SlideShare a Scribd company logo
Elliptic Curve Cryptography
Agenda
• Introduction
• Elliptic Curves Over the Real Numbers
• Elliptic Curves Over a Finite Field
• Elliptic Curve Cryptography Demo
• Elliptic Curve Cryptography – Key
Exchange
Introduction
• Major issue with use of public key is the size of numbers used.
• ECC belongs to the category of Public-key Cryptography,
performs the computations using elliptic curve arithmetic
instead of integer or polynomial arithmetic.
• ECC provides equally good security compared to RSA, but uses
smaller key size.
• Notable Advantages of ECC
• Uses smaller keys, ciphertexts and signatures.
• ECC supports, very fast key generation.
• ECC scores over RSA because of its moderately fast encryption and
decryption.
• ECC computations are uses less memory and CPU cycles compared to
RSA, hence
suited for securing Mobile Handheld devices.
Comparable Key Sizes for EquivalentSecurity
Symmetric scheme
(key size in bits)
ECC-based scheme
(size of n in bits)
RSA/DSA
(modulus size in bits)
56 112 512
80 160 1024
112 224 2048
128 256 3072
192 384 7680
256 512 15360
William Stallings Table 10.3 - “ Comparable Key Sizes in Terms of Computational Effort for
Cryptanalysis"
Introduction
• An elliptic curve is defined by an equation in two variables
with coefficients.
• Elliptic curves are not ellipses. Elliptic curves are described by
cubic equations similar to those used for calculating the
circumference of an ellipse
• Elliptic curve cryptography makes use of elliptic curves, in
which the variables and coefficients are all restricted to
elements of a finite field.
ECC over RealNumbers
• Elliptic curve over real numbers are nothing but set of points (x,y)
which
satisfy an elliptic curve equation y2 = x3 + ax + b, where x, y, a
and b are real numbers.
• Supplying different set of values for a and b results in a different
elliptic curve.
• For example a = -4 and b = 0.67 gives the elliptic curve with
equation y2 = x3 - 4x + 0.67
• If the cubic polynomial x3+ax+b has no repeated roots, we say the
elliptic curve is non-singular.
• A necessary and sufficient condition for the cubic polynomial
x3+ax+b to have distinct roots is 4a^3 + 27 b^2 not equal to 0.
• we’ll always assume the elliptic curves are non-singular.
P + Q = R is the additive property defined
geometrically
Elliptic Curves Over FiniteFields
• Instead of choosing the field of real numbers, we can create elliptic
curves over other fields!
• Let a and b be elements of Zp for p prime, p>3. An elliptic curve E
over Zp is the set of points (x,y) with x and y in Zp that satisfy the
equation
together with a single element , called the point at infinity.
• As in the real case, to get a non-singular elliptic curve, we’ll require 4a3
+ 27 b2 (mod p)  0 (mod p).
• Elliptic curves over Zp will consist of a finite set of points
Elliptic Curves Over FiniteFields
• Just as in the real case, we can define addition of points on an
elliptic curve E over Zp, for prime p>3.
• This is done in the essentially the same way as the real
case, with appropriate modifications.
Point Addition over FiniteFieldFp
• Point addition and doubling
are now slightly different
visually.
• Lines drawn on this graph
will wrap around the
horizontal and vertical
directions, just like in a
game of Asteroids,
maintaining the same slope.
• So adding points (2, 22) and
(6,
25) looks like this:
• The third intersecting point is
(47, 39) and its reflection point
is (47, 28).
Ref: http://www.coindesk.com/math-behind-
bitcoin/
Elliptic Curve CryptographyDiscrete
Logarithm Problem [ ECCDLP]
• Addition is simple
P + P = 2P
Multiplication is faster , it takes only 8 steps to compute 100P, using point doubling
and add 1. P * 2 = 2P
2. P + 2P = 3P
3. 3P * 2 = 6P
4. 6P *2 = 12P
5. 12P * 2 =24 P
6. P + 24 P = 25 P
7. 25P * 2 = 50 P
8. 50P *2 = 100 P
Elliptic Curve CryptographyDiscrete
Logarithm Problem [ ECCDLP]
• Division is slow,
• In ECC Q is defined as product of n*P is another point on
the curve
Q = nP
given initial point P and final point Q, it is hard to
compute ‘n’ which serves as a secret key.
Brute force method, start with P,every step multiply P
with number 1, 2 and so on,
For each step compare result of P*x where x=1,2,3,…
with Q This problem is known as discrete log problem,
difficult to beak
Elliptic Curve point addition (R)-Demo
Elliptic Curve scalar multiplication (R)-Demo
Elliptic Curve point addition (Fp)-Demo
Elliptic Curve scalar multiplication (Fp)-Demo
ECCApplication
• ECC is being used in many places
such as
• PDAs
• VOIP
• Smart cards
• Mobile devices
Diffie-Hellman Key Exchange – ECC scenario
• Alice and Bob two parties need to exchange secret key
1. Both Alice and Bob agree upon starting point P point on
elliptic curve publicly defined y2 = x3 - 4x + 0.67
2. Alice selects his private ‘α’ and computes αP shares this
with bob
3. Bob selects his private ‘β’ and computes βP shares with Alice
4. Alice receives βP and computes βPα by multiplying with his
private
5. Bob receives αP and computes αPβ by multiplying with his
private
Security Aspect
• Attacks on groups of elliptic curves are weaker than available
factoring algorithms attacks
• Best known attacks on elliptic curves based on cryptographic
criterions are the Baby-Step Giant-Step and Pollard-Rho method
• Complexity of these methods are approximately √ p .
• An elliptic curve using a prime p with 160 bit ,roughly 2160 points,
provides a security of 280 steps on an average that is
required by an attacker.
• An elliptic curve using a prime p with 256 bit, roughly 2256 points,
provides a
security of 2128 steps on an average.
Reference
1. Network security and cryptography - William Stallings
2. Kwangjo Kim, Cryptography, Open Access Journal
3. Elliptic Curve Cryptography - Lecture notes by Wayne
Patterson
4. Elliptic Curve Cryptography: a gentle introduction,
http://andrea.corbellini.name/2015/05/17/elliptic-
curve- cryptography-a-gentle-introduction/
5. Certicom, https://www.certicom.com/ecc
Presented by: Ayush Jain
IU1941090004
EC 7TH Sem.

More Related Content

Similar to ellipticcurvecryptography.pptx

Image encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherImage encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipher
karthik kedarisetti
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
csandit
 
Cryptography
CryptographyCryptography
Cryptography
Hardik Sondagar
 
Cryptography Baby Step Giant Step
Cryptography Baby Step Giant StepCryptography Baby Step Giant Step
Cryptography Baby Step Giant Step
SAUVIK BISWAS
 
Beating Floating Point at its Own Game: Posit Arithmetic
Beating Floating Point at its Own Game: Posit ArithmeticBeating Floating Point at its Own Game: Posit Arithmetic
Beating Floating Point at its Own Game: Posit Arithmetic
inside-BigData.com
 
Fp12_Efficient_SCM
Fp12_Efficient_SCMFp12_Efficient_SCM
Fp12_Efficient_SCM
Md. Al-Amin Khandaker Nipu
 
Ecc2
Ecc2Ecc2
CNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic CurvesCNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic Curves
Sam Bowne
 
error_detection_correction.pptx
error_detection_correction.pptxerror_detection_correction.pptx
error_detection_correction.pptx
ssuser50f4fd1
 
Elliptic Curves in Cryptography
Elliptic Curves in CryptographyElliptic Curves in Cryptography
Elliptic Curves in Cryptography
CSNP
 
CNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic CurvesCNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic Curves
Sam Bowne
 
Class3
Class3Class3
CNIT 141: 12. Elliptic Curves
CNIT 141: 12. Elliptic CurvesCNIT 141: 12. Elliptic Curves
CNIT 141: 12. Elliptic Curves
Sam Bowne
 
CNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic CurvesCNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic Curves
Sam Bowne
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
RAMPRAKASHT1
 
ECC_basics.ppt
ECC_basics.pptECC_basics.ppt
ECC_basics.ppt
RudraChandanSingh
 
815.07 machine learning using python.pdf
815.07 machine learning using python.pdf815.07 machine learning using python.pdf
815.07 machine learning using python.pdf
SairaAtta5
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan PalacioElliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Information Security Awareness Group
 
ECC_basics.ppt
ECC_basics.pptECC_basics.ppt
ECC_basics.ppt
BLACKSPAROW
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12
IJASCSE
 

Similar to ellipticcurvecryptography.pptx (20)

Image encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherImage encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipher
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Baby Step Giant Step
Cryptography Baby Step Giant StepCryptography Baby Step Giant Step
Cryptography Baby Step Giant Step
 
Beating Floating Point at its Own Game: Posit Arithmetic
Beating Floating Point at its Own Game: Posit ArithmeticBeating Floating Point at its Own Game: Posit Arithmetic
Beating Floating Point at its Own Game: Posit Arithmetic
 
Fp12_Efficient_SCM
Fp12_Efficient_SCMFp12_Efficient_SCM
Fp12_Efficient_SCM
 
Ecc2
Ecc2Ecc2
Ecc2
 
CNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic CurvesCNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic Curves
 
error_detection_correction.pptx
error_detection_correction.pptxerror_detection_correction.pptx
error_detection_correction.pptx
 
Elliptic Curves in Cryptography
Elliptic Curves in CryptographyElliptic Curves in Cryptography
Elliptic Curves in Cryptography
 
CNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic CurvesCNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic Curves
 
Class3
Class3Class3
Class3
 
CNIT 141: 12. Elliptic Curves
CNIT 141: 12. Elliptic CurvesCNIT 141: 12. Elliptic Curves
CNIT 141: 12. Elliptic Curves
 
CNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic CurvesCNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic Curves
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
ECC_basics.ppt
ECC_basics.pptECC_basics.ppt
ECC_basics.ppt
 
815.07 machine learning using python.pdf
815.07 machine learning using python.pdf815.07 machine learning using python.pdf
815.07 machine learning using python.pdf
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan PalacioElliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
 
ECC_basics.ppt
ECC_basics.pptECC_basics.ppt
ECC_basics.ppt
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12
 

Recently uploaded

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 

Recently uploaded (20)

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 

ellipticcurvecryptography.pptx

  • 2. Agenda • Introduction • Elliptic Curves Over the Real Numbers • Elliptic Curves Over a Finite Field • Elliptic Curve Cryptography Demo • Elliptic Curve Cryptography – Key Exchange
  • 3. Introduction • Major issue with use of public key is the size of numbers used. • ECC belongs to the category of Public-key Cryptography, performs the computations using elliptic curve arithmetic instead of integer or polynomial arithmetic. • ECC provides equally good security compared to RSA, but uses smaller key size. • Notable Advantages of ECC • Uses smaller keys, ciphertexts and signatures. • ECC supports, very fast key generation. • ECC scores over RSA because of its moderately fast encryption and decryption. • ECC computations are uses less memory and CPU cycles compared to RSA, hence suited for securing Mobile Handheld devices.
  • 4. Comparable Key Sizes for EquivalentSecurity Symmetric scheme (key size in bits) ECC-based scheme (size of n in bits) RSA/DSA (modulus size in bits) 56 112 512 80 160 1024 112 224 2048 128 256 3072 192 384 7680 256 512 15360 William Stallings Table 10.3 - “ Comparable Key Sizes in Terms of Computational Effort for Cryptanalysis"
  • 5. Introduction • An elliptic curve is defined by an equation in two variables with coefficients. • Elliptic curves are not ellipses. Elliptic curves are described by cubic equations similar to those used for calculating the circumference of an ellipse • Elliptic curve cryptography makes use of elliptic curves, in which the variables and coefficients are all restricted to elements of a finite field.
  • 6. ECC over RealNumbers • Elliptic curve over real numbers are nothing but set of points (x,y) which satisfy an elliptic curve equation y2 = x3 + ax + b, where x, y, a and b are real numbers. • Supplying different set of values for a and b results in a different elliptic curve. • For example a = -4 and b = 0.67 gives the elliptic curve with equation y2 = x3 - 4x + 0.67 • If the cubic polynomial x3+ax+b has no repeated roots, we say the elliptic curve is non-singular. • A necessary and sufficient condition for the cubic polynomial x3+ax+b to have distinct roots is 4a^3 + 27 b^2 not equal to 0. • we’ll always assume the elliptic curves are non-singular.
  • 7. P + Q = R is the additive property defined geometrically
  • 8. Elliptic Curves Over FiniteFields • Instead of choosing the field of real numbers, we can create elliptic curves over other fields! • Let a and b be elements of Zp for p prime, p>3. An elliptic curve E over Zp is the set of points (x,y) with x and y in Zp that satisfy the equation together with a single element , called the point at infinity. • As in the real case, to get a non-singular elliptic curve, we’ll require 4a3 + 27 b2 (mod p)  0 (mod p). • Elliptic curves over Zp will consist of a finite set of points
  • 9. Elliptic Curves Over FiniteFields • Just as in the real case, we can define addition of points on an elliptic curve E over Zp, for prime p>3. • This is done in the essentially the same way as the real case, with appropriate modifications.
  • 10. Point Addition over FiniteFieldFp • Point addition and doubling are now slightly different visually. • Lines drawn on this graph will wrap around the horizontal and vertical directions, just like in a game of Asteroids, maintaining the same slope. • So adding points (2, 22) and (6, 25) looks like this: • The third intersecting point is (47, 39) and its reflection point is (47, 28). Ref: http://www.coindesk.com/math-behind- bitcoin/
  • 11. Elliptic Curve CryptographyDiscrete Logarithm Problem [ ECCDLP] • Addition is simple P + P = 2P Multiplication is faster , it takes only 8 steps to compute 100P, using point doubling and add 1. P * 2 = 2P 2. P + 2P = 3P 3. 3P * 2 = 6P 4. 6P *2 = 12P 5. 12P * 2 =24 P 6. P + 24 P = 25 P 7. 25P * 2 = 50 P 8. 50P *2 = 100 P
  • 12. Elliptic Curve CryptographyDiscrete Logarithm Problem [ ECCDLP] • Division is slow, • In ECC Q is defined as product of n*P is another point on the curve Q = nP given initial point P and final point Q, it is hard to compute ‘n’ which serves as a secret key. Brute force method, start with P,every step multiply P with number 1, 2 and so on, For each step compare result of P*x where x=1,2,3,… with Q This problem is known as discrete log problem, difficult to beak
  • 13. Elliptic Curve point addition (R)-Demo
  • 14. Elliptic Curve scalar multiplication (R)-Demo
  • 15. Elliptic Curve point addition (Fp)-Demo
  • 16. Elliptic Curve scalar multiplication (Fp)-Demo
  • 17. ECCApplication • ECC is being used in many places such as • PDAs • VOIP • Smart cards • Mobile devices
  • 18. Diffie-Hellman Key Exchange – ECC scenario • Alice and Bob two parties need to exchange secret key 1. Both Alice and Bob agree upon starting point P point on elliptic curve publicly defined y2 = x3 - 4x + 0.67 2. Alice selects his private ‘α’ and computes αP shares this with bob 3. Bob selects his private ‘β’ and computes βP shares with Alice 4. Alice receives βP and computes βPα by multiplying with his private 5. Bob receives αP and computes αPβ by multiplying with his private
  • 19. Security Aspect • Attacks on groups of elliptic curves are weaker than available factoring algorithms attacks • Best known attacks on elliptic curves based on cryptographic criterions are the Baby-Step Giant-Step and Pollard-Rho method • Complexity of these methods are approximately √ p . • An elliptic curve using a prime p with 160 bit ,roughly 2160 points, provides a security of 280 steps on an average that is required by an attacker. • An elliptic curve using a prime p with 256 bit, roughly 2256 points, provides a security of 2128 steps on an average.
  • 20. Reference 1. Network security and cryptography - William Stallings 2. Kwangjo Kim, Cryptography, Open Access Journal 3. Elliptic Curve Cryptography - Lecture notes by Wayne Patterson 4. Elliptic Curve Cryptography: a gentle introduction, http://andrea.corbellini.name/2015/05/17/elliptic- curve- cryptography-a-gentle-introduction/ 5. Certicom, https://www.certicom.com/ecc
  • 21.
  • 22. Presented by: Ayush Jain IU1941090004 EC 7TH Sem.