Hellman keys exchange, in order to establish a secure channel between two Android devices.
For a college course -- CNIT 141: Cryptography for Computer Networks, at City College San Francisco
Based on "Serious Cryptography: A Practical Introduction to Modern Encryption", by Jean-Philippe Aumasson, No Starch Press (November 6, 2017), ISBN-10: 1593278268 ISBN-13: 978-1593278267
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_S19.shtml
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
This document is to guide in the basic topics of cryptographic and network security. The detail insight of classical encryption algorithm is given here. The step by step process is clearly explained in this document.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
This Presentation Elliptical Curve Cryptography give a brief explain about this topic, it will use to enrich your knowledge on this topic. Use this ppt for your reference purpose and if you have any queries you'll ask questions.
Public Key Cryptography and RSA algorithmIndra97065
Public Key Cryptography and RSA algorithm.Explanation and proof of RSA algorithm in details.it also describer the mathematics behind the RSA. Few mathematics theorem are given which are use in the RSA algorithm.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Elliptic Curve Cryptography and the basis of elliptic curve arithmetics.
A project which implements the Elliptic Curve Cryptography for the Diffie-Hellman keys exchange, in order to establish a secure channel between two Android devices.
For a college course -- CNIT 141: Cryptography for Computer Networks, at City College San Francisco
Based on "Serious Cryptography: A Practical Introduction to Modern Encryption", by Jean-Philippe Aumasson, No Starch Press (November 6, 2017), ISBN-10: 1593278268 ISBN-13: 978-1593278267
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_S19.shtml
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
This document is to guide in the basic topics of cryptographic and network security. The detail insight of classical encryption algorithm is given here. The step by step process is clearly explained in this document.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsNIT Sikkim
ECC was developed in 1985 independently by Neal Koblitz and Victor Miller. Both men saw the application of the elliptic curve discrete log problem (ECDLP) as a replacement for the conventional discrete log problem (DLP) which is used in DSA, and the integer factorization problem found in RSA. For both problems, sub-exponential solutions have been generated; the
same which cannot be said for ECDLP . In addition to offering increased security for a smaller key size, operations of adding and doubling can be optimized successfully on a mobile
platform . ECC offers a viable replacement to the most common public-key cryptography algorithms on mobile devices.
For a college course at Coastline Community College taught by Sam Bowne. Details at https://samsclass.info/125/125_F17.shtml
Based on: "CISSP Study Guide, Third Edition"; by Eric Conrad, Seth Misenar, Joshua Feldman; ISBN-10: 0128024372
Modern block ciphers are widely used to provide encryption of quantities of information, and/or a cryptographic checksum to ensure the contents have not been altered. We continue to use block ciphers because they are comparatively fast, and because we know a fair amount about how to design them.
Is your crypto secure? Let's take a look at what main issues there are in modern cryptography that software developers and architects have to be aware of.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
2. Topics
• What is an Elliptic Curve?
• The ECDLP Problem
• Diffie-Hellman Key Agreement over Elliptic
Curves
• Choosing a Curve
• How Things Can Go Wrong
3. New & Improved
• ECC was introduced in 1985
• More powerful and efficient than RSA and
classical Diffie-Hellman
• ECC with as 256-bit key is stronger than RSA
with a 4096-bit key
4. Slow Adoption
• OpenSSL added ECC in 2005
• OpenSSH added it in 2011
• Used in Bitcoin
• Most applications based on DLP can use ECC
instead
• Except Secure Remote Password
• Link Ch 12a
8. The Field Zp
• We'll use both addition and multiplication
• We need 0 as the additive identity element
• x + 0 = x
• There are inverses for addition (-x)
• And for multiplication (denoted 1/x)
• Such a group is called a field
• A finite number of elements: finite field
9. Adding Points
• P + Q: Draw line connecting P and Q
• Find the point where it intersects with the
elliptic curve
• Reflect around X-axis
10.
11. P + (-P)
P =(xP, yP)
-P =(xP, -yP)
• Adding these points makes a vertical line
• Goes to the "point at infinity"
• Which acts as zero for elliptic curves
14. Multiplication
• kP = P + P + P + ... (k times)
• To calculate it faster, calculate:
• P2 = P + P
• P4 = P2 + P2
• P8 = P4 + P4
• etc.
15. What is a Group?
• A set of elements (denoted x, y, z below)
• An operation (denoted ✕ below)
• With these properties
• Closure
• If x and y are in the group, x ✕ y is too
• Associativity (x ✕ y) ✕ z = x ✕ (y ✕ z)
• Identity element e such that e ✕ x = x
• Inverse For every x, there is a y with x ✕ y = e
16. Elliptic Curve Groups
• Points P, Q, R and "addition" form a group
• Closure
• If P and Q are in the group, P + Q is too
• Associativity (P + Q) + R = P + (Q + R)
• Identity element O is the point at infinity
• Such that P + O = P
• Inverse
• For every P = (x, y) , -P = (x, -y)
• P + (-P) = O
18. ECDLP
• All elliptic curve cryptography is based in this
problem
Given P and Q
Find k such that Q = kP
• Believed to be hard, like Discrete Logratim
Problem
• Has withstood cryptanalysis since its
introduction in 1985
19. Smaller Numbers
• Using the field Zp
• Where p is n bits long
• The security is n / 2 bits
• A p 256 bits long provides 128 bits of security
• That would take more than 4096 bits with RSA
• ECC is much faster
21. RSA-Based Diffie-Hellman
(DH)
• They can both calculate gab by combining
public and secret information
Keep a secret
Transmit ga
Calculate gab = Ba
Keep b secret
Transmit gb
Calculate gab = Ab
22. ECDH
• Choose a fixed point G (not secret)
• Shared secret is dAPB = dBPA = dAdBG
Pick a random secret dA
Transmit PA = dAG
Calculate dAdBG = dAPB
Pick a random secret dB
Transmit PB = dBG
Calculate dAdBG = dBPA
23. Signing with Elliptic Curves
• ECDSA (Elliptic Curve Digital Signature
Algorithm)
• Replaces RSA and classical DSA
• The only signature used in Bitcoin
• Supported by many TLS and SSH
implementations
• Consists of signature generation and
verification algorithms
24. • Signer holds a private key d
• Verifiers hold the public key P = dG
• Both know:
• What elliptic curve to use
• Its order n (the number of points in the
curve)
• Coordinates of a base point G
Signing with Elliptic Curves
25. ECDSA Signature
Generation
• Signer hashes the message to form h
• With a function such as SHA-256 or BLAKE2
• Signer picks a random number k
• Calculates kG, with coordinates (x, y)
• Signature is (r, s):
r = x mod n s = (h + rd) / k mod n
26. Signature Length
• If coordinates are 256-bit numbers
• r and s are both 256 bits long
• Signature is 512 bits long
27. ECDSA vs. RSA
Signatures
• RSA is used only for encryption and signatures
• ECC is a family of algorithms
• Encryption and signatures
• Key agreement
• Advanced functions such as identity-based
encryption
28. • RSA's signature and verification algorithms are
simpler than ECDSA
• RSA's verification process is often faster
because of the small public key e
• ECC has two major advantages
• Shorter signatures
• Faster signing speed
ECDSA vs. RSA
Signatures
30. Encrypting with Elliptic
Curves
• Rarely used
• Message size can't exceed about 100 bits
• RSA can use 4000 bits at same security level
31. Integrated Encryption
Scheme (IES)
• Generate a Diffie-Hellman shared secret
• Derive a symmetric key from the shared
secret
• Use symmetric encryption
34. Parameters
• Order (number of points), also called
modulus
• a and b in
y2 = x3 + ax + b
• Origin of the chosen a and b
35. Criteria for Security
• Order (number of points) must not be product
of small numbers
• Curves that treat P+Q and P+P the same way
are safer, to avoid information leaks
• Unified addition law
• Creators of curve should explain how a and b
were chosen, or people will be suspicious
36. NIST Curves
• Standardized in 2000
• Five prime curves (modulus is prime)
• The most commonly used ones
• Ten others use "binary polynomials"
• Make hardware implementation more
efficient
• Rarely used with elliptic curves
37. P-256
• The most common NIST curve
• Modulus is p
• b is a 256-bit number
38. Where Did b Come From?
• NSA never explained it well
• Most experts don't believe there's a backdoor
• b is the SHA-1 hash of this random-looking
value
40. Curve 25519
• Published by Daniel J. Bernstein in 2006
• Faster than NIST standard curves
• Uses shorter keys
• No suspicious constants
• Uses same formula for P+Q and P+P
41. p = 2255 - 19
• Used everywhere
• Chrome, Apple, OpenSSH
• But not a NIST standard
Curve 25519
42. y2 = x3 + 7
p = 2256 - 232 - 977
• Used in Bitcoin
https://en.bitcoin.it/wiki/Secp256k1
Curve secp256k1
43. Other Curves
• Old national standards
• France: ANSSI curves
• Germany: Brainpool curves
• Use constants of unknown origin
44. Other Curves
• Newer curves, rarely used
• Curve41417
• More secure variant of Curve25519
• Ed448-Goldilocks
• 448-bit curve from 2014
46. Large Attack Surface
• Elliptic curves have
• More parameters than classic Diffie-Hellman
• More opportunities for mistakes
• Possible vulnerabilities to side-channel
attacks
• Timing of calculations on large numbers
47. ECDSA with Bad
Randomness
• Signing uses a secret random k
s = (h + rd) / k mod n
• If k is re-used, attacker can calculate k
k = (h1 - h2) / (s1 - s2)
• This happened on the PlayStation 3 in 2010
• Presented at CCC by failOverflow team
48. Invalid Curve Attack
• Attacker sends PA that is not on the same curve
• From a weak curve instead
• Target fails to verify that PA is on the curve, and uses a
secret dBPA on a weak curve, so ECDLP can be solved
Doesn't know dA
Transmit malicious P
Calculates secret dB
Pick a random secret dB
Transmit PB = dBG
Calculate dBP
49. Invalid Curve Attack
• Malicious client could trick server into using
the wrong curve
• Exposing the server's secret key
• Some TLS implementations were shown to be
vulnerable in 2015
• https://threatpost.com/json-libraries-patched-against-invalid-
curve-crypto-attack/124336/