SlideShare a Scribd company logo
1 of 15
Seminar #7
Information security
Elliptic curves
Kolybelnikov Alexander
kisttan@gmail.com
Agenda
• Group definition
• Elliptic curve definition
• Digital signature algorithm based on elliptic
curves
Terms and definitions
Group G is a set of elements a,b,c that have the following
properties:
• Operation of two variables is defined for G elements that is
written a┴b=c.
• Operation completeness: the result of an operation applying to
two group elements is another group element (completeness).
• For any three group elements associativity is fulfilled:
(a ┴ b) ┴ c = a ┴ (b ┴ c).
• There is a neutral element e in a group and for any group element
e ┴ a=a ┴ e=a is fulfilled.
• Each element a of G group has an inverse element a’:
a’ ┴ a=a ┴ a’=e.
Group definition
Group definition
• If commutative law is fulfilled for any G group elements a and
b (that means equation a ┴ b=b ┴ a is fulfilled) then G group is
Abelian.
• Order of group is a number of group elements. For complete
residue system GF(p) a set of all nonzero group elements is an
Abelian group of (p - 1) order.
• Some subset of G group is a subgroup if it meets all group
requirements (properties).
• Finite group that consists of its g element degrees 1, g, g², g³, …
is a cyclic group. The least integer number m: gm
=1 is an order
of g element.
General view of elliptic curve
• Generally EC is written
y2
+ axy + by = x3
+ cx2
+ dx + e
Cryptography restrictions:
• Elliptic curve shall not have singular points
that include self-intersections and cusp
points.
Graphic view of elliptic curve
• Elliptic curve E corresponds
to equation
y²+y=x³–x.
• Only four points belong to
this curve, their coordinates
are integer numbers:
A(0,0), B(1,-1), C(1,0),
D(0,-1).
Operations on a group of EC
points
Provides, that
• There is infinitely remote point
O on the plane that belongs to
E. All vertical straight lines
converge to point O.
• Tangent to a curve intersects
point of tangency P two times
(tangent PR is limiting position
of secant PM when M point
approaches to P point).
Addition. Example
Additive rule for P and Q points:
1) Draw straight line across P and
Q points, S is an intersection
point of this straight line and E
curve;
2) Draw vertical straight line across
S point before intersection with E
curve at T point;
3) Required sum is equal to
P+Q=T.
Addition. Example
The result of addtive rule applying
to group of points
G={A,B,C,D,O} is as follows:
A+A=B, A+B=C, A+C=D,
A+D=0,
2A=B, 3A=C, 4A=D, 5A=O,
6A=A.
For any points P,Q from G
P+Q=Q+P is fulfilled.
For each point P from G
P+O=P is fulfilled, so point O is
an additive identity element of
group G.
EC on finite field
The following equation is used in real
cryptosystems:
Provides, then
2 3 3 2
, , ( ),4 27 0(mod ), 3y x ax b a b GF p a b p p= + + ∈ + ≠ >
1 1 2 2
( , ), ( , )P x y Q x y= = 3 3
( , ),P Q x y+ =
2
3 1 2
3 1 3 1
;
( ) ;
x x x
y x x y
λ
λ
= − −
= − −
2 1
2 1
2
1
1
, ;
3
, .
2
y y
если P Q
x x
x a
если P Q
y
λ
−
≠ −
= 
+ =

Curve parameters
• Order of elliptic curve is an order of elliptic
curve points group (a number of different
points on E including O point)
• For elliptic curve E on prime field Fp the
order m of curve points group depends on
field dimension that is defined by prime
number p according to inequality:
p+1-2√p≤m≤p+1+2√p
Curve parameters
• Each point P of elliptic curve on prime field E(Fp)
forms cyclic subgroup G of elliptic curve points
group
• Order of cyclic subgroup of elliptic curve points
(number of points in a subgroup) is an order of
point of elliptic curve
• Point P on EF(p) is a point of q order if
qP=O
q is the least natural number which this condition
holds for
Caclulatin group generator and
point groups for EC
• Shouf algorithm
• Shouf-Etkis-Atkin algorithm
• Number of group elements φ(m), m is
module of curve.
Thank you for your attention!

More Related Content

What's hot

Linear functions
Linear functionsLinear functions
Linear functionshalcr1ja
 
2021 preTEST5A Final Review Packet!
2021 preTEST5A Final Review Packet!2021 preTEST5A Final Review Packet!
2021 preTEST5A Final Review Packet!A Jorge Garcia
 
2021 preTEST4A Vector Calculus
2021 preTEST4A Vector Calculus2021 preTEST4A Vector Calculus
2021 preTEST4A Vector CalculusA Jorge Garcia
 
Kim Modelling Functions
Kim Modelling FunctionsKim Modelling Functions
Kim Modelling Functionscoburgmaths
 
Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)Pramit Kumar
 
5 1 quadratic transformations
5 1 quadratic transformations5 1 quadratic transformations
5 1 quadratic transformationslothomas
 
Apoyo guía-12-2°-medio-ppt.-parábola
Apoyo guía-12-2°-medio-ppt.-parábolaApoyo guía-12-2°-medio-ppt.-parábola
Apoyo guía-12-2°-medio-ppt.-parábolaliceo
 
parameterized complexity for graph Motif
parameterized complexity for graph Motifparameterized complexity for graph Motif
parameterized complexity for graph MotifAMR koura
 
Directed Acyclic Graph
Directed Acyclic Graph Directed Acyclic Graph
Directed Acyclic Graph AJAL A J
 
Chap7 2 Ecc Intro
Chap7 2 Ecc IntroChap7 2 Ecc Intro
Chap7 2 Ecc IntroEdora Aziz
 
Lecture 2 family of fcts
Lecture 2   family of fctsLecture 2   family of fcts
Lecture 2 family of fctsnjit-ronbrown
 
Math 4 6
Math 4 6Math 4 6
Math 4 6dears11
 

What's hot (20)

Solution2
Solution2Solution2
Solution2
 
Linear functions
Linear functionsLinear functions
Linear functions
 
1988 FRQs AP Calculus
1988 FRQs AP Calculus1988 FRQs AP Calculus
1988 FRQs AP Calculus
 
Tree, function and graph
Tree, function and graphTree, function and graph
Tree, function and graph
 
2021 preTEST5A Final Review Packet!
2021 preTEST5A Final Review Packet!2021 preTEST5A Final Review Packet!
2021 preTEST5A Final Review Packet!
 
2021 preTEST4A Vector Calculus
2021 preTEST4A Vector Calculus2021 preTEST4A Vector Calculus
2021 preTEST4A Vector Calculus
 
Kim Modelling Functions
Kim Modelling FunctionsKim Modelling Functions
Kim Modelling Functions
 
Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)
 
Computer graphics
Computer graphicsComputer graphics
Computer graphics
 
2D Geometry QA 11
2D Geometry QA 112D Geometry QA 11
2D Geometry QA 11
 
5 1 quadratic transformations
5 1 quadratic transformations5 1 quadratic transformations
5 1 quadratic transformations
 
Irisan Kerucut
Irisan KerucutIrisan Kerucut
Irisan Kerucut
 
Apoyo guía-12-2°-medio-ppt.-parábola
Apoyo guía-12-2°-medio-ppt.-parábolaApoyo guía-12-2°-medio-ppt.-parábola
Apoyo guía-12-2°-medio-ppt.-parábola
 
parameterized complexity for graph Motif
parameterized complexity for graph Motifparameterized complexity for graph Motif
parameterized complexity for graph Motif
 
Lecture23
Lecture23Lecture23
Lecture23
 
Directed Acyclic Graph
Directed Acyclic Graph Directed Acyclic Graph
Directed Acyclic Graph
 
Lecture24
Lecture24Lecture24
Lecture24
 
Chap7 2 Ecc Intro
Chap7 2 Ecc IntroChap7 2 Ecc Intro
Chap7 2 Ecc Intro
 
Lecture 2 family of fcts
Lecture 2   family of fctsLecture 2   family of fcts
Lecture 2 family of fcts
 
Math 4 6
Math 4 6Math 4 6
Math 4 6
 

Viewers also liked

Защита информации семинар №3 МФТИ
Защита информации семинар №3 МФТИЗащита информации семинар №3 МФТИ
Защита информации семинар №3 МФТИAlexander Kolybelnikov
 
Юридическая значимость документооборота
Юридическая значимость документооборотаЮридическая значимость документооборота
Юридическая значимость документооборотаAlexander Kolybelnikov
 
Защита информации семинар №7
Защита информации семинар №7Защита информации семинар №7
Защита информации семинар №7Alexander Kolybelnikov
 
лекция о защите дистанционного банковского обслуживания
лекция о защите дистанционного банковского обслуживаниялекция о защите дистанционного банковского обслуживания
лекция о защите дистанционного банковского обслуживанияAlexander Kolybelnikov
 
Защита информации семинар №6
Защита информации семинар №6Защита информации семинар №6
Защита информации семинар №6Alexander Kolybelnikov
 
безопасность использования электронной подписи
безопасность использования электронной подписибезопасность использования электронной подписи
безопасность использования электронной подписиAlexander Kolybelnikov
 
Защита информации семинар №8
Защита информации семинар №8Защита информации семинар №8
Защита информации семинар №8Alexander Kolybelnikov
 
Защита информации семинар №1 МФТИ
Защита информации семинар №1 МФТИЗащита информации семинар №1 МФТИ
Защита информации семинар №1 МФТИAlexander Kolybelnikov
 
Seminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPTSeminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPTAlexander Kolybelnikov
 
Защита информации семинар №4 МФТИ
Защита информации семинар №4 МФТИЗащита информации семинар №4 МФТИ
Защита информации семинар №4 МФТИAlexander Kolybelnikov
 
лекция безопасная разработка приложений
лекция  безопасная разработка приложенийлекция  безопасная разработка приложений
лекция безопасная разработка приложенийAlexander Kolybelnikov
 
Защита информации семинар №2 МФТИ
Защита информации семинар №2 МФТИЗащита информации семинар №2 МФТИ
Защита информации семинар №2 МФТИAlexander Kolybelnikov
 
Защита информации семинар №9
Защита информации семинар №9Защита информации семинар №9
Защита информации семинар №9Alexander Kolybelnikov
 
вебинар 18102016 архитектура подсистемы обеспечения юр. эдо
вебинар 18102016 архитектура подсистемы обеспечения юр. эдовебинар 18102016 архитектура подсистемы обеспечения юр. эдо
вебинар 18102016 архитектура подсистемы обеспечения юр. эдоAlexander Kolybelnikov
 

Viewers also liked (19)

Защита информации семинар №3 МФТИ
Защита информации семинар №3 МФТИЗащита информации семинар №3 МФТИ
Защита информации семинар №3 МФТИ
 
Юридическая значимость документооборота
Юридическая значимость документооборотаЮридическая значимость документооборота
Юридическая значимость документооборота
 
Защита информации семинар №7
Защита информации семинар №7Защита информации семинар №7
Защита информации семинар №7
 
лекция о защите дистанционного банковского обслуживания
лекция о защите дистанционного банковского обслуживаниялекция о защите дистанционного банковского обслуживания
лекция о защите дистанционного банковского обслуживания
 
Защита информации семинар №6
Защита информации семинар №6Защита информации семинар №6
Защита информации семинар №6
 
безопасность использования электронной подписи
безопасность использования электронной подписибезопасность использования электронной подписи
безопасность использования электронной подписи
 
Information security Seminar #6
Information security Seminar #6 Information security Seminar #6
Information security Seminar #6
 
Защита информации семинар №8
Защита информации семинар №8Защита информации семинар №8
Защита информации семинар №8
 
Защита информации семинар №1 МФТИ
Защита информации семинар №1 МФТИЗащита информации семинар №1 МФТИ
Защита информации семинар №1 МФТИ
 
Seminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPTSeminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPT
 
Защита информации семинар №4 МФТИ
Защита информации семинар №4 МФТИЗащита информации семинар №4 МФТИ
Защита информации семинар №4 МФТИ
 
лекция безопасная разработка приложений
лекция  безопасная разработка приложенийлекция  безопасная разработка приложений
лекция безопасная разработка приложений
 
лекция №4
лекция №4лекция №4
лекция №4
 
Основы протокола IPsec
Основы протокола IPsecОсновы протокола IPsec
Основы протокола IPsec
 
Защита информации семинар №2 МФТИ
Защита информации семинар №2 МФТИЗащита информации семинар №2 МФТИ
Защита информации семинар №2 МФТИ
 
Защита информации семинар №9
Защита информации семинар №9Защита информации семинар №9
Защита информации семинар №9
 
Information security Seminar #3
Information security Seminar #3 Information security Seminar #3
Information security Seminar #3
 
Information Security Seminar #2
Information Security Seminar #2Information Security Seminar #2
Information Security Seminar #2
 
вебинар 18102016 архитектура подсистемы обеспечения юр. эдо
вебинар 18102016 архитектура подсистемы обеспечения юр. эдовебинар 18102016 архитектура подсистемы обеспечения юр. эдо
вебинар 18102016 архитектура подсистемы обеспечения юр. эдо
 

Similar to Information security Seminar #7

Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptographyBarani Tharan
 
CS-102 Data Structure lectures on Graphs
CS-102 Data Structure lectures on GraphsCS-102 Data Structure lectures on Graphs
CS-102 Data Structure lectures on Graphsssuser034ce1
 
CS-102 Data Structure lectures on Graphs
CS-102 Data Structure lectures on GraphsCS-102 Data Structure lectures on Graphs
CS-102 Data Structure lectures on Graphsssuser034ce1
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control systemAlireza Mirzaei
 
Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesSreedhar Chowdam
 
Last+minute+revision(+Final)+(1) (1).pptx
Last+minute+revision(+Final)+(1) (1).pptxLast+minute+revision(+Final)+(1) (1).pptx
Last+minute+revision(+Final)+(1) (1).pptxAryanMishra860130
 
Obj. 30 Reflections and Translations
Obj. 30 Reflections and TranslationsObj. 30 Reflections and Translations
Obj. 30 Reflections and Translationssmiller5
 
NYQUIST_PLOTS.pdf
NYQUIST_PLOTS.pdfNYQUIST_PLOTS.pdf
NYQUIST_PLOTS.pdfMUST
 
Ppt of graph theory
Ppt of graph theoryPpt of graph theory
Ppt of graph theoryArvindBorge
 

Similar to Information security Seminar #7 (20)

Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
 
ECC_basics.ppt
ECC_basics.pptECC_basics.ppt
ECC_basics.ppt
 
ECC_basics.ppt
ECC_basics.pptECC_basics.ppt
ECC_basics.ppt
 
8076892 (1).ppt
8076892 (1).ppt8076892 (1).ppt
8076892 (1).ppt
 
Chap4
Chap4Chap4
Chap4
 
2.ppt
2.ppt2.ppt
2.ppt
 
CG-Lecture3.pptx
CG-Lecture3.pptxCG-Lecture3.pptx
CG-Lecture3.pptx
 
CS-102 Data Structure lectures on Graphs
CS-102 Data Structure lectures on GraphsCS-102 Data Structure lectures on Graphs
CS-102 Data Structure lectures on Graphs
 
CS-102 Data Structure lectures on Graphs
CS-102 Data Structure lectures on GraphsCS-102 Data Structure lectures on Graphs
CS-102 Data Structure lectures on Graphs
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control system
 
Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture Notes
 
Last+minute+revision(+Final)+(1) (1).pptx
Last+minute+revision(+Final)+(1) (1).pptxLast+minute+revision(+Final)+(1) (1).pptx
Last+minute+revision(+Final)+(1) (1).pptx
 
Obj. 30 Reflections and Translations
Obj. 30 Reflections and TranslationsObj. 30 Reflections and Translations
Obj. 30 Reflections and Translations
 
AsymptoticAnalysis.ppt
AsymptoticAnalysis.pptAsymptoticAnalysis.ppt
AsymptoticAnalysis.ppt
 
ME Reference.pdf
ME Reference.pdfME Reference.pdf
ME Reference.pdf
 
Mathematics
MathematicsMathematics
Mathematics
 
NYQUIST_PLOTS.pdf
NYQUIST_PLOTS.pdfNYQUIST_PLOTS.pdf
NYQUIST_PLOTS.pdf
 
Ppt of graph theory
Ppt of graph theoryPpt of graph theory
Ppt of graph theory
 
Chapter 8.pptx
Chapter 8.pptxChapter 8.pptx
Chapter 8.pptx
 
6. Graphs
6. Graphs6. Graphs
6. Graphs
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

Information security Seminar #7

  • 1. Seminar #7 Information security Elliptic curves Kolybelnikov Alexander kisttan@gmail.com
  • 2. Agenda • Group definition • Elliptic curve definition • Digital signature algorithm based on elliptic curves
  • 4. Group G is a set of elements a,b,c that have the following properties: • Operation of two variables is defined for G elements that is written a┴b=c. • Operation completeness: the result of an operation applying to two group elements is another group element (completeness). • For any three group elements associativity is fulfilled: (a ┴ b) ┴ c = a ┴ (b ┴ c). • There is a neutral element e in a group and for any group element e ┴ a=a ┴ e=a is fulfilled. • Each element a of G group has an inverse element a’: a’ ┴ a=a ┴ a’=e. Group definition
  • 5. Group definition • If commutative law is fulfilled for any G group elements a and b (that means equation a ┴ b=b ┴ a is fulfilled) then G group is Abelian. • Order of group is a number of group elements. For complete residue system GF(p) a set of all nonzero group elements is an Abelian group of (p - 1) order. • Some subset of G group is a subgroup if it meets all group requirements (properties). • Finite group that consists of its g element degrees 1, g, g², g³, … is a cyclic group. The least integer number m: gm =1 is an order of g element.
  • 6. General view of elliptic curve • Generally EC is written y2 + axy + by = x3 + cx2 + dx + e Cryptography restrictions: • Elliptic curve shall not have singular points that include self-intersections and cusp points.
  • 7. Graphic view of elliptic curve • Elliptic curve E corresponds to equation y²+y=x³–x. • Only four points belong to this curve, their coordinates are integer numbers: A(0,0), B(1,-1), C(1,0), D(0,-1).
  • 8. Operations on a group of EC points Provides, that • There is infinitely remote point O on the plane that belongs to E. All vertical straight lines converge to point O. • Tangent to a curve intersects point of tangency P two times (tangent PR is limiting position of secant PM when M point approaches to P point).
  • 9. Addition. Example Additive rule for P and Q points: 1) Draw straight line across P and Q points, S is an intersection point of this straight line and E curve; 2) Draw vertical straight line across S point before intersection with E curve at T point; 3) Required sum is equal to P+Q=T.
  • 10. Addition. Example The result of addtive rule applying to group of points G={A,B,C,D,O} is as follows: A+A=B, A+B=C, A+C=D, A+D=0, 2A=B, 3A=C, 4A=D, 5A=O, 6A=A. For any points P,Q from G P+Q=Q+P is fulfilled. For each point P from G P+O=P is fulfilled, so point O is an additive identity element of group G.
  • 11. EC on finite field The following equation is used in real cryptosystems: Provides, then 2 3 3 2 , , ( ),4 27 0(mod ), 3y x ax b a b GF p a b p p= + + ∈ + ≠ > 1 1 2 2 ( , ), ( , )P x y Q x y= = 3 3 ( , ),P Q x y+ = 2 3 1 2 3 1 3 1 ; ( ) ; x x x y x x y λ λ = − − = − − 2 1 2 1 2 1 1 , ; 3 , . 2 y y если P Q x x x a если P Q y λ − ≠ − =  + = 
  • 12. Curve parameters • Order of elliptic curve is an order of elliptic curve points group (a number of different points on E including O point) • For elliptic curve E on prime field Fp the order m of curve points group depends on field dimension that is defined by prime number p according to inequality: p+1-2√p≤m≤p+1+2√p
  • 13. Curve parameters • Each point P of elliptic curve on prime field E(Fp) forms cyclic subgroup G of elliptic curve points group • Order of cyclic subgroup of elliptic curve points (number of points in a subgroup) is an order of point of elliptic curve • Point P on EF(p) is a point of q order if qP=O q is the least natural number which this condition holds for
  • 14. Caclulatin group generator and point groups for EC • Shouf algorithm • Shouf-Etkis-Atkin algorithm • Number of group elements φ(m), m is module of curve.
  • 15. Thank you for your attention!