Elliptic Curve Cryptography
N. P. Smart, University of Bristol, UK
Geometric Definition of the Group Law
Algebraic Formulation of the Group Law
The Elliptic Curve Discrete Logarithm Problem
Defences Against Side Channel Attacks
INTRODUCTION
Elliptic curves were first introduced into cryptography by Miller (1986) and Koblitz (1987). In recent years they have gained widespread interest because of their shorter key size compared to systems such as RSA, their superior efficiency in certain situations, and the smaller bandwidth that they require. These advantages are becoming more compelling as time progresses because of the increased use of smaller and smaller mobile computing devices with associated bandwidth and computational constraints.
However, probably the main driving force behind interest in elliptic curve based cryptography (ECC) is that as time progresses one needs to increase ECC key sizes more slowly than one needs to increase RSA key sizes. This is because the best known attacks against ECC are exponential in nature, whereas we already know that integer factorization has subexponential solutions.
In this chapter we aim to introduce the basics of elliptic curve cryptography. However, ...
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.