Curve-Based Cryptography
Nicolas Thériault
nicolas.theriault@usach.cl
Curve-Based Cryptography Nicolas Thriault - - PowerPoint PPT Presentation
Curve-Based Cryptography Nicolas Thriault nicolas.theriault@usach.cl Departamento de Matemtica y Ciencia de la Computacin Universidad de Santiago de Chile Discrete Log Problem Computational Diffie-Hellman Problem: Given g 1 , [ a ] g 1 ,
nicolas.theriault@usach.cl
– p.1.
– p.1.
– p.2.
✁ ✕
✁ ✕ ✁ ✕
✟ ✯ ✒ ✟ ✯ ✒ ✟ ✯ ✒ ✁ ✕ ✁ ✕
✟ ✯ ✒ ✟ ✯ ✟ ✯✲✲✟ ✯✲❍ ❥ ❍ ❥ ❅ ❘ ❆ ❯ ❅ ❘ ❄ ✁ ☛
✟ ✙
✟ ✙ ✟ ✙ ✛ ✛ ❍ ❨ ✛ ✛ ❍ ❨ ❅ ■ ❍ ❨ ❅ ■
– p.3.
– p.4.
– p.4.
– p.4.
– p.4.
i = x3 i + axi + b
– p.5.
– p.6.
P R
– p.6.
P R −P − R
– p.6.
P R −P − R P + R
– p.6.
x1−x2 (general addition) or 3x2
1+a
2y1
– p.7.
– p.8.
– p.9.
– p.10.
P R
– p.10.
P R
– p.10.
P R
– p.10.
– p.11.
P1 P2 Q1 Q2
Going back to the genus 2 curve, with two divisors (P1 + P2 − 2∞) and (Q1 + Q2 − 2∞).
– p.12.
P1 P2 Q1 Q2
There exists a unique cubic which fits these four points.
– p.12.
P1 P2 Q1 Q2 −R1 −R2
The cubic intersects C in two more points.
– p.12.
P1 P2 Q1 Q2 −R1 −R2 R1 R2
We reflect these points with the x-axis and obtain: (P1 + P2 − 2∞) + (Q1 + Q2 − 2∞) = = R1 + R2 − 2∞
– p.12.
P1 P2 P3 P4 Q1 Q2 Q3 Q4
– p.13.
– p.13.
– p.13.
– p.13.
– p.13.
P1 P2 P3 P4 Q1 Q2 Q3 Q4 S1 S2 S3 S4
– p.13.
2x6 − 847 144x5 − 325 144x4
192 x3 + 403 144x2 − 1667 576 x + 35 96
– p.14.
P1 P2 P3 Q1 Q2 Q3
– p.14.
P1 P2 P3 Q1 Q2 Q3 −R1 −R2 −R3 −R4
– p.14.
P1 P2 P3 Q1 Q2 Q3 −R1 −R2 −R3 −R4 S1 S2 S3
– p.14.
– p.15.
– p.16.
– p.17.
– p.18.
– p.19.
– p.19.
d r2(v1 + v2) + r3 v2
2+hv2+f
d
– p.19.
– p.20.
– p.20.
– p.20.
v2
i +h˜
vi+f ˜ ui
– p.20.
v2
i +h˜
vi+f ˜ ui
– p.20.
– p.21.
– p.22.
– p.23.