21.4 Elliptic Curves in Characteristic 2

Many applications use elliptic curves mod 2, or elliptic curves defined over the finite fields GF(2n) (these are described in Section 3.11). This is often because mod 2 adapts well to computers. In 1999, NIST recommended 15 elliptic curves for cryptographic uses (see [FIPS 186-2]). Of these, 10 are over finite fields GF(2n).

If we’re working mod 2, the equations for elliptic curves need to be modified slightly. There are many reasons for this. For example, the derivative of y2 is 2yy=0,  since 2 is the same as 0. This means that the tangent lines we compute are vertical, so 2P= for all points P. A more sophisticated explanation is that the curve y2x3+bx+c(mod2) has singularities (points where the ...

Get Introduction to Cryptography with Coding Theory, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.