Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography
An Introduction
- Dr. F
. Vercauteren
Katholieke Universiteit Leuven
22 April 2008
- Dr. F. Vercauteren
Elliptic Curve Cryptography An Introduction
Elliptic Curve Cryptography An Introduction Dr. F . Vercauteren - - PowerPoint PPT Presentation
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings Elliptic Curve Cryptography An Introduction Dr. F . Vercauteren Katholieke Universiteit Leuven 22 April 2008 Dr. F. Vercauteren Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
An Introduction
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
PLAINTEXT 110100011100 PLAINTEXT 110100011100 CIPHERTEXT ????????????
ENCRYPTIONKEY DECRYPTIONKEY
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
PLAINTEXT 110100011100 PLAINTEXT 110100011100 CIPHERTEXT ???????????? CIPHERTEXT ????????????
ENCRYPTIONKEY DECRYPTIONKEY
PUBLICKEY OFBOB PRIVATE KEYOFBOB
PUBLICLIST
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
◮ Main idea: easy to find two large primes p and q, but very
◮ RSA still most popular public key cryptosystem.
◮ Group G is set with operation · and each element has
◮ Main idea: very easy to compute h = gx for given x, but
◮ Popular choices: finite fields and elliptic curves.
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
−8 −6 −4 −2 2 4 6 8 −6 −4 −2 2 4 6 −6 −4 −2 2 4 6 8 −6 −4 −2 2 4 6
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
−6 −4 −2 2 4 6 −4 −2 2 4 P ⊕ Q Q P R L′ L −6 −4 −2 2 4 6 −4 −2 2 4 2P P L′ L R
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
◮ not R since not exact ◮ not Q since size of numbers involved grows too fast
◮ Fp with p prime: represented by Z mod p ◮ F2n with 2n elements: represented by F2[X] mod P(X), i.e.
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 50 100 150 200 250 300 350 400 450 500 Keylength conventional systems RSA and DSA Keylength elliptic curve system
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
◮ ECDH: EC Diffie-Hellman Secret Value Derivation ◮ ECMQV: EC Menezes-Qu-Vanstone Secret Value
◮ ECNR: EC Nyberg-Rueppel Signatures ◮ ECDSA: EC Digital Signature Algorithm
◮ ECIES: EC Integrated Encryption Scheme
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
◮ e(g1 + g2, h) = e(g1, h)e(g2, h), ◮ e(g, h1 + h2) = e(g, h1)e(g, h2).
◮ for all g = 1: ∃x ∈ G2 such that e(g, x) = 1 ◮ for all h = 1: ∃x ∈ G1 such that e(x, h) = 1
◮ Scalar product on vectorspace over finite fields
q × Fn q → Fq .
◮ Weil- and Tate pairings on elliptic curves and abelian
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
◮ MOV: DLP reduction from G1 to GT
◮ Decision DH easy in G1
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
−4 −3 −2 −1 1 2 3 4 −25 −20 −15 −10 −5 5 10 15 20
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
◮ ANSI X9.62, X9.63 ◮ NIST FIPS 186-2 ◮ IEEE 1363-2000 ◮ ISO/IEC 14888-3, 9796-4, 15946 ◮ SECG
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
◮ Elliptic curve E over finite field Fq ◮ Point G ∈ E(Fq), n = ord(G) and cofactor h = #E(Fq)/n
◮ Select random integer d in the interval [1, n − 1] ◮ Compute Q = d · G ◮ Public key is Q, Private key is d
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction
Cryptography Elliptic Curves EC Cryptographic Primitives Pairings
Elliptic Curve Cryptography An Introduction