This document presents a dissertation on improving the baby step giant step algorithm for solving the elliptic curve discrete logarithmic problem. It begins with an overview of cryptography, symmetric and asymmetric encryption, and elliptic curve cryptography. It then discusses the elliptic curve discrete logarithmic problem and surveys existing literature. The proposed approach improves the baby step giant step algorithm by using a smaller baby step set size. Experimental results on two examples show that the proposed approach has faster runtime than the previous method. A complexity analysis is also presented.
The document discusses the arithmetic of elliptic curves. It begins by introducing elliptic curves and their group structure under addition. It describes how points on an elliptic curve form an abelian group and that rational points form a subgroup. It then discusses points of finite order, including points of order 2 and 3. The Nagell-Lutz theorem and Mazur's theorem characterize rational points of finite order. Finally, it introduces Mordell's theorem, which states that the group of rational points on an elliptic curve is finitely generated.
Elliptic Curve Cryptography was presented by Ajithkumar Vyasarao. He began with an introduction to ECC, noting its advantages over RSA like smaller key sizes providing equal security. He described how ECC works using elliptic curves over real numbers and finite fields. He demonstrated point addition and scalar multiplication on curves. ECC can be used for applications like smart cards and mobile devices. For key exchange, Alice and Bob can agree on a starting point and generate secret keys by multiplying a private value with the shared point. ECC provides security through the difficulty of solving the elliptic curve discrete logarithm problem.
Gives a basic idea of Finite field theory and its uses in Elliptic cure cryptography. ECDLP and Diffie Helman key exchange and Elgamal Encryption with ECC.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Elliptic Curve Cryptography and the basis of elliptic curve arithmetics.
Elliptic Curve Cryptography for those who are afraid of mathsMartijn Grooten
A low level introduction into elliptic curve cryptography, as presented at BSides San Francisco 2016.
NB don't be put off by the 100 slides; every transition is on its own slide.
The document discusses the theory of NP-completeness. It begins by defining the complexity classes P, NP, NP-hard, and NP-complete. It then explains the concepts of reduction and how none of the NP-complete problems can be solved in polynomial time deterministically. The document provides examples of NP-complete problems like satisfiability (SAT), vertex cover, and the traveling salesman problem. It shows how nondeterministic algorithms can solve these problems and how they can be transformed into SAT instances. Finally, it proves that SAT is the first NP-complete problem by showing it is in NP and NP-hard.
This Presentation Elliptical Curve Cryptography give a brief explain about this topic, it will use to enrich your knowledge on this topic. Use this ppt for your reference purpose and if you have any queries you'll ask questions.
Elliptic curve cryptography (ECC) uses elliptic curves over finite fields for encryption, digital signatures, and key exchange. The key sizes are smaller than RSA for the same security level. Its security relies on the assumed hardness of solving the discrete logarithm problem over elliptic curves. ECC defines elliptic curves with parameters over Galois fields GF(p) for prime p or binary fields GF(2m). Points on the curves along with addition and doubling formulas are used to perform scalar multiplications for cryptographic operations.
The document discusses the arithmetic of elliptic curves. It begins by introducing elliptic curves and their group structure under addition. It describes how points on an elliptic curve form an abelian group and that rational points form a subgroup. It then discusses points of finite order, including points of order 2 and 3. The Nagell-Lutz theorem and Mazur's theorem characterize rational points of finite order. Finally, it introduces Mordell's theorem, which states that the group of rational points on an elliptic curve is finitely generated.
Elliptic Curve Cryptography was presented by Ajithkumar Vyasarao. He began with an introduction to ECC, noting its advantages over RSA like smaller key sizes providing equal security. He described how ECC works using elliptic curves over real numbers and finite fields. He demonstrated point addition and scalar multiplication on curves. ECC can be used for applications like smart cards and mobile devices. For key exchange, Alice and Bob can agree on a starting point and generate secret keys by multiplying a private value with the shared point. ECC provides security through the difficulty of solving the elliptic curve discrete logarithm problem.
Gives a basic idea of Finite field theory and its uses in Elliptic cure cryptography. ECDLP and Diffie Helman key exchange and Elgamal Encryption with ECC.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the Elliptic Curve Cryptography and the basis of elliptic curve arithmetics.
Elliptic Curve Cryptography for those who are afraid of mathsMartijn Grooten
A low level introduction into elliptic curve cryptography, as presented at BSides San Francisco 2016.
NB don't be put off by the 100 slides; every transition is on its own slide.
The document discusses the theory of NP-completeness. It begins by defining the complexity classes P, NP, NP-hard, and NP-complete. It then explains the concepts of reduction and how none of the NP-complete problems can be solved in polynomial time deterministically. The document provides examples of NP-complete problems like satisfiability (SAT), vertex cover, and the traveling salesman problem. It shows how nondeterministic algorithms can solve these problems and how they can be transformed into SAT instances. Finally, it proves that SAT is the first NP-complete problem by showing it is in NP and NP-hard.
This Presentation Elliptical Curve Cryptography give a brief explain about this topic, it will use to enrich your knowledge on this topic. Use this ppt for your reference purpose and if you have any queries you'll ask questions.
Elliptic curve cryptography (ECC) uses elliptic curves over finite fields for encryption, digital signatures, and key exchange. The key sizes are smaller than RSA for the same security level. Its security relies on the assumed hardness of solving the discrete logarithm problem over elliptic curves. ECC defines elliptic curves with parameters over Galois fields GF(p) for prime p or binary fields GF(2m). Points on the curves along with addition and doubling formulas are used to perform scalar multiplications for cryptographic operations.
Mathematics (from Greek μάθημα máthēma, “knowledge, study, learning”) is the study of topics such as quantity (numbers), structure, space, and change. There is a range of views among mathematicians and philosophers as to the exact scope and definition of mathematics
Integral Calculus. - Differential Calculus - Integration as an Inverse Process of Differentiation - Methods of Integration - Integration using trigonometric identities - Integrals of Some Particular Functions - rational function - partial fraction - Integration by partial fractions - standard integrals - First and second fundamental theorem of integral calculus
This document discusses approximation algorithms and introduces several combinatorial optimization problems. It begins by explaining that approximation algorithms are needed to find near-optimal solutions for problems that cannot be solved in polynomial time, such as set cover and bin packing. It then provides examples of problems that are in P, NP, and NP-complete. Several techniques for designing approximation algorithms are outlined, including greedy algorithms, linear programming, and semidefinite programming. Specific NP-complete problems like vertex cover, set cover, and independent set are introduced and approximations algorithms with performance guarantees are provided for set cover and vertex cover.
This document discusses probabilistic error bounds for order reduction of smooth nonlinear models. It begins with motivation for using reduced order models (ROM) in computationally intensive applications and the need for error metrics. It then provides background on Dixon's theory for probabilistic error bounds, which has mostly been used for linear models. The document outlines snapshot and gradient-based reduction algorithms to reduce the response and parameter interfaces of a model. It defines different types of errors that can occur from reducing these interfaces and discusses propagating the errors across interfaces using Dixon's theory. Numerical tests and results are briefly mentioned along with conclusions.
This document discusses elliptic curve cryptography and its underlying mathematics. It begins by providing historical context on the development of cryptography and highlights elliptic curves being suggested in 1985 as an encryption system. It then covers key mathematical concepts such as Weierstrass elliptic curve equations, properties of elliptic curves like point addition and doubling, and how elliptic curves form algebraic groups. Finally, it introduces the concepts of prime moduli, rings, and fields which are important for implementing elliptic curve cryptography in practice.
A Numerical Analytic Continuation and Its Application to Fourier TransformHidenoriOgata
It is a slide for a talk given in the conference "ApplMath18" (9th Conference on Applied Mathematics and Scientific Computing, 17-20 September, 2018, Solaris, Sibenik, Croatia). We propose a numerical method of analytic continuation using continued fraction. From theoretical analysis and numerical examples, our method is so effective that it shows exponential convergence. We also apply our method to the computation of Fourier transforms.
The document discusses approximation algorithms for NP-hard problems. It begins with an introduction that defines approximation algorithms as algorithms that find feasible but not necessarily optimal solutions to optimization problems in polynomial time.
It then discusses different types of approximation schemes - absolute approximation where the approximate solution is within a constant of optimal, epsilon (ε)-approximation where the approximate solution is within a factor of ε times optimal, and polynomial time approximation schemes that run in polynomial time for any fixed ε.
The document provides examples of problems that admit absolute approximation algorithms, such as planar graph coloring and maximum programs stored on disks. It also discusses Graham's theorem, which proves that the largest processing time scheduling algorithm generates schedules within 1/3
This document summarizes a lecture on algorithms and graph traversal techniques. It discusses:
1) Breadth-first search (BFS) and depth-first search (DFS) algorithms for traversing graphs. BFS uses a queue while DFS uses a stack.
2) Applications of BFS and DFS, including finding connected components, minimum spanning trees, and bi-connected components.
3) Identifying articulation points to determine biconnected components in a graph.
4) The 0/1 knapsack problem and approaches for solving it using greedy algorithms, backtracking, and branch and bound search.
Machine learning pt.1: Artificial Neural Networks ® All Rights ReservedJonathan Mitchell
This document provides an overview of machine learning concepts including classification, regression, artificial neural networks, and self-driving cars. It discusses topics such as probability basics, linear classification with logistic regression, perceptrons, neurons, forward and backpropagation, loss functions, and visualizing hidden layers in neural networks. The document is intended to introduce machine learning concepts relevant to applications like self-driving vehicles.
This document summarizes research on using elliptic curve cryptography based on imaginary quadratic orders. It shows that for elliptic curves over a finite field Fq, if q satisfies certain conditions, the elliptic curve discrete logarithm problem can be reduced to the discrete logarithm problem over the finite field Fp2. This allows the elliptic curve discrete logarithm problem to potentially be solved faster. It then provides examples of how to construct "weak curves" that satisfy the necessary conditions.
This document describes fuzzy clustering and fuzzy c-means clustering. It begins by introducing fuzzy clustering and discussing how the cost function for k-means clustering can be modified to allow fuzzy membership. Specifically, it proposes using fuzzy membership values between 0 and 1 instead of the hard 0 or 1 membership of k-means. This modifies the cost function to include fuzzy membership values raised to a power m. Lagrange multipliers are then used to derive update equations for the fuzzy memberships and cluster centroids. The final equations assign membership based on the distance of a point to cluster centroids, and update centroids as the weighted mean of points based on their fuzzy memberships.
This document provides a summary of supervised learning techniques including linear regression, logistic regression, support vector machines, naive Bayes classification, and decision trees. It defines key concepts such as hypothesis, loss functions, cost functions, and gradient descent. It also covers generative models like Gaussian discriminant analysis, and ensemble methods such as random forests and boosting. Finally, it discusses learning theory concepts such as the VC dimension, PAC learning, and generalization error bounds.
The document describes sparse matrix reconstruction using a matrix completion algorithm. It begins with an overview of the matrix completion problem and formulation. It then describes the algorithm which uses soft-thresholding to impose a low-rank constraint and iteratively finds the matrix that agrees with the observed entries. The algorithm is proven to converge to the desired solution. Extensions to noisy data and generalized constraints are also discussed.
Exact Matrix Completion via Convex Optimization Slide (PPT)Joonyoung Yi
Slide of the paper "Exact Matrix Completion via Convex Optimization" of Emmanuel J. Candès and Benjamin Recht. We presented this slide in KAIST CS592 Class, April 2018.
- Code: https://github.com/JoonyoungYi/MCCO-numpy
- Abstract of the paper: We consider a problem of considerable practical interest: the recovery of a data matrix from a sampling of its entries. Suppose that we observe m entries selected uniformly at random from a matrix M. Can we complete the matrix and recover the entries that we have not seen? We show that one can perfectly recover most low-rank matrices from what appears to be an incomplete set of entries. We prove that if the number m of sampled entries obeys
𝑚≥𝐶𝑛1.2𝑟log𝑛
for some positive numerical constant C, then with very high probability, most n×n matrices of rank r can be perfectly recovered by solving a simple convex optimization program. This program finds the matrix with minimum nuclear norm that fits the data. The condition above assumes that the rank is not too large. However, if one replaces the 1.2 exponent with 1.25, then the result holds for all values of the rank. Similar results hold for arbitrary rectangular matrices as well. Our results are connected with the recent literature on compressed sensing, and show that objects other than signals and images can be perfectly reconstructed from very limited information.
- Unsupervised learning aims to find hidden patterns in unlabeled data. Expectation-maximization and k-means clustering are common unsupervised learning algorithms.
- Principal component analysis performs dimension reduction by projecting data onto dimensions that maximize variance. Independent component analysis finds underlying generating sources in data.
- This document provides an overview of various unsupervised learning techniques including expectation-maximization, k-means clustering, hierarchical clustering, principal component analysis, and independent component analysis. Formulas and algorithms for each technique are defined.
This document provides an overview of the key topics covered in Lecture 9 of an Artificial Intelligence course on fuzzy logic. The lecture introduces fuzzy sets and membership functions as a way to represent ambiguous or uncertain values. It covers fuzzy set operations, fuzzy numbers, fuzzy rules for reasoning, and fuzzy inference. An example is provided to illustrate how fuzzy logic can be applied to control the speed of a vehicle based on road curvature. The homework assignments involve problems working with the concepts introduced in the lecture.
Particle Filters and Applications in Computer Visionzukun
The document discusses particle filters and their applications in computer vision. It begins with an introduction to particle filters, which use a set of randomly chosen weighted samples to approximate a probability density function. Particle filters can be used for state estimation problems in nonlinear and non-Gaussian systems. The document then discusses several applications of particle filters in computer vision, including visual tracking, medical image analysis, human-computer interaction, image restoration, and robot navigation. Finally, it provides an outline of topics to be covered, including the general Bayesian framework, particle filtering methods, visual tracking techniques, and conclusions.
The document discusses various algorithms that can be solved using backtracking. It begins by defining backtracking as a general algorithm design technique for problems that involve searching for solutions satisfying constraints. It then provides examples of problems that can be solved using backtracking, including the 8 queens problem, sum of subsets, graph coloring, and finding Hamiltonian cycles in a graph. For each problem, it outlines the key steps and provides pseudocode for the backtracking algorithm.
Introduction to Elliptic Curve CryptographyDavid Evans
This document summarizes a class on elliptic curve cryptography and bitcoin. It discusses elliptic curves over finite fields, including the field GF(2256 - 232 - 29 - 28 - 27 - 26 - 24 - 1) used in bitcoin. It explains how addition works on elliptic curves via line intersections. The document also notes that finding the discrete logarithm of points on an elliptic curve is considered a hard problem, and this property is important for bitcoin. Students are assigned to investigate the bitcoin they received, complete Project 1 by January 30th, and read materials on bitcoin and elliptic curves.
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRABRNSS Publication Hub
1) The document discusses symmetric bilinear pairings on elliptic curves and Lie algebras in the context of cryptography. It provides an overview of the theoretical foundations and applications of combining these areas.
2) Key concepts covered include the Weil pairing as a symmetric bilinear pairing on elliptic curves, its properties of bilinearity and non-degeneracy, and efficient computation. Applications of elliptic curves in cryptography like ECDH and ECDSA are also summarized.
3) The security of protocols like ECDH and ECDSA relies on the assumed difficulty of solving the elliptic curve discrete logarithm problem (ECDLP). The document proves various mathematical aspects behind symmetric bilinear pairings and their use in elliptic curve cryptography.
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
Elliptic Curve Cryptography (ECC) gained a lot of attention in industry. The key attraction of ECC over RSA is that it
offers equal security even for smaller bit size, thus reducing the processing complexity. ECC Encryption and Decryption methods can
only perform encrypt and decrypt operations on the curve but not on the message. This paper presents a fast mapping method based on
matrix approach for ECC, which offers high security for the encrypted message. First, the alphabetic message is mapped on to the
points on an elliptic curve. Later encode those points using Elgamal encryption method with the use of a non-singular matrix. And the
encoded message can be decrypted by Elgamal decryption technique and to get back the original message, the matrix obtained from
decoding is multiplied with the inverse of non-singular matrix. The coding is done using Verilog. The design is simulated and
synthesized using FPGA.
Mathematics (from Greek μάθημα máthēma, “knowledge, study, learning”) is the study of topics such as quantity (numbers), structure, space, and change. There is a range of views among mathematicians and philosophers as to the exact scope and definition of mathematics
Integral Calculus. - Differential Calculus - Integration as an Inverse Process of Differentiation - Methods of Integration - Integration using trigonometric identities - Integrals of Some Particular Functions - rational function - partial fraction - Integration by partial fractions - standard integrals - First and second fundamental theorem of integral calculus
This document discusses approximation algorithms and introduces several combinatorial optimization problems. It begins by explaining that approximation algorithms are needed to find near-optimal solutions for problems that cannot be solved in polynomial time, such as set cover and bin packing. It then provides examples of problems that are in P, NP, and NP-complete. Several techniques for designing approximation algorithms are outlined, including greedy algorithms, linear programming, and semidefinite programming. Specific NP-complete problems like vertex cover, set cover, and independent set are introduced and approximations algorithms with performance guarantees are provided for set cover and vertex cover.
This document discusses probabilistic error bounds for order reduction of smooth nonlinear models. It begins with motivation for using reduced order models (ROM) in computationally intensive applications and the need for error metrics. It then provides background on Dixon's theory for probabilistic error bounds, which has mostly been used for linear models. The document outlines snapshot and gradient-based reduction algorithms to reduce the response and parameter interfaces of a model. It defines different types of errors that can occur from reducing these interfaces and discusses propagating the errors across interfaces using Dixon's theory. Numerical tests and results are briefly mentioned along with conclusions.
This document discusses elliptic curve cryptography and its underlying mathematics. It begins by providing historical context on the development of cryptography and highlights elliptic curves being suggested in 1985 as an encryption system. It then covers key mathematical concepts such as Weierstrass elliptic curve equations, properties of elliptic curves like point addition and doubling, and how elliptic curves form algebraic groups. Finally, it introduces the concepts of prime moduli, rings, and fields which are important for implementing elliptic curve cryptography in practice.
A Numerical Analytic Continuation and Its Application to Fourier TransformHidenoriOgata
It is a slide for a talk given in the conference "ApplMath18" (9th Conference on Applied Mathematics and Scientific Computing, 17-20 September, 2018, Solaris, Sibenik, Croatia). We propose a numerical method of analytic continuation using continued fraction. From theoretical analysis and numerical examples, our method is so effective that it shows exponential convergence. We also apply our method to the computation of Fourier transforms.
The document discusses approximation algorithms for NP-hard problems. It begins with an introduction that defines approximation algorithms as algorithms that find feasible but not necessarily optimal solutions to optimization problems in polynomial time.
It then discusses different types of approximation schemes - absolute approximation where the approximate solution is within a constant of optimal, epsilon (ε)-approximation where the approximate solution is within a factor of ε times optimal, and polynomial time approximation schemes that run in polynomial time for any fixed ε.
The document provides examples of problems that admit absolute approximation algorithms, such as planar graph coloring and maximum programs stored on disks. It also discusses Graham's theorem, which proves that the largest processing time scheduling algorithm generates schedules within 1/3
This document summarizes a lecture on algorithms and graph traversal techniques. It discusses:
1) Breadth-first search (BFS) and depth-first search (DFS) algorithms for traversing graphs. BFS uses a queue while DFS uses a stack.
2) Applications of BFS and DFS, including finding connected components, minimum spanning trees, and bi-connected components.
3) Identifying articulation points to determine biconnected components in a graph.
4) The 0/1 knapsack problem and approaches for solving it using greedy algorithms, backtracking, and branch and bound search.
Machine learning pt.1: Artificial Neural Networks ® All Rights ReservedJonathan Mitchell
This document provides an overview of machine learning concepts including classification, regression, artificial neural networks, and self-driving cars. It discusses topics such as probability basics, linear classification with logistic regression, perceptrons, neurons, forward and backpropagation, loss functions, and visualizing hidden layers in neural networks. The document is intended to introduce machine learning concepts relevant to applications like self-driving vehicles.
This document summarizes research on using elliptic curve cryptography based on imaginary quadratic orders. It shows that for elliptic curves over a finite field Fq, if q satisfies certain conditions, the elliptic curve discrete logarithm problem can be reduced to the discrete logarithm problem over the finite field Fp2. This allows the elliptic curve discrete logarithm problem to potentially be solved faster. It then provides examples of how to construct "weak curves" that satisfy the necessary conditions.
This document describes fuzzy clustering and fuzzy c-means clustering. It begins by introducing fuzzy clustering and discussing how the cost function for k-means clustering can be modified to allow fuzzy membership. Specifically, it proposes using fuzzy membership values between 0 and 1 instead of the hard 0 or 1 membership of k-means. This modifies the cost function to include fuzzy membership values raised to a power m. Lagrange multipliers are then used to derive update equations for the fuzzy memberships and cluster centroids. The final equations assign membership based on the distance of a point to cluster centroids, and update centroids as the weighted mean of points based on their fuzzy memberships.
This document provides a summary of supervised learning techniques including linear regression, logistic regression, support vector machines, naive Bayes classification, and decision trees. It defines key concepts such as hypothesis, loss functions, cost functions, and gradient descent. It also covers generative models like Gaussian discriminant analysis, and ensemble methods such as random forests and boosting. Finally, it discusses learning theory concepts such as the VC dimension, PAC learning, and generalization error bounds.
The document describes sparse matrix reconstruction using a matrix completion algorithm. It begins with an overview of the matrix completion problem and formulation. It then describes the algorithm which uses soft-thresholding to impose a low-rank constraint and iteratively finds the matrix that agrees with the observed entries. The algorithm is proven to converge to the desired solution. Extensions to noisy data and generalized constraints are also discussed.
Exact Matrix Completion via Convex Optimization Slide (PPT)Joonyoung Yi
Slide of the paper "Exact Matrix Completion via Convex Optimization" of Emmanuel J. Candès and Benjamin Recht. We presented this slide in KAIST CS592 Class, April 2018.
- Code: https://github.com/JoonyoungYi/MCCO-numpy
- Abstract of the paper: We consider a problem of considerable practical interest: the recovery of a data matrix from a sampling of its entries. Suppose that we observe m entries selected uniformly at random from a matrix M. Can we complete the matrix and recover the entries that we have not seen? We show that one can perfectly recover most low-rank matrices from what appears to be an incomplete set of entries. We prove that if the number m of sampled entries obeys
𝑚≥𝐶𝑛1.2𝑟log𝑛
for some positive numerical constant C, then with very high probability, most n×n matrices of rank r can be perfectly recovered by solving a simple convex optimization program. This program finds the matrix with minimum nuclear norm that fits the data. The condition above assumes that the rank is not too large. However, if one replaces the 1.2 exponent with 1.25, then the result holds for all values of the rank. Similar results hold for arbitrary rectangular matrices as well. Our results are connected with the recent literature on compressed sensing, and show that objects other than signals and images can be perfectly reconstructed from very limited information.
- Unsupervised learning aims to find hidden patterns in unlabeled data. Expectation-maximization and k-means clustering are common unsupervised learning algorithms.
- Principal component analysis performs dimension reduction by projecting data onto dimensions that maximize variance. Independent component analysis finds underlying generating sources in data.
- This document provides an overview of various unsupervised learning techniques including expectation-maximization, k-means clustering, hierarchical clustering, principal component analysis, and independent component analysis. Formulas and algorithms for each technique are defined.
This document provides an overview of the key topics covered in Lecture 9 of an Artificial Intelligence course on fuzzy logic. The lecture introduces fuzzy sets and membership functions as a way to represent ambiguous or uncertain values. It covers fuzzy set operations, fuzzy numbers, fuzzy rules for reasoning, and fuzzy inference. An example is provided to illustrate how fuzzy logic can be applied to control the speed of a vehicle based on road curvature. The homework assignments involve problems working with the concepts introduced in the lecture.
Particle Filters and Applications in Computer Visionzukun
The document discusses particle filters and their applications in computer vision. It begins with an introduction to particle filters, which use a set of randomly chosen weighted samples to approximate a probability density function. Particle filters can be used for state estimation problems in nonlinear and non-Gaussian systems. The document then discusses several applications of particle filters in computer vision, including visual tracking, medical image analysis, human-computer interaction, image restoration, and robot navigation. Finally, it provides an outline of topics to be covered, including the general Bayesian framework, particle filtering methods, visual tracking techniques, and conclusions.
The document discusses various algorithms that can be solved using backtracking. It begins by defining backtracking as a general algorithm design technique for problems that involve searching for solutions satisfying constraints. It then provides examples of problems that can be solved using backtracking, including the 8 queens problem, sum of subsets, graph coloring, and finding Hamiltonian cycles in a graph. For each problem, it outlines the key steps and provides pseudocode for the backtracking algorithm.
Introduction to Elliptic Curve CryptographyDavid Evans
This document summarizes a class on elliptic curve cryptography and bitcoin. It discusses elliptic curves over finite fields, including the field GF(2256 - 232 - 29 - 28 - 27 - 26 - 24 - 1) used in bitcoin. It explains how addition works on elliptic curves via line intersections. The document also notes that finding the discrete logarithm of points on an elliptic curve is considered a hard problem, and this property is important for bitcoin. Students are assigned to investigate the bitcoin they received, complete Project 1 by January 30th, and read materials on bitcoin and elliptic curves.
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRABRNSS Publication Hub
1) The document discusses symmetric bilinear pairings on elliptic curves and Lie algebras in the context of cryptography. It provides an overview of the theoretical foundations and applications of combining these areas.
2) Key concepts covered include the Weil pairing as a symmetric bilinear pairing on elliptic curves, its properties of bilinearity and non-degeneracy, and efficient computation. Applications of elliptic curves in cryptography like ECDH and ECDSA are also summarized.
3) The security of protocols like ECDH and ECDSA relies on the assumed difficulty of solving the elliptic curve discrete logarithm problem (ECDLP). The document proves various mathematical aspects behind symmetric bilinear pairings and their use in elliptic curve cryptography.
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
Elliptic Curve Cryptography (ECC) gained a lot of attention in industry. The key attraction of ECC over RSA is that it
offers equal security even for smaller bit size, thus reducing the processing complexity. ECC Encryption and Decryption methods can
only perform encrypt and decrypt operations on the curve but not on the message. This paper presents a fast mapping method based on
matrix approach for ECC, which offers high security for the encrypted message. First, the alphabetic message is mapped on to the
points on an elliptic curve. Later encode those points using Elgamal encryption method with the use of a non-singular matrix. And the
encoded message can be decrypted by Elgamal decryption technique and to get back the original message, the matrix obtained from
decoding is multiplied with the inverse of non-singular matrix. The coding is done using Verilog. The design is simulated and
synthesized using FPGA.
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
The Elliptic Curve Digital Signature Algorithm (ECDSA) is an elliptic curve variant of the
Digital Signature Algorithm (DSA). It gives cryptographically strong digital signatures making
use of Elliptic curve discrete logarithmic problem. It uses arithmetic with much smaller
numbers 160/256 bits instead of 1024/2048 bits in RSA and DSA and provides the same level of
security. The ECDSA was accepted in 1999 as an ANSI standard, and was accepted in 2000 as
IEEE and NIST standards. It was also accepted in 1998 as an ISO standard. Many cryptologist
have studied security aspects of ECDSA and proposed different variants. In this paper, we
discuss a detailed analysis of the original ECDSA and all its available variants in terms of the
security level and execution time of all the phases. To the best of our knowledge, this is a unique
attempt to juxtapose and compare the ECDSA with all of its variants.
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Marisa Paryasto
This document discusses implementing elliptic curve cryptography using composite fields. It proposes using a 299-bit key represented in the composite field GF((213)23) instead of the conventional GF(2299). This breaks the finite field multiplication into smaller chunks by dividing the field into a ground field and extension field. A lookup table is used for multiplication in the ground field GF(213) while a classic multiplier is used for the extension field GF(23). This composite field approach aims to provide better time and area efficiency for implementation on FPGAs compared to a single large multiplier. The document provides background on elliptic curves, finite fields, and previous work on composite field representations.
The discrete logarithm problem (DLP) is the basis for elliptic curve cryptography (ECC) and differs from the integer factorization problem in RSA. In ECC over a finite field, the DLP is to find the exponent that computes one point on the elliptic curve as a multiple of another point, given the curve equation and two points. In RSA, the problem is to find the prime factors of a composite integer. While general algorithms exist to solve both, the DLP in ECC providing equivalent security to RSA requires smaller key sizes, making ECC more efficient.
This document provides an overview of kernel methods for machine learning. It discusses the evolution of learning methods from perceptrons in the 1950s to kernel methods in the 1990s. Kernel methods embed data into a higher-dimensional Hilbert space to allow for linear classification of non-linear relationships. The kernel trick replaces the inner product in this space with a kernel function, avoiding the need to explicitly define the embedding. Common kernel functions include polynomial kernels and Gaussian RBF kernels. The document provides code examples of kernel ridge regression in Python and discusses applications of string kernels and normalization techniques.
This document contains lecture notes on the design and analysis of algorithms. It covers topics like algorithm definition, complexity analysis, divide and conquer algorithms, greedy algorithms, dynamic programming, and NP-complete problems. The notes provide examples of algorithms like selection sort, towers of Hanoi, and generating permutations. Pseudocode is used to describe algorithms precisely yet readably.
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
Abstract: Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high security and short key. It is suitable for the hardware of implementation, so ECC has been more and more focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA. Index Terms – VHDL, FSM, FPGA, Elliptic Curve Cryptography.
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
Cryptography is the study of techniques for ensuring the secrecy and authentication of the
information. The development of public-key cryptography is the greatest and perhaps the only true revolution in
the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing
up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve
cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the
processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high
security and short key. It is suitable for the hardware of implementation, so ECC has been more and more
focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small
area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation
ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional
successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA
An improved spfa algorithm for single source shortest path problem using forw...IJMIT JOURNAL
We present an improved SPFA algorithm for the single source shortest path problem. For a random graph,
the empirical average time complexity is O(|E|), where |E| is the number of edges of the input network.
SPFA maintains a queue of candidate vertices and add a vertex to the queue only if that vertex is relaxed.
In the improved SPFA, MinPoP principle is employed to improve the quality of the queue. We theoretically
analyse the advantage of this new algorithm and experimentally demonstrate that the algorithm is efficient.
International Journal of Managing Information Technology (IJMIT)IJMIT JOURNAL
We present an improved SPFA algorithm for the single source shortest path problem. For a random graph, the empirical average time complexity is O(|E|), where |E| is the number of edges of the input network. SPFA maintains a queue of candidate vertices and add a vertex to the queue only if that vertex is relaxed. In the improved SPFA, MinPoP principle is employed to improve the quality of the queue. We theoretically analyse the advantage of this new algorithm and experimentally demonstrate that the algorithm is efficient
An improved spfa algorithm for single source shortest path problem using forw...IJMIT JOURNAL
We present an improved SPFA algorithm for the single source shortest path problem. For a random graph,
the empirical average time complexity is O(|E|), where |E| is the number of edges of the input network.
SPFA maintains a queue of candidate vertices and add a vertex to the queue only if that vertex is relaxed.
In the improved SPFA, MinPoP principle is employed to improve the quality of the queue. We theoretically
analyse the advantage of this new algorithm and experimentally demonstrate that the algorithm is efficient.
Dynamic programming is used to solve optimization problems by combining solutions to overlapping subproblems. It works by breaking down problems into subproblems, solving each subproblem only once, and storing the solutions in a table to avoid recomputing them. There are two key properties for applying dynamic programming: overlapping subproblems and optimal substructure. Some applications of dynamic programming include finding shortest paths, matrix chain multiplication, the traveling salesperson problem, and knapsack problems.
The document discusses computational complexity problems that are solvable in polynomial time but for which no significantly faster algorithms are known. It presents several such problems from areas like graph algorithms, computational biology, and computational geometry. It then discusses recent work that aims to establish conditional lower bounds for the runtime of such problems by relating their hardness to standard conjectures like 3SUM, APSP, SETH, orthogonal vectors, and small universe hitting set. Fine-grained reductions are used to show relationships between problems. Overall, the document outlines an approach for proving conditional lower bounds for problems solvable in polynomial time based on reasonable complexity theoretic conjectures.
Ecc cipher processor based on knapsack algorithmAlexander Decker
This document describes a method for encrypting messages using Elliptic Curve Cryptography (ECC) combined with the knapsack algorithm. It begins by explaining the basics of ECC, including defining elliptic curves over a finite field and describing point addition and doubling operations. It then presents algorithms for the full encryption/decryption process. The process involves first transforming the message into points on an elliptic curve, then applying the knapsack algorithm to further encrypt the ECC-encrypted message before transmission. Decryption reverses these steps to recover the original message. The combination of ECC and knapsack encryption is presented as an innovation that provides increased security over traditional ECC alone.
This document discusses algorithms and their analysis. It begins by defining an algorithm and its key characteristics like being finite, definite, and terminating after a finite number of steps. It then discusses designing algorithms to minimize cost and analyzing algorithms to predict their performance. Various algorithm design techniques are covered like divide and conquer, binary search, and its recursive implementation. Asymptotic notations like Big-O, Omega, and Theta are introduced to analyze time and space complexity. Specific algorithms like merge sort, quicksort, and their recursive implementations are explained in detail.
This document discusses dynamic programming and algorithms for solving all-pair shortest path problems. It begins by defining dynamic programming as avoiding recalculating solutions by storing results in a table. It then describes Floyd's algorithm for finding shortest paths between all pairs of nodes in a graph. The algorithm iterates through nodes, calculating shortest paths that pass through each intermediate node. It takes O(n3) time for a graph with n nodes. Finally, it discusses the multistage graph problem and provides forward and backward algorithms to find the minimum cost path from source to destination in a multistage graph in O(V+E) time, where V and E are the numbers of vertices and edges.
This document discusses dynamic programming and algorithms for solving all-pair shortest path problems. It begins by explaining dynamic programming as an optimization technique that works bottom-up by solving subproblems once and storing their solutions, rather than recomputing them. It then presents Floyd's algorithm for finding shortest paths between all pairs of nodes in a graph. The algorithm iterates through nodes, updating the shortest path lengths between all pairs that include that node by exploring paths through it. Finally, it discusses solving multistage graph problems using forward and backward methods that work through the graph stages in different orders.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
1. An Improvement of Baby Step Giant Step
Algorithm for Solving Elliptic Curve Discrete
Logarithmic Problem
A presentation on Dissertation
BY
SAUVIK BISWAS (16MT001409)
Under the guidance of
Prof. G. P. BISWAS
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
INDIAN INSTITUTE OF TECHNOLOGY (INDIAN SCHOOL OF MINES), DHANBAD
INDIA
MAY 2018
2. ACKNOWLEDGEMENT
• Prof. G. P. Biswas (Dept. of Computer Science & Engineering)
Prof. P. K. Jana (HOD, Dept. of Computer Science & Engineering)
• Asst. Prof. Hari Om (M.Tech CSE-IS Course Coordinator , Dept. of Computer
Science & Engineering)
3. Layout of Presentation
Overview of Cryptography
Symmetrical and Asymmetrical Encryption
Overview of ECC
Singular and Non-singular Elliptic Curve
Operations on Elliptic Curve
Elliptic Curve Discrete Logarithmic Problem
Literature Survey
Proposed approach on Baby Step Giant Step algorithm
Experimental Results
Complexity Analysis
Conclusion and References
4. • Cryptography is the study of mathematical techniques for the secure transmission
of a private message over an insecure channel.
• For many years, the concept of cryptography was used to ensure the safe transfer
of messages for military purposes. But these days, it is the security of ATM cards,
computer passwords, online bank transaction and electronic commerce that mainly
depends on cryptography.
Definition :
It is a method of storing and transmitting data in a particular form so that only those
for whom it is intended can read and process it
a
b
Overview of Cryptography
Hello
(Plaintext)
ᴪᴨ♦ᴧᴦ
(Ciphertext)
b
5. Layout of Presentation
Overview of Cryptography
Symmetrical and Asymmetrical Encryption
Overview of ECC
Singular and Non-singular Elliptic Curve
Operations on Elliptic Curve
Elliptic Curve Discrete Logarithmic Problem
Literature Survey
Proposed approach on Baby Step Giant Step algorithm
Experimental Results
Complexity Analysis
Conclusion and References
6. Symmetrical and Asymmetrical Encryption
Symmetrical Encryption :
This is the simplest kind of encryption that involves only one secret key to cipher and
decipher information. Symmetrical encryption is an old and best-known technique.
7. Symmetrical and Asymmetrical
Encryption(Cont.)
Asymmetrical Encryption :
Asymmetrical Encryption or Public key Cryptography, is an encryption scheme
that uses two mathematically related, but not identical, keys - a public key and a
private key. Unlike symmetric key algorithms that rely on one key to both encrypt
and decrypt, each key performs a unique function. The public key is used to
encrypt and the private key is used to decrypt. It ensures that malicious persons
do not misuse the keys.
8. Layout of Presentation
Overview of Cryptography
Symmetrical Encryption and Asymmetrical Encryption
Overview of ECC
Singular and Non-singular Elliptic Curve
Operations on Elliptic Curve
Elliptic Curve Discrete Logarithmic Problem
Literature Survey
Proposed approach on Baby Step Giant Step algorithm
Experimental Results
Complexity Analysis
Conclusion and References
9. Overview of ECC
Generalized Weierstrass Equation of elliptic curves:
Let Fp be a field. An elliptic curve E over Fp is defined by the Weierstrass equation
y2
+ a1xy + a3y = x3
+ a2x2
+ a4x + a6 ,
• Char Fp = 2
y2
+ xy = x3
+ ax2
+ b , where a,b ∈ Fp
• Char Fp = 3
y2
= x3
+ b2x2
+ b4x + b6 , where bi ∈ Fp
• Char Fp ≠ 2,3
y2
= x3
+ ax + b , where a,b ∈ Fp
where ai ∈ Fp
10. Overview of ECC(Cont.)
Definition :
An elliptic curveE is the graph of the equation
E : y2
= x3
+ ax + b where a and b areelementsfrom field Fp of characteristic ≠ 2.
We’ll also include the point (∞, ∞), denoted as infinity.
Figure: y2 = x3 + x Figure: y2 = x3 + 73
11. Layout of Presentation
Overview of Cryptography
Symmetrical Encryption and Asymmetrical Encryption
Overview of ECC
Singular and Non-singular Elliptic Curve
Operations on Elliptic Curve
Elliptic Curve Discrete Logarithmic Problem
Literature Survey
Proposed approach on Baby Step Giant Step algorithm
Experimental Results
Complexity Analysis
Conclusion and References
12. Singular and Non-singular Elliptic Curve
If 4a³ + 27b² = 0, then we have a singular elliptic curve
This could potentially lead to having to not having 3 distinct
roots
Therefore, we must deal with non-singular elliptic curves with
the condition 4a³ + 27b² ≠ 0, in order to assure that we have 3
distinct roots.
13. Layout of Presentation
Overview of Cryptography
Symmetrical Encryption and Asymmetrical Encryption
Overview of ECC
Singular and Non-singular Elliptic Curve
Operations on Elliptic Curve
Elliptic Curve Discrete Logarithmic Problem
Literature Survey
Proposed approach on Baby Step Giant Step algorithm
Experimental Results
Complexity Analysis
Conclusion and References
15. Operations on Elliptic Curve(Cont.)
Suppose P, Q ∈ E, where P = (x1,y1) and Q = (x2,y2), we must
consider three cases:
1) x1 ≠ x2
2) x1 = x2 and y1 = - y2
3) x1 = x2 and y1 = y2
These cases must be considered when defining “addition” for
our solution set
16. Operations on Elliptic Curve(Cont.)
Case 1 ( x1 ≠ x2 )
(x1,y1) + (x2,y2) = (x3,y3) ∈ E, where x3 = λ² - x1 - x2 ,y3 = λ(x1 – x3) - y1, and
λ = (y2 – y1) / (x2 – x1)
Case 2 (x1 = x2 and y1 = - y2 )
(x1,y1) + (x2,y2) = (x3,y3) ∈ E
(x,y) + (x,-y) = O, the point at infinity
x3 = λ² - ( x1 - x2 ),y3 = λ(x1 – x3) - y1, and λ = (y2 – y1) / (x2 – x1)
Case 3 (x1 = x2 and y1 = y2)
(x1,y1) + (x2,y2) = (x3,y3) ∈ E where x3 = λ² - ( x1 - x2 ),y3 = λ(x1 – x3) - y1, and
λ = (3x1
2 + a) / 2y1
17. Operations on Elliptic Curve(Cont.)
Point Addition :
SupposeEis defined asy 2 ≡ x 3 + 4x + 4 (mod 5). Let P= (1, 2) , Q = (4, 3)
Then
P + Q = (1,2) + (4,3) = (4,2)
Point Doubling:
SupposeEis defined asy 2≡x 3+ 2x + 2 (mod 17). Let P = (5, 1).
Then
P + P = 2P = (6,3)
18. Layout of Presentation
Overview of Cryptography
Symmetrical Encryption and Asymmetrical Encryption
Overview of ECC
Singular and Non-singular Elliptic Curve
Operations on Elliptic Curve
Elliptic Curve Discrete Logarithmic Problem
Literature Survey
Proposed approach on Baby Step Giant Step algorithm
Experimental Results
Complexity Analysis
Conclusion and References
19. Elliptic Curve Discrete Logarithmic Problem
The strength of the ECC security is reliant on the ECDLP. This problem can be
defined as follows.
Let P has order n, which belongs to the points of an elliptic curve defined over
the field Fp and another point Q ∈ < P > then finding k ∈ [1, n – 1] such
that Q = [k]P = P ⊕ P ⊕ . . . ⊕ P is called the
k times
discrete log of Q to the base P which is symbolized by k = logPQ Because k can
be inferred from Q if the ECDLP is easy, so the difficulty of the ECDLP plays a
crucial role in the security of these Elliptic Curve Cryptographic system.
20. Layout of Presentation
Overview of Cryptography
Symmetrical Encryption and Asymmetrical Encryption
Overview of ECC
Singular and Non-singular Elliptic Curve
Operations on Elliptic Curve
Elliptic Curve Discrete Logarithmic Problem
Literature Survey
Proposed approach on Baby Step Giant Step algorithm
Experimental Results
Complexity Analysis
Conclusion and References
21. Literature Survey
• The elliptic curve cryptosystems that is dependent on public key
cryptosystem were first proposed separately by Koblitz and Miller in 1985.
• The security of these cryptographic systems is reliant on the hardness of
solving the discrete logarithm problem on elliptic curves (ECDLP). These
schemes will be broken easily if this problem can be resolved efficiently.
• Pollard’s Rho method is present known as the fastest algorithm to resolve
the discrete logarithm problem on elliptic curves.
• Baby Step and Giant Step is also a good algorithm to solve the problem
because its mathematical operations is less than other approaches.
22. Literature Survey(Cont.)
Hasse’s Theorem:
Let E be an elliptic curve over the finite field, Fp, then the order of E(Fp) is
denoted by #E(Fp). We have a bound for #E(Fp) given by Hasse’s Theorem.
Then the interval is
𝑝 + 1 + 2 𝑝 ≥ #𝐸(𝐹𝑝) ≥ p + 1 − 2 𝑝
• We will provide a better approach of Baby Step Giant Step method to solve the
ECDLP. After that, the developed method will be analyzed by giving examples.
23. Layout of Presentation
Overview of Cryptography
Symmetrical Encryption and Asymmetrical Encryption
Overview of ECC
Singular and Non-singular Elliptic Curve
Operations on Elliptic Curve
Elliptic Curve Discrete Logarithmic Problem
Literature Survey
Proposed approach on Baby Step Giant Step algorithm
Experimental Results
Complexity Analysis
Conclusion and References
24. Proposed approach on Baby Step Giant Step
algorithm
We are going to propose an approach of Baby Step Giant Step algorithm for
solving ECDLP recalling the DLP problem. In this algorithm we are using Baby
Step set size a, where 0 < i <
m
2
. So this algorithm has faster Baby Step faster
precomputation runtime complexity and reduced number of Baby Step set,
where N = #E(Fp).We have to find a n that exists such that Q = [𝐤]P.
Proposed Approach :
calculation of m : Here we ate taking the value of m > N, where N is
order of elliptic curve E over prime field Fp.
calculation of mP : In this step we will compute the value of mP.
25. Proposed approach on Baby Step Giant Step
algorithm(Cont.)
creating Baby Step set :We will calculate each i𝑃 and store it in an array of
list for i = 0 to i =
m
2
− 1 and create Baby Step set.
creating Giant Step set : Here we compute each jmP and store it in an
array of list for j = 0 to j = m − 1 for creating Giant Step set.
sorting : We then sort the Baby Step and Giant Step set in some consistent
way.
Comparing sets : We will Compare the Baby Step set and Giant Step set
until a pair i, j such that iP = Q - jmP is found.
getting value of k : Return k ≡ i + jm (mod N) which we are looking for
26. Layout of Presentation
Overview of Cryptography
Symmetrical Encryption and Asymmetrical Encryption
Overview of ECC
Singular and Non-singular Elliptic Curve
Operations on Elliptic Curve
Elliptic Curve Discrete Logarithmic Problem
Literature Survey
Proposed approach on Baby Step Giant Step algorithm
Experimental Results
Complexity Analysis
Conclusion and References
27. Experimental Results
Example (1): Elliptic curve equation y2
= x3
+ 4x + 10 over prime field F19. Intruder got the
plaintext as P(2,8) and ciphertext Q(16,3).Now he wants to find k.
Previous method :
Baby Step Set Giant Step Set
1𝑃 => 2,8 2,8
2𝑃 => 16,16 10,10
3𝑃 => 18,10 6,16
4𝑃 => 10,10 2,11
Order of point P => 22
Hasee’s interval => 11.28 <=> 28.71
Final answer => 9𝑃
Final point is => 9𝑃 16,3
Execution time : 0.164 sec
28. Experimental Results(Cont.)
Example (1): Elliptic curve equation y2
= x3
+ 4x + 10 over prime field F19. Intruder got the
plaintext as P(2,8) and ciphertext Q(16,3).Now he wants to find k.
Proposed method :
Baby Step Set Giant Step Set
1𝑃 => 2,8 2,8
2𝑃 => 16,16 10,10
3𝑃 => 18,10 6,16
2,11
Order of point P => 22
Hasee’s interval => 11.28 <=> 28.71
Final answer => 9𝑃
Final point is => 9𝑃 16,3
Execution time : 0.094 sec
29. Experimental Results(Cont.)
Example (2): Elliptic curve equation y2
= x3
+ 5x + 12 over prime field F23. Intruder got the
plaintext as P(11,15) and ciphertext Q(22,12).Now he wants to find k.
Previous method :
Baby Step Set Giant Step Set
1𝑃 => 11,15 11,15
2𝑃 => 1,8 8,14
3𝑃 => 20,4 3,15
4𝑃 => 4,2 8,9
Order of point P => 15
Hasee’s interval => 14.4 <=> 33.59
Final answer => 9𝑃
Final point is => 9𝑃 22,12
Execution time : 0.359 sec
30. Experimental Results(Cont.)
Example (2): Elliptic curve equation y2
= x3
+ 5x + 12 over prime field F23. Intruder got the
plaintext as P(11,15) and ciphertext Q(22,12).Now he wants to find k.
Proposed method :
Baby Step Set Giant Step Set
1𝑃 => 11,15 11,15
2𝑃 => 1,8 8,14
3𝑃 => 20,4 3,15
8,9
Order of point P => 15
Hasee’s interval => 14.4 <=> 33.59
Final answer => 9𝑃
Final point is => 9𝑃 22,12
Execution time : 0.266 sec
32. Layout of Presentation
Overview of Cryptography
Symmetrical Encryption and Asymmetrical Encryption
Overview of ECC
Singular and Non-singular Elliptic Curve
Operations on Elliptic Curve
Elliptic Curve Discrete Logarithmic Problem
Literature Survey
Proposed approach on Baby Step Giant Step algorithm
Experimental Results
Complexity Analysis
Conclusion and References.
33. Complexity Analysis
In previous we find that the running time is on the order of N. The storage space
needed is also on the order of N, as that is how much space is needed to store
the lists in steps 3 and 4.
• In proposed method we have done a little betterment in solving the problem using
Baby Step Giant Step algorithm. Proposed method step 4 we are calculating the
Baby step set. Previous method takes 0 < j ≤ m − 1 step size. Proposed method
we are restricting the upper bound to
m
2
− 1 that is 0 < j ≤
m
2
− 1.
• This process gives almost 141.42% betterment in precomputation of Baby step set
and required less storage than of original baby Step Giant Step storage
requirements.
34. Layout of Presentation
Overview of Cryptography
Symmetrical Encryption and Asymmetrical Encryption
Overview of ECC
Singular and Non-singular Elliptic Curve
Operations on Elliptic Curve
Elliptic Curve Discrete Logarithmic Problem
Literature Survey
Proposed approach on Baby Step Giant Step algorithm
Experimental Results
Complexity Analysis
Conclusion and References
35. Conclusion
• We have presented an introduction of Elliptic Curve Cryptography. This project
we gave a brief overview about the discrete Logarithmic problem. We have
revealed an enhanced algorithm for solving the problem ECDLP.
• Here we restricted the upper bound step size of Baby step set. It gives a smaller
no of Baby Step set comparing to the previous method.
• Our algorithm has faster Baby Step precomputation and less storage
requirement than of original baby Step Giant Step storage requirements.
• This indicates proposed algorithm is having a lower overhead that has
comparatively smaller list to be fitted in the memory quickly
36. References
1) D. Kohel. Cryptography. 2007. Lecture notes are available at
http://enchidna.maths.usyd.edu .au/~kohel/res/index.html.
2) https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-
differences
3) https://www.globalsign.com/en-in/ssl-information-center/what-is-public-key-
cryptography/
4) https://www.slideshare.net/KellyBresnahan/elliptic-curve-cryptography-66406021
5) https://www.cs.clemson.edu/course/cpsc420/presentations/Spring2007/Elliptic%2
0Curve%20Cryptography.ppt
6) https://arxiv.org/ftp/arxiv/papers/1607/1607.05901.pdf
7) Hankerson et al., 2004 ; Chee and Park, 2005)
8) https://www.cs.cmu.edu/~adamchik/15-
121/lectures/Algorithmic%20Complexity/complexity. html
9) http://bigocheatsheet.com
10) https://ocw.mit.edu/courses/mathematics/18-704-seminar-in-algebra-and-
number-theory-rational-points-on-elliptic-curves-fall2004/projects/asarina.pdf