1 / 2

Questions What is the general form of all elliptic curve equations?

Elliptic Curve Cryptography. General Equation for Elliptic Curves :. Finite Field Elliptic Curves: Elliptic Curve “Point” Algebra : if x 1 != x 2 , if x 1 == x 2 , x 3 = y 3 = . Key Generation : Agree on the following (public): Curve parameters (a, b) The modulus p

eunice
Download Presentation

Questions What is the general form of all elliptic curve equations?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Elliptic Curve Cryptography General Equation for Elliptic Curves: Finite Field Elliptic Curves: Elliptic Curve “Point” Algebra: if x1 != x2, if x1 == x2, x3 = y3 = Key Generation: Agree on the following (public): Curve parameters (a, b) The modulus p Base point G (on the curve) Pick a random integer n as private key Calculate public key P = n*G Questions What is the general form of all elliptic curve equations? What is the sum of two points that form a vertical line? Why is ECC stronger than RSA? What is the name of the best known algorithm for attacking ECC? When will ECC likely be available and implemented for public use?

  2. Answers • What is the general form of all elliptic curve equations? • What is the sum of two points that form a vertical line?The point-at-infinity, O • Why is ECC stronger than RSA?The new algebra doesn’t have the same weaknesses that traditional algebra (and thereby RSA) does.orThe best attack on ECC runs in full exponential time, whereas the best attack on RSA runs in sub-exponential time. • What is the name of the best known algorithm for attacking ECC?Pollard’s Rho • When will ECC likely be available and implemented for public use?~2020

More Related