SlideShare a Scribd company logo
An Improvement of Baby Step Giant Step
Algorithm for Solving Elliptic Curve Discrete
Logarithmic Problem
A presentation on Dissertation
BY
SAUVIK BISWAS (16MT001409)
Under the guidance of
Prof. G. P. BISWAS
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
INDIAN INSTITUTE OF TECHNOLOGY (INDIAN SCHOOL OF MINES), DHANBAD
INDIA
MAY 2018
ACKNOWLEDGEMENT
• Prof. G. P. Biswas (Dept. of Computer Science & Engineering)
 Prof. P. K. Jana (HOD, Dept. of Computer Science & Engineering)
• Asst. Prof. Hari Om (M.Tech CSE-IS Course Coordinator , Dept. of Computer
Science & Engineering)
Layout of Presentation
 Overview of Cryptography
 Symmetrical and Asymmetrical Encryption
 Overview of ECC
 Singular and Non-singular Elliptic Curve
 Operations on Elliptic Curve
 Elliptic Curve Discrete Logarithmic Problem
 Literature Survey
 Proposed approach on Baby Step Giant Step algorithm
 Experimental Results
 Complexity Analysis
 Conclusion and References
• Cryptography is the study of mathematical techniques for the secure transmission
of a private message over an insecure channel.
• For many years, the concept of cryptography was used to ensure the safe transfer
of messages for military purposes. But these days, it is the security of ATM cards,
computer passwords, online bank transaction and electronic commerce that mainly
depends on cryptography.
Definition :
It is a method of storing and transmitting data in a particular form so that only those
for whom it is intended can read and process it
a
b
Overview of Cryptography
Hello
(Plaintext)
ᴪᴨ♦ᴧᴦ
(Ciphertext)
b
Layout of Presentation
 Overview of Cryptography
 Symmetrical and Asymmetrical Encryption
 Overview of ECC
 Singular and Non-singular Elliptic Curve
 Operations on Elliptic Curve
 Elliptic Curve Discrete Logarithmic Problem
 Literature Survey
 Proposed approach on Baby Step Giant Step algorithm
 Experimental Results
 Complexity Analysis
 Conclusion and References
Symmetrical and Asymmetrical Encryption
Symmetrical Encryption :
This is the simplest kind of encryption that involves only one secret key to cipher and
decipher information. Symmetrical encryption is an old and best-known technique.
Symmetrical and Asymmetrical
Encryption(Cont.)
Asymmetrical Encryption :
Asymmetrical Encryption or Public key Cryptography, is an encryption scheme
that uses two mathematically related, but not identical, keys - a public key and a
private key. Unlike symmetric key algorithms that rely on one key to both encrypt
and decrypt, each key performs a unique function. The public key is used to
encrypt and the private key is used to decrypt. It ensures that malicious persons
do not misuse the keys.
Layout of Presentation
 Overview of Cryptography
 Symmetrical Encryption and Asymmetrical Encryption
 Overview of ECC
 Singular and Non-singular Elliptic Curve
 Operations on Elliptic Curve
 Elliptic Curve Discrete Logarithmic Problem
 Literature Survey
 Proposed approach on Baby Step Giant Step algorithm
 Experimental Results
 Complexity Analysis
 Conclusion and References
Overview of ECC
Generalized Weierstrass Equation of elliptic curves:
Let Fp be a field. An elliptic curve E over Fp is defined by the Weierstrass equation
y2
+ a1xy + a3y = x3
+ a2x2
+ a4x + a6 ,
• Char Fp = 2
y2
+ xy = x3
+ ax2
+ b , where a,b ∈ Fp
• Char Fp = 3
y2
= x3
+ b2x2
+ b4x + b6 , where bi ∈ Fp
• Char Fp ≠ 2,3
y2
= x3
+ ax + b , where a,b ∈ Fp
where ai ∈ Fp
Overview of ECC(Cont.)
Definition :
An elliptic curveE is the graph of the equation
E : y2
= x3
+ ax + b where a and b areelementsfrom field Fp of characteristic ≠ 2.
We’ll also include the point (∞, ∞), denoted as infinity.
Figure: y2 = x3 + x Figure: y2 = x3 + 73
Layout of Presentation
 Overview of Cryptography
 Symmetrical Encryption and Asymmetrical Encryption
 Overview of ECC
 Singular and Non-singular Elliptic Curve
 Operations on Elliptic Curve
 Elliptic Curve Discrete Logarithmic Problem
 Literature Survey
 Proposed approach on Baby Step Giant Step algorithm
 Experimental Results
 Complexity Analysis
 Conclusion and References
Singular and Non-singular Elliptic Curve
 If 4a³ + 27b² = 0, then we have a singular elliptic curve
 This could potentially lead to having to not having 3 distinct
roots
 Therefore, we must deal with non-singular elliptic curves with
the condition 4a³ + 27b² ≠ 0, in order to assure that we have 3
distinct roots.
Layout of Presentation
 Overview of Cryptography
 Symmetrical Encryption and Asymmetrical Encryption
 Overview of ECC
 Singular and Non-singular Elliptic Curve
 Operations on Elliptic Curve
 Elliptic Curve Discrete Logarithmic Problem
 Literature Survey
 Proposed approach on Baby Step Giant Step algorithm
 Experimental Results
 Complexity Analysis
 Conclusion and References
Operations on Elliptic Curve
Point Addition Point Doubling
Operations on Elliptic Curve(Cont.)
 Suppose P, Q ∈ E, where P = (x1,y1) and Q = (x2,y2), we must
consider three cases:
1) x1 ≠ x2
2) x1 = x2 and y1 = - y2
3) x1 = x2 and y1 = y2
 These cases must be considered when defining “addition” for
our solution set
Operations on Elliptic Curve(Cont.)
 Case 1 ( x1 ≠ x2 )
(x1,y1) + (x2,y2) = (x3,y3) ∈ E, where x3 = λ² - x1 - x2 ,y3 = λ(x1 – x3) - y1, and
λ = (y2 – y1) / (x2 – x1)
 Case 2 (x1 = x2 and y1 = - y2 )
(x1,y1) + (x2,y2) = (x3,y3) ∈ E
(x,y) + (x,-y) = O, the point at infinity
x3 = λ² - ( x1 - x2 ),y3 = λ(x1 – x3) - y1, and λ = (y2 – y1) / (x2 – x1)
 Case 3 (x1 = x2 and y1 = y2)
(x1,y1) + (x2,y2) = (x3,y3) ∈ E where x3 = λ² - ( x1 - x2 ),y3 = λ(x1 – x3) - y1, and
λ = (3x1
2 + a) / 2y1
Operations on Elliptic Curve(Cont.)
 Point Addition :
SupposeEis defined asy 2 ≡ x 3 + 4x + 4 (mod 5). Let P= (1, 2) , Q = (4, 3)
Then
P + Q = (1,2) + (4,3) = (4,2)
 Point Doubling:
SupposeEis defined asy 2≡x 3+ 2x + 2 (mod 17). Let P = (5, 1).
Then
P + P = 2P = (6,3)
Layout of Presentation
 Overview of Cryptography
 Symmetrical Encryption and Asymmetrical Encryption
 Overview of ECC
 Singular and Non-singular Elliptic Curve
 Operations on Elliptic Curve
 Elliptic Curve Discrete Logarithmic Problem
 Literature Survey
 Proposed approach on Baby Step Giant Step algorithm
 Experimental Results
 Complexity Analysis
 Conclusion and References
Elliptic Curve Discrete Logarithmic Problem
The strength of the ECC security is reliant on the ECDLP. This problem can be
defined as follows.
Let P has order n, which belongs to the points of an elliptic curve defined over
the field Fp and another point Q ∈ < P > then finding k ∈ [1, n – 1] such
that Q = [k]P = P ⊕ P ⊕ . . . ⊕ P is called the
k times
discrete log of Q to the base P which is symbolized by k = logPQ Because k can
be inferred from Q if the ECDLP is easy, so the difficulty of the ECDLP plays a
crucial role in the security of these Elliptic Curve Cryptographic system.
Layout of Presentation
 Overview of Cryptography
 Symmetrical Encryption and Asymmetrical Encryption
 Overview of ECC
 Singular and Non-singular Elliptic Curve
 Operations on Elliptic Curve
 Elliptic Curve Discrete Logarithmic Problem
 Literature Survey
 Proposed approach on Baby Step Giant Step algorithm
 Experimental Results
 Complexity Analysis
 Conclusion and References
Literature Survey
• The elliptic curve cryptosystems that is dependent on public key
cryptosystem were first proposed separately by Koblitz and Miller in 1985.
• The security of these cryptographic systems is reliant on the hardness of
solving the discrete logarithm problem on elliptic curves (ECDLP). These
schemes will be broken easily if this problem can be resolved efficiently.
• Pollard’s Rho method is present known as the fastest algorithm to resolve
the discrete logarithm problem on elliptic curves.
• Baby Step and Giant Step is also a good algorithm to solve the problem
because its mathematical operations is less than other approaches.
Literature Survey(Cont.)
Hasse’s Theorem:
Let E be an elliptic curve over the finite field, Fp, then the order of E(Fp) is
denoted by #E(Fp). We have a bound for #E(Fp) given by Hasse’s Theorem.
Then the interval is
𝑝 + 1 + 2 𝑝 ≥ #𝐸(𝐹𝑝) ≥ p + 1 − 2 𝑝
• We will provide a better approach of Baby Step Giant Step method to solve the
ECDLP. After that, the developed method will be analyzed by giving examples.
Layout of Presentation
 Overview of Cryptography
 Symmetrical Encryption and Asymmetrical Encryption
 Overview of ECC
 Singular and Non-singular Elliptic Curve
 Operations on Elliptic Curve
 Elliptic Curve Discrete Logarithmic Problem
 Literature Survey
 Proposed approach on Baby Step Giant Step algorithm
 Experimental Results
 Complexity Analysis
 Conclusion and References
Proposed approach on Baby Step Giant Step
algorithm
We are going to propose an approach of Baby Step Giant Step algorithm for
solving ECDLP recalling the DLP problem. In this algorithm we are using Baby
Step set size a, where 0 < i <
m
2
. So this algorithm has faster Baby Step faster
precomputation runtime complexity and reduced number of Baby Step set,
where N = #E(Fp).We have to find a n that exists such that Q = [𝐤]P.
Proposed Approach :
 calculation of m : Here we ate taking the value of m > N, where N is
order of elliptic curve E over prime field Fp.
 calculation of mP : In this step we will compute the value of mP.
Proposed approach on Baby Step Giant Step
algorithm(Cont.)
 creating Baby Step set :We will calculate each i𝑃 and store it in an array of
list for i = 0 to i =
m
2
− 1 and create Baby Step set.
 creating Giant Step set : Here we compute each jmP and store it in an
array of list for j = 0 to j = m − 1 for creating Giant Step set.
 sorting : We then sort the Baby Step and Giant Step set in some consistent
way.
 Comparing sets : We will Compare the Baby Step set and Giant Step set
until a pair i, j such that iP = Q - jmP is found.
 getting value of k : Return k ≡ i + jm (mod N) which we are looking for
Layout of Presentation
 Overview of Cryptography
 Symmetrical Encryption and Asymmetrical Encryption
 Overview of ECC
 Singular and Non-singular Elliptic Curve
 Operations on Elliptic Curve
 Elliptic Curve Discrete Logarithmic Problem
 Literature Survey
 Proposed approach on Baby Step Giant Step algorithm
 Experimental Results
 Complexity Analysis
 Conclusion and References
Experimental Results
Example (1): Elliptic curve equation y2
= x3
+ 4x + 10 over prime field F19. Intruder got the
plaintext as P(2,8) and ciphertext Q(16,3).Now he wants to find k.
Previous method :
Baby Step Set Giant Step Set
1𝑃 => 2,8 2,8
2𝑃 => 16,16 10,10
3𝑃 => 18,10 6,16
4𝑃 => 10,10 2,11
Order of point P => 22
Hasee’s interval => 11.28 <=> 28.71
Final answer => 9𝑃
Final point is => 9𝑃 16,3
Execution time : 0.164 sec
Experimental Results(Cont.)
Example (1): Elliptic curve equation y2
= x3
+ 4x + 10 over prime field F19. Intruder got the
plaintext as P(2,8) and ciphertext Q(16,3).Now he wants to find k.
Proposed method :
Baby Step Set Giant Step Set
1𝑃 => 2,8 2,8
2𝑃 => 16,16 10,10
3𝑃 => 18,10 6,16
2,11
Order of point P => 22
Hasee’s interval => 11.28 <=> 28.71
Final answer => 9𝑃
Final point is => 9𝑃 16,3
Execution time : 0.094 sec
Experimental Results(Cont.)
Example (2): Elliptic curve equation y2
= x3
+ 5x + 12 over prime field F23. Intruder got the
plaintext as P(11,15) and ciphertext Q(22,12).Now he wants to find k.
Previous method :
Baby Step Set Giant Step Set
1𝑃 => 11,15 11,15
2𝑃 => 1,8 8,14
3𝑃 => 20,4 3,15
4𝑃 => 4,2 8,9
Order of point P => 15
Hasee’s interval => 14.4 <=> 33.59
Final answer => 9𝑃
Final point is => 9𝑃 22,12
Execution time : 0.359 sec
Experimental Results(Cont.)
Example (2): Elliptic curve equation y2
= x3
+ 5x + 12 over prime field F23. Intruder got the
plaintext as P(11,15) and ciphertext Q(22,12).Now he wants to find k.
Proposed method :
Baby Step Set Giant Step Set
1𝑃 => 11,15 11,15
2𝑃 => 1,8 8,14
3𝑃 => 20,4 3,15
8,9
Order of point P => 15
Hasee’s interval => 14.4 <=> 33.59
Final answer => 9𝑃
Final point is => 9𝑃 22,12
Execution time : 0.266 sec
Experimental Results(Cont.)
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
Example (1) Example (2)
Execution Time(sec)
Previous Method Proposed Method
Layout of Presentation
 Overview of Cryptography
 Symmetrical Encryption and Asymmetrical Encryption
 Overview of ECC
 Singular and Non-singular Elliptic Curve
 Operations on Elliptic Curve
 Elliptic Curve Discrete Logarithmic Problem
 Literature Survey
 Proposed approach on Baby Step Giant Step algorithm
 Experimental Results
 Complexity Analysis
 Conclusion and References.
Complexity Analysis
 In previous we find that the running time is on the order of N. The storage space
needed is also on the order of N, as that is how much space is needed to store
the lists in steps 3 and 4.
• In proposed method we have done a little betterment in solving the problem using
Baby Step Giant Step algorithm. Proposed method step 4 we are calculating the
Baby step set. Previous method takes 0 < j ≤ m − 1 step size. Proposed method
we are restricting the upper bound to
m
2
− 1 that is 0 < j ≤
m
2
− 1.
• This process gives almost 141.42% betterment in precomputation of Baby step set
and required less storage than of original baby Step Giant Step storage
requirements.
Layout of Presentation
 Overview of Cryptography
 Symmetrical Encryption and Asymmetrical Encryption
 Overview of ECC
 Singular and Non-singular Elliptic Curve
 Operations on Elliptic Curve
 Elliptic Curve Discrete Logarithmic Problem
 Literature Survey
 Proposed approach on Baby Step Giant Step algorithm
 Experimental Results
 Complexity Analysis
 Conclusion and References
Conclusion
• We have presented an introduction of Elliptic Curve Cryptography. This project
we gave a brief overview about the discrete Logarithmic problem. We have
revealed an enhanced algorithm for solving the problem ECDLP.
• Here we restricted the upper bound step size of Baby step set. It gives a smaller
no of Baby Step set comparing to the previous method.
• Our algorithm has faster Baby Step precomputation and less storage
requirement than of original baby Step Giant Step storage requirements.
• This indicates proposed algorithm is having a lower overhead that has
comparatively smaller list to be fitted in the memory quickly
References
1) D. Kohel. Cryptography. 2007. Lecture notes are available at
http://enchidna.maths.usyd.edu .au/~kohel/res/index.html.
2) https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-
differences
3) https://www.globalsign.com/en-in/ssl-information-center/what-is-public-key-
cryptography/
4) https://www.slideshare.net/KellyBresnahan/elliptic-curve-cryptography-66406021
5) https://www.cs.clemson.edu/course/cpsc420/presentations/Spring2007/Elliptic%2
0Curve%20Cryptography.ppt
6) https://arxiv.org/ftp/arxiv/papers/1607/1607.05901.pdf
7) Hankerson et al., 2004 ; Chee and Park, 2005)
8) https://www.cs.cmu.edu/~adamchik/15-
121/lectures/Algorithmic%20Complexity/complexity. html
9) http://bigocheatsheet.com
10) https://ocw.mit.edu/courses/mathematics/18-704-seminar-in-algebra-and-
number-theory-rational-points-on-elliptic-curves-fall2004/projects/asarina.pdf
References(Cont.)
11) https://ee.stanford.edu/~hellman/publications/24.pdf
12) https://ieeexplore.ieee.org/document/5992208/metrics
13) https://link.springer.com/article/10.1007%2FBF01933667
14) https://en.wikipedia.org/wiki/Baby-step_giant-step
Thank You

More Related Content

What's hot

1524 elliptic curve cryptography
1524 elliptic curve cryptography1524 elliptic curve cryptography
1524 elliptic curve cryptography
Dr Fereidoun Dejahang
 
Integration material
Integration material Integration material
Integration material
Surya Swaroop
 
Lecture26
Lecture26Lecture26
AbdoSummerANS_mod3
AbdoSummerANS_mod3AbdoSummerANS_mod3
AbdoSummerANS_mod3
Mohammad Abdo
 
elliptic-curves-modern
elliptic-curves-modernelliptic-curves-modern
elliptic-curves-modern
Eric Seifert
 
A Numerical Analytic Continuation and Its Application to Fourier Transform
A Numerical Analytic Continuation and Its Application to Fourier TransformA Numerical Analytic Continuation and Its Application to Fourier Transform
A Numerical Analytic Continuation and Its Application to Fourier Transform
HidenoriOgata
 
Approximation algorithms
Approximation algorithmsApproximation algorithms
Approximation algorithms
Ganesh Solanke
 
Design and Analysis of Algorithms
Design and Analysis of AlgorithmsDesign and Analysis of Algorithms
Design and Analysis of Algorithms
Arvind Krishnaa
 
Machine learning pt.1: Artificial Neural Networks ® All Rights Reserved
Machine learning pt.1: Artificial Neural Networks ® All Rights ReservedMachine learning pt.1: Artificial Neural Networks ® All Rights Reserved
Machine learning pt.1: Artificial Neural Networks ® All Rights Reserved
Jonathan Mitchell
 
Muchtadi
MuchtadiMuchtadi
26 Machine Learning Unsupervised Fuzzy C-Means
26 Machine Learning Unsupervised Fuzzy C-Means26 Machine Learning Unsupervised Fuzzy C-Means
26 Machine Learning Unsupervised Fuzzy C-Means
Andres Mendez-Vazquez
 
Cheatsheet supervised-learning
Cheatsheet supervised-learningCheatsheet supervised-learning
Cheatsheet supervised-learning
Steve Nouri
 
Matrix Completion Presentation
Matrix Completion PresentationMatrix Completion Presentation
Matrix Completion Presentation
Michael Hankin
 
Exact Matrix Completion via Convex Optimization Slide (PPT)
Exact Matrix Completion via Convex Optimization Slide (PPT)Exact Matrix Completion via Convex Optimization Slide (PPT)
Exact Matrix Completion via Convex Optimization Slide (PPT)
Joonyoung Yi
 
Cheatsheet unsupervised-learning
Cheatsheet unsupervised-learningCheatsheet unsupervised-learning
Cheatsheet unsupervised-learning
Steve Nouri
 
Lec09- AI
Lec09- AILec09- AI
Lec09- AI
drmbalu
 
Particle Filters and Applications in Computer Vision
Particle Filters and Applications in Computer VisionParticle Filters and Applications in Computer Vision
Particle Filters and Applications in Computer Vision
zukun
 
Meta-learning and the ELBO
Meta-learning and the ELBOMeta-learning and the ELBO
Meta-learning and the ELBO
Yoonho Lee
 
algorithm Unit 4
algorithm Unit 4 algorithm Unit 4
algorithm Unit 4
Monika Choudhery
 
Introduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve CryptographyIntroduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve Cryptography
David Evans
 

What's hot (20)

1524 elliptic curve cryptography
1524 elliptic curve cryptography1524 elliptic curve cryptography
1524 elliptic curve cryptography
 
Integration material
Integration material Integration material
Integration material
 
Lecture26
Lecture26Lecture26
Lecture26
 
AbdoSummerANS_mod3
AbdoSummerANS_mod3AbdoSummerANS_mod3
AbdoSummerANS_mod3
 
elliptic-curves-modern
elliptic-curves-modernelliptic-curves-modern
elliptic-curves-modern
 
A Numerical Analytic Continuation and Its Application to Fourier Transform
A Numerical Analytic Continuation and Its Application to Fourier TransformA Numerical Analytic Continuation and Its Application to Fourier Transform
A Numerical Analytic Continuation and Its Application to Fourier Transform
 
Approximation algorithms
Approximation algorithmsApproximation algorithms
Approximation algorithms
 
Design and Analysis of Algorithms
Design and Analysis of AlgorithmsDesign and Analysis of Algorithms
Design and Analysis of Algorithms
 
Machine learning pt.1: Artificial Neural Networks ® All Rights Reserved
Machine learning pt.1: Artificial Neural Networks ® All Rights ReservedMachine learning pt.1: Artificial Neural Networks ® All Rights Reserved
Machine learning pt.1: Artificial Neural Networks ® All Rights Reserved
 
Muchtadi
MuchtadiMuchtadi
Muchtadi
 
26 Machine Learning Unsupervised Fuzzy C-Means
26 Machine Learning Unsupervised Fuzzy C-Means26 Machine Learning Unsupervised Fuzzy C-Means
26 Machine Learning Unsupervised Fuzzy C-Means
 
Cheatsheet supervised-learning
Cheatsheet supervised-learningCheatsheet supervised-learning
Cheatsheet supervised-learning
 
Matrix Completion Presentation
Matrix Completion PresentationMatrix Completion Presentation
Matrix Completion Presentation
 
Exact Matrix Completion via Convex Optimization Slide (PPT)
Exact Matrix Completion via Convex Optimization Slide (PPT)Exact Matrix Completion via Convex Optimization Slide (PPT)
Exact Matrix Completion via Convex Optimization Slide (PPT)
 
Cheatsheet unsupervised-learning
Cheatsheet unsupervised-learningCheatsheet unsupervised-learning
Cheatsheet unsupervised-learning
 
Lec09- AI
Lec09- AILec09- AI
Lec09- AI
 
Particle Filters and Applications in Computer Vision
Particle Filters and Applications in Computer VisionParticle Filters and Applications in Computer Vision
Particle Filters and Applications in Computer Vision
 
Meta-learning and the ELBO
Meta-learning and the ELBOMeta-learning and the ELBO
Meta-learning and the ELBO
 
algorithm Unit 4
algorithm Unit 4 algorithm Unit 4
algorithm Unit 4
 
Introduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve CryptographyIntroduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve Cryptography
 

Similar to Cryptography Baby Step Giant Step

SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRASYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA
BRNSS Publication Hub
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Editor IJCATR
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
csandit
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Marisa Paryasto
 
An Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyAn Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve Cryptography
Derek Callaway
 
Assignment 2 (1) (1).docx
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docx
pinstechwork
 
Lecture5.pptx
Lecture5.pptxLecture5.pptx
Lecture5.pptx
ARVIND SARDAR
 
DAA Notes.pdf
DAA Notes.pdfDAA Notes.pdf
DAA Notes.pdf
SauravPawar14
 
Design and Analysis of algorithms
Design and Analysis of algorithmsDesign and Analysis of algorithms
Design and Analysis of algorithms
Dr. Rupa Ch
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
IOSR Journals
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
IOSR Journals
 
An improved spfa algorithm for single source shortest path problem using forw...
An improved spfa algorithm for single source shortest path problem using forw...An improved spfa algorithm for single source shortest path problem using forw...
An improved spfa algorithm for single source shortest path problem using forw...
IJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
IJMIT JOURNAL
 
An improved spfa algorithm for single source shortest path problem using forw...
An improved spfa algorithm for single source shortest path problem using forw...An improved spfa algorithm for single source shortest path problem using forw...
An improved spfa algorithm for single source shortest path problem using forw...
IJMIT JOURNAL
 
unit-4-dynamic programming
unit-4-dynamic programmingunit-4-dynamic programming
unit-4-dynamic programming
hodcsencet
 
Fine Grained Complexity
Fine Grained ComplexityFine Grained Complexity
Fine Grained Complexity
AkankshaAgrawal55
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
Alexander Decker
 
Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture Notes
Sreedhar Chowdam
 
algorithm Unit 3
algorithm Unit 3algorithm Unit 3
algorithm Unit 3
Monika Choudhery
 
Unit 3 daa
Unit 3 daaUnit 3 daa
Unit 3 daa
Nv Thejaswini
 

Similar to Cryptography Baby Step Giant Step (20)

SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRASYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
 
An Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyAn Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve Cryptography
 
Assignment 2 (1) (1).docx
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docx
 
Lecture5.pptx
Lecture5.pptxLecture5.pptx
Lecture5.pptx
 
DAA Notes.pdf
DAA Notes.pdfDAA Notes.pdf
DAA Notes.pdf
 
Design and Analysis of algorithms
Design and Analysis of algorithmsDesign and Analysis of algorithms
Design and Analysis of algorithms
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
An improved spfa algorithm for single source shortest path problem using forw...
An improved spfa algorithm for single source shortest path problem using forw...An improved spfa algorithm for single source shortest path problem using forw...
An improved spfa algorithm for single source shortest path problem using forw...
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 
An improved spfa algorithm for single source shortest path problem using forw...
An improved spfa algorithm for single source shortest path problem using forw...An improved spfa algorithm for single source shortest path problem using forw...
An improved spfa algorithm for single source shortest path problem using forw...
 
unit-4-dynamic programming
unit-4-dynamic programmingunit-4-dynamic programming
unit-4-dynamic programming
 
Fine Grained Complexity
Fine Grained ComplexityFine Grained Complexity
Fine Grained Complexity
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture Notes
 
algorithm Unit 3
algorithm Unit 3algorithm Unit 3
algorithm Unit 3
 
Unit 3 daa
Unit 3 daaUnit 3 daa
Unit 3 daa
 

Recently uploaded

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 

Recently uploaded (20)

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 

Cryptography Baby Step Giant Step

  • 1. An Improvement of Baby Step Giant Step Algorithm for Solving Elliptic Curve Discrete Logarithmic Problem A presentation on Dissertation BY SAUVIK BISWAS (16MT001409) Under the guidance of Prof. G. P. BISWAS DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING INDIAN INSTITUTE OF TECHNOLOGY (INDIAN SCHOOL OF MINES), DHANBAD INDIA MAY 2018
  • 2. ACKNOWLEDGEMENT • Prof. G. P. Biswas (Dept. of Computer Science & Engineering)  Prof. P. K. Jana (HOD, Dept. of Computer Science & Engineering) • Asst. Prof. Hari Om (M.Tech CSE-IS Course Coordinator , Dept. of Computer Science & Engineering)
  • 3. Layout of Presentation  Overview of Cryptography  Symmetrical and Asymmetrical Encryption  Overview of ECC  Singular and Non-singular Elliptic Curve  Operations on Elliptic Curve  Elliptic Curve Discrete Logarithmic Problem  Literature Survey  Proposed approach on Baby Step Giant Step algorithm  Experimental Results  Complexity Analysis  Conclusion and References
  • 4. • Cryptography is the study of mathematical techniques for the secure transmission of a private message over an insecure channel. • For many years, the concept of cryptography was used to ensure the safe transfer of messages for military purposes. But these days, it is the security of ATM cards, computer passwords, online bank transaction and electronic commerce that mainly depends on cryptography. Definition : It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it a b Overview of Cryptography Hello (Plaintext) ᴪᴨ♦ᴧᴦ (Ciphertext) b
  • 5. Layout of Presentation  Overview of Cryptography  Symmetrical and Asymmetrical Encryption  Overview of ECC  Singular and Non-singular Elliptic Curve  Operations on Elliptic Curve  Elliptic Curve Discrete Logarithmic Problem  Literature Survey  Proposed approach on Baby Step Giant Step algorithm  Experimental Results  Complexity Analysis  Conclusion and References
  • 6. Symmetrical and Asymmetrical Encryption Symmetrical Encryption : This is the simplest kind of encryption that involves only one secret key to cipher and decipher information. Symmetrical encryption is an old and best-known technique.
  • 7. Symmetrical and Asymmetrical Encryption(Cont.) Asymmetrical Encryption : Asymmetrical Encryption or Public key Cryptography, is an encryption scheme that uses two mathematically related, but not identical, keys - a public key and a private key. Unlike symmetric key algorithms that rely on one key to both encrypt and decrypt, each key performs a unique function. The public key is used to encrypt and the private key is used to decrypt. It ensures that malicious persons do not misuse the keys.
  • 8. Layout of Presentation  Overview of Cryptography  Symmetrical Encryption and Asymmetrical Encryption  Overview of ECC  Singular and Non-singular Elliptic Curve  Operations on Elliptic Curve  Elliptic Curve Discrete Logarithmic Problem  Literature Survey  Proposed approach on Baby Step Giant Step algorithm  Experimental Results  Complexity Analysis  Conclusion and References
  • 9. Overview of ECC Generalized Weierstrass Equation of elliptic curves: Let Fp be a field. An elliptic curve E over Fp is defined by the Weierstrass equation y2 + a1xy + a3y = x3 + a2x2 + a4x + a6 , • Char Fp = 2 y2 + xy = x3 + ax2 + b , where a,b ∈ Fp • Char Fp = 3 y2 = x3 + b2x2 + b4x + b6 , where bi ∈ Fp • Char Fp ≠ 2,3 y2 = x3 + ax + b , where a,b ∈ Fp where ai ∈ Fp
  • 10. Overview of ECC(Cont.) Definition : An elliptic curveE is the graph of the equation E : y2 = x3 + ax + b where a and b areelementsfrom field Fp of characteristic ≠ 2. We’ll also include the point (∞, ∞), denoted as infinity. Figure: y2 = x3 + x Figure: y2 = x3 + 73
  • 11. Layout of Presentation  Overview of Cryptography  Symmetrical Encryption and Asymmetrical Encryption  Overview of ECC  Singular and Non-singular Elliptic Curve  Operations on Elliptic Curve  Elliptic Curve Discrete Logarithmic Problem  Literature Survey  Proposed approach on Baby Step Giant Step algorithm  Experimental Results  Complexity Analysis  Conclusion and References
  • 12. Singular and Non-singular Elliptic Curve  If 4a³ + 27b² = 0, then we have a singular elliptic curve  This could potentially lead to having to not having 3 distinct roots  Therefore, we must deal with non-singular elliptic curves with the condition 4a³ + 27b² ≠ 0, in order to assure that we have 3 distinct roots.
  • 13. Layout of Presentation  Overview of Cryptography  Symmetrical Encryption and Asymmetrical Encryption  Overview of ECC  Singular and Non-singular Elliptic Curve  Operations on Elliptic Curve  Elliptic Curve Discrete Logarithmic Problem  Literature Survey  Proposed approach on Baby Step Giant Step algorithm  Experimental Results  Complexity Analysis  Conclusion and References
  • 14. Operations on Elliptic Curve Point Addition Point Doubling
  • 15. Operations on Elliptic Curve(Cont.)  Suppose P, Q ∈ E, where P = (x1,y1) and Q = (x2,y2), we must consider three cases: 1) x1 ≠ x2 2) x1 = x2 and y1 = - y2 3) x1 = x2 and y1 = y2  These cases must be considered when defining “addition” for our solution set
  • 16. Operations on Elliptic Curve(Cont.)  Case 1 ( x1 ≠ x2 ) (x1,y1) + (x2,y2) = (x3,y3) ∈ E, where x3 = λ² - x1 - x2 ,y3 = λ(x1 – x3) - y1, and λ = (y2 – y1) / (x2 – x1)  Case 2 (x1 = x2 and y1 = - y2 ) (x1,y1) + (x2,y2) = (x3,y3) ∈ E (x,y) + (x,-y) = O, the point at infinity x3 = λ² - ( x1 - x2 ),y3 = λ(x1 – x3) - y1, and λ = (y2 – y1) / (x2 – x1)  Case 3 (x1 = x2 and y1 = y2) (x1,y1) + (x2,y2) = (x3,y3) ∈ E where x3 = λ² - ( x1 - x2 ),y3 = λ(x1 – x3) - y1, and λ = (3x1 2 + a) / 2y1
  • 17. Operations on Elliptic Curve(Cont.)  Point Addition : SupposeEis defined asy 2 ≡ x 3 + 4x + 4 (mod 5). Let P= (1, 2) , Q = (4, 3) Then P + Q = (1,2) + (4,3) = (4,2)  Point Doubling: SupposeEis defined asy 2≡x 3+ 2x + 2 (mod 17). Let P = (5, 1). Then P + P = 2P = (6,3)
  • 18. Layout of Presentation  Overview of Cryptography  Symmetrical Encryption and Asymmetrical Encryption  Overview of ECC  Singular and Non-singular Elliptic Curve  Operations on Elliptic Curve  Elliptic Curve Discrete Logarithmic Problem  Literature Survey  Proposed approach on Baby Step Giant Step algorithm  Experimental Results  Complexity Analysis  Conclusion and References
  • 19. Elliptic Curve Discrete Logarithmic Problem The strength of the ECC security is reliant on the ECDLP. This problem can be defined as follows. Let P has order n, which belongs to the points of an elliptic curve defined over the field Fp and another point Q ∈ < P > then finding k ∈ [1, n – 1] such that Q = [k]P = P ⊕ P ⊕ . . . ⊕ P is called the k times discrete log of Q to the base P which is symbolized by k = logPQ Because k can be inferred from Q if the ECDLP is easy, so the difficulty of the ECDLP plays a crucial role in the security of these Elliptic Curve Cryptographic system.
  • 20. Layout of Presentation  Overview of Cryptography  Symmetrical Encryption and Asymmetrical Encryption  Overview of ECC  Singular and Non-singular Elliptic Curve  Operations on Elliptic Curve  Elliptic Curve Discrete Logarithmic Problem  Literature Survey  Proposed approach on Baby Step Giant Step algorithm  Experimental Results  Complexity Analysis  Conclusion and References
  • 21. Literature Survey • The elliptic curve cryptosystems that is dependent on public key cryptosystem were first proposed separately by Koblitz and Miller in 1985. • The security of these cryptographic systems is reliant on the hardness of solving the discrete logarithm problem on elliptic curves (ECDLP). These schemes will be broken easily if this problem can be resolved efficiently. • Pollard’s Rho method is present known as the fastest algorithm to resolve the discrete logarithm problem on elliptic curves. • Baby Step and Giant Step is also a good algorithm to solve the problem because its mathematical operations is less than other approaches.
  • 22. Literature Survey(Cont.) Hasse’s Theorem: Let E be an elliptic curve over the finite field, Fp, then the order of E(Fp) is denoted by #E(Fp). We have a bound for #E(Fp) given by Hasse’s Theorem. Then the interval is 𝑝 + 1 + 2 𝑝 ≥ #𝐸(𝐹𝑝) ≥ p + 1 − 2 𝑝 • We will provide a better approach of Baby Step Giant Step method to solve the ECDLP. After that, the developed method will be analyzed by giving examples.
  • 23. Layout of Presentation  Overview of Cryptography  Symmetrical Encryption and Asymmetrical Encryption  Overview of ECC  Singular and Non-singular Elliptic Curve  Operations on Elliptic Curve  Elliptic Curve Discrete Logarithmic Problem  Literature Survey  Proposed approach on Baby Step Giant Step algorithm  Experimental Results  Complexity Analysis  Conclusion and References
  • 24. Proposed approach on Baby Step Giant Step algorithm We are going to propose an approach of Baby Step Giant Step algorithm for solving ECDLP recalling the DLP problem. In this algorithm we are using Baby Step set size a, where 0 < i < m 2 . So this algorithm has faster Baby Step faster precomputation runtime complexity and reduced number of Baby Step set, where N = #E(Fp).We have to find a n that exists such that Q = [𝐤]P. Proposed Approach :  calculation of m : Here we ate taking the value of m > N, where N is order of elliptic curve E over prime field Fp.  calculation of mP : In this step we will compute the value of mP.
  • 25. Proposed approach on Baby Step Giant Step algorithm(Cont.)  creating Baby Step set :We will calculate each i𝑃 and store it in an array of list for i = 0 to i = m 2 − 1 and create Baby Step set.  creating Giant Step set : Here we compute each jmP and store it in an array of list for j = 0 to j = m − 1 for creating Giant Step set.  sorting : We then sort the Baby Step and Giant Step set in some consistent way.  Comparing sets : We will Compare the Baby Step set and Giant Step set until a pair i, j such that iP = Q - jmP is found.  getting value of k : Return k ≡ i + jm (mod N) which we are looking for
  • 26. Layout of Presentation  Overview of Cryptography  Symmetrical Encryption and Asymmetrical Encryption  Overview of ECC  Singular and Non-singular Elliptic Curve  Operations on Elliptic Curve  Elliptic Curve Discrete Logarithmic Problem  Literature Survey  Proposed approach on Baby Step Giant Step algorithm  Experimental Results  Complexity Analysis  Conclusion and References
  • 27. Experimental Results Example (1): Elliptic curve equation y2 = x3 + 4x + 10 over prime field F19. Intruder got the plaintext as P(2,8) and ciphertext Q(16,3).Now he wants to find k. Previous method : Baby Step Set Giant Step Set 1𝑃 => 2,8 2,8 2𝑃 => 16,16 10,10 3𝑃 => 18,10 6,16 4𝑃 => 10,10 2,11 Order of point P => 22 Hasee’s interval => 11.28 <=> 28.71 Final answer => 9𝑃 Final point is => 9𝑃 16,3 Execution time : 0.164 sec
  • 28. Experimental Results(Cont.) Example (1): Elliptic curve equation y2 = x3 + 4x + 10 over prime field F19. Intruder got the plaintext as P(2,8) and ciphertext Q(16,3).Now he wants to find k. Proposed method : Baby Step Set Giant Step Set 1𝑃 => 2,8 2,8 2𝑃 => 16,16 10,10 3𝑃 => 18,10 6,16 2,11 Order of point P => 22 Hasee’s interval => 11.28 <=> 28.71 Final answer => 9𝑃 Final point is => 9𝑃 16,3 Execution time : 0.094 sec
  • 29. Experimental Results(Cont.) Example (2): Elliptic curve equation y2 = x3 + 5x + 12 over prime field F23. Intruder got the plaintext as P(11,15) and ciphertext Q(22,12).Now he wants to find k. Previous method : Baby Step Set Giant Step Set 1𝑃 => 11,15 11,15 2𝑃 => 1,8 8,14 3𝑃 => 20,4 3,15 4𝑃 => 4,2 8,9 Order of point P => 15 Hasee’s interval => 14.4 <=> 33.59 Final answer => 9𝑃 Final point is => 9𝑃 22,12 Execution time : 0.359 sec
  • 30. Experimental Results(Cont.) Example (2): Elliptic curve equation y2 = x3 + 5x + 12 over prime field F23. Intruder got the plaintext as P(11,15) and ciphertext Q(22,12).Now he wants to find k. Proposed method : Baby Step Set Giant Step Set 1𝑃 => 11,15 11,15 2𝑃 => 1,8 8,14 3𝑃 => 20,4 3,15 8,9 Order of point P => 15 Hasee’s interval => 14.4 <=> 33.59 Final answer => 9𝑃 Final point is => 9𝑃 22,12 Execution time : 0.266 sec
  • 31. Experimental Results(Cont.) 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 Example (1) Example (2) Execution Time(sec) Previous Method Proposed Method
  • 32. Layout of Presentation  Overview of Cryptography  Symmetrical Encryption and Asymmetrical Encryption  Overview of ECC  Singular and Non-singular Elliptic Curve  Operations on Elliptic Curve  Elliptic Curve Discrete Logarithmic Problem  Literature Survey  Proposed approach on Baby Step Giant Step algorithm  Experimental Results  Complexity Analysis  Conclusion and References.
  • 33. Complexity Analysis  In previous we find that the running time is on the order of N. The storage space needed is also on the order of N, as that is how much space is needed to store the lists in steps 3 and 4. • In proposed method we have done a little betterment in solving the problem using Baby Step Giant Step algorithm. Proposed method step 4 we are calculating the Baby step set. Previous method takes 0 < j ≤ m − 1 step size. Proposed method we are restricting the upper bound to m 2 − 1 that is 0 < j ≤ m 2 − 1. • This process gives almost 141.42% betterment in precomputation of Baby step set and required less storage than of original baby Step Giant Step storage requirements.
  • 34. Layout of Presentation  Overview of Cryptography  Symmetrical Encryption and Asymmetrical Encryption  Overview of ECC  Singular and Non-singular Elliptic Curve  Operations on Elliptic Curve  Elliptic Curve Discrete Logarithmic Problem  Literature Survey  Proposed approach on Baby Step Giant Step algorithm  Experimental Results  Complexity Analysis  Conclusion and References
  • 35. Conclusion • We have presented an introduction of Elliptic Curve Cryptography. This project we gave a brief overview about the discrete Logarithmic problem. We have revealed an enhanced algorithm for solving the problem ECDLP. • Here we restricted the upper bound step size of Baby step set. It gives a smaller no of Baby Step set comparing to the previous method. • Our algorithm has faster Baby Step precomputation and less storage requirement than of original baby Step Giant Step storage requirements. • This indicates proposed algorithm is having a lower overhead that has comparatively smaller list to be fitted in the memory quickly
  • 36. References 1) D. Kohel. Cryptography. 2007. Lecture notes are available at http://enchidna.maths.usyd.edu .au/~kohel/res/index.html. 2) https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are- differences 3) https://www.globalsign.com/en-in/ssl-information-center/what-is-public-key- cryptography/ 4) https://www.slideshare.net/KellyBresnahan/elliptic-curve-cryptography-66406021 5) https://www.cs.clemson.edu/course/cpsc420/presentations/Spring2007/Elliptic%2 0Curve%20Cryptography.ppt 6) https://arxiv.org/ftp/arxiv/papers/1607/1607.05901.pdf 7) Hankerson et al., 2004 ; Chee and Park, 2005) 8) https://www.cs.cmu.edu/~adamchik/15- 121/lectures/Algorithmic%20Complexity/complexity. html 9) http://bigocheatsheet.com 10) https://ocw.mit.edu/courses/mathematics/18-704-seminar-in-algebra-and- number-theory-rational-points-on-elliptic-curves-fall2004/projects/asarina.pdf
  • 37. References(Cont.) 11) https://ee.stanford.edu/~hellman/publications/24.pdf 12) https://ieeexplore.ieee.org/document/5992208/metrics 13) https://link.springer.com/article/10.1007%2FBF01933667 14) https://en.wikipedia.org/wiki/Baby-step_giant-step