An Introduction to Elliptic Curve Cryptography

Slides:



Advertisements
Similar presentations
The complex numbers To make many of the rules of mathematics apply universally we need to enlarge our number field. If we desire that every integer has.
Advertisements

The Function Concept DEFINITION: A function consists of two nonempty sets X and Y and a rule f that associates each element x in X with one.
Introduction to Elliptic Curves. What is an Elliptic Curve? An Elliptic Curve is a curve given by an equation E : y 2 = f(x) Where f(x) is a square-free.
Finite Fields Rong-Jaye Chen. p2. Finite fields 1. Irreducible polynomial f(x)  K[x], f(x) has no proper divisors in K[x] Eg. f(x)=1+x+x 2 is irreducible.
Cryptography and Network Security
Chapter 4 – Finite Fields. Introduction will now introduce finite fields of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key.
1 390-Elliptic Curves and Elliptic Curve Cryptography Michael Karls.
Chapter 2 Functions and Graphs
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
The Ubiquity of Elliptic Curves Joseph Silverman (Brown University) Public Lecture – Dublin Tuesday, 4 September 2007, 7:30 PM.
Elliptic Curve. p2. Outline EC over Z p EC over GF(2 n )
CSE115/ENGR160 Discrete Mathematics 02/22/11 Ming-Hsuan Yang UC Merced 1.
CSE115/ENGR160 Discrete Mathematics 02/21/12
Introduction to Gröbner Bases for Geometric Modeling Geometric & Solid Modeling 1989 Christoph M. Hoffmann.
1 Foundations of Interval Computation Trong Wu Phone: Department of Computer Science Southern Illinois University Edwardsville.
1 Equivalence of Real Elliptic Curves Equivalence of Real Elliptic Curves Allen Broughton Rose-Hulman Institute of Technology.
CPE5021 Advanced Network Security --- Advanced Cryptography: Elliptic Curve Cryptography --- Lecture 3 CPE5021 Advanced Network Security --- Advanced Cryptography:
Elliptic Curve Cryptography
Barnett/Ziegler/Byleen Finite Mathematics 11e1 Chapter 2 Review Important Terms, Symbols, Concepts 2.1. Functions Point-by-point plotting may be used to.
Ipsita Sahoo 10IT61B05 School of Information Technology IIT Kharagpur October 29, 2011 E LLIPTIC C URVES IN C RYPTOGRAPHY.
M. Khalily Dermany Islamic Azad University.  finite number of element  important in number theory, algebraic geometry, Galois theory, cryptography,
1 Preliminaries Precalculus Review I Precalculus Review II
Lecture 10: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2009.
Math 3121 Abstract Algebra I Lecture 3 Sections 2-4: Binary Operations, Definition of Group.
Systems of Linear Equation and Matrices
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Application of Elliptic Curves to Cryptography
Numbers, Operations, and Quantitative Reasoning.
Elementary Linear Algebra Anton & Rorres, 9th Edition
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Network Systems Lab. Korea Advanced Institute of Science and Technology No.1 Appendix A. Mathematical Background EE692 Parallel and Distribution Computation.
Monoids, Groups, Rings, Fields
Implementation of Finite Field Inversion
The Ubiquity of Elliptic Curves Joseph Silverman (Brown University) SUMS – Providence – February 22, 2003.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Elliptical Curve Cryptography Manish Kumar Roll No - 43 CS-A, S-7 SOE, CUSAT.
Chapter 1-The Basics Calculus, 2ed, by Blank & Krantz, Copyright 2011 by John Wiley & Sons, Inc, All Rights Reserved.
P.1 Real Numbers. 2 What You Should Learn Represent and classify real numbers. Order real numbers and use inequalities. Find the absolute values of real.
Chapter 4 – Finite Fields
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
MATERI I FUNGSI. Preliminaries REAL NUMBERS A real number may be either rational or irrational; either algebraic or transcendental; and either positive,
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
Elliptic Curve Cryptography Lawrence Fallow 19 April 2007.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Math Review and Lessons in Calculus
Great Theoretical Ideas in Computer Science.
Elliptic Curve Cryptography Celia Li Computer Science and Engineering November 10, 2005.
11 RSA Variants.  Scheme ◦ Select s.t. p and q = 3 mod 4 ◦ n=pq, public key =n, private key =p,q ◦ y= e k (x)=x (x+b) mod n ◦ x=d k (y)=  y mod n.
Elliptic Curve Crypto & ECC Diffie-Hellman Presenter: Le Thanh Binh.
Elliptic Curve Cryptography Speaker : Debdeep Mukhopadhyay Dept of Computer Sc and Engg IIT Madras.
Lecture 11: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2008.
1 Network Security Dr. Syed Ismail Shah
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
Chapter 13 Mathematic Structures 13.1 Modular Arithmetic Definition 1 (modulo). Let a be an integer and m be a positive integer. We denoted by a mod m.
Hardware Implementations of Finite Field Primitives
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Motivation Basis of modern cryptosystems
Lecture # 20 Sequence & Series
Giuseppe Bianchi Lecture 8: Elliptic Curve Crypto A (minimal) introduction.
Chapter 2 Functions and Graphs
Functions of Complex Variable and Integral Transforms
Network Security Design Fundamentals Lecture-13
Unit-III Algebraic Structures
Section 10.1 Groups.
Cryptology Design Fundamentals
MA5242 Wavelets Lecture 1 Numbers and Vector Spaces
Network Security Design Fundamentals Lecture-13
Presentation transcript:

An Introduction to Elliptic Curve Cryptography © Dept. of Computer Sc. and Engg, IIT Kharagpur An Introduction to Elliptic Curve Cryptography Debdeep Mukhopadhyay Chester Rebeiro Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -721302 23-27th May 2011 Anurag Labs, DRDO, Hyderabad 23-27 May 2011, Anurag Labs, DRDO, Hyderabad

Objectives Introduction to Elliptic Curves Elliptic Curve Arithmetic Point Addition Point Doubling Elliptic Curve equations Projective Co-ordinates 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Lets start with a puzzle… What is the number of balls that may be piled as a square pyramid and also rearranged into a square array? Soln: Let x be the height of the pyramid… We also want this to be a square: Hence, 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Graphical Representation Y axis X axis Curves of this nature are called ELLIPTIC CURVES 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Method of Diophantus Uses a set of known points to produce new points (0,0) and (1,1) are two trivial solutions Equation of line through these points is y=x. Intersecting with the curve and rearranging terms: We know that 1 + 0 + x = 3/2 => x = ½ and y = ½ Using symmetry of the curve we also have (1/2,-1/2) as another solution 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Diophantus’ Method Consider the line through (1/2,-1/2) and (1,1) => y=3x-2 Intersecting with the curve we have: Thus ½ + 1 + x = 51/2 or x = 24 and y=70 Thus if we have 4900 balls we may arrange them in either way 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Elliptic curves in Cryptography © Dept. of Computer Sc. and Engg, IIT Kharagpur Elliptic curves in Cryptography Elliptic Curve (EC) systems as applied to cryptography were first proposed in 1985 independently by Neal Koblitz and Victor Miller. The discrete logarithm problem on elliptic curve groups is believed to be more difficult than the corresponding problem in (the multiplicative group of nonzero elements of) the underlying finite field. 23-27th May 2011 Anurag Labs, DRDO, Hyderabad 23-27 May 2011, Anurag Labs, DRDO, Hyderabad

Elliptic Curve on a finite set of Integers Consider y2 = x3 + 2x + 3 (mod 5) x = 0  y2 = 3  no solution (mod 5) x = 1  y2 = 6 = 1  y = 1,4 (mod 5) x = 2  y2 = 15 = 0  y = 0 (mod 5) x = 3  y2 = 36 = 1  y = 1,4 (mod 5) x = 4  y2 = 75 = 0  y = 0 (mod 5) Then points on the elliptic curve are (1,1) (1,4) (2,0) (3,1) (3,4) (4,0) and the point at infinity:  Using the finite fields we can form an Elliptic Curve Group where we have a Elliptic Curve DLP problem: ECDLP 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Definition of Elliptic curves © Dept. of Computer Sc. and Engg, IIT Kharagpur Definition of Elliptic curves An elliptic curve over a field K is a nonsingular cubic curve in two variables, f(x,y) =0 with a rational point (which may be a point at infinity). The field K is usually taken to be the complex numbers, reals, rationals, algebraic extensions of rationals, p-adic numbers, or a finite field. Elliptic curves groups for cryptography are examined with the underlying fields of Fp (where p>3 is a prime) and F2m (a binary representation with 2m elements). 23-27th May 2011 Anurag Labs, DRDO, Hyderabad 23-27 May 2011, Anurag Labs, DRDO, Hyderabad

© Dept. of Computer Sc. and Engg, IIT Kharagpur General form of a EC An elliptic curve is a plane curve defined by an equation of the form Examples 23-27th May 2011 Anurag Labs, DRDO, Hyderabad 23-27 May 2011, Anurag Labs, DRDO, Hyderabad

Weierstrass Equation A two variable equation F(x,y)=0, forms a curve in the plane. We are seeking geometric arithmetic methods to find solutions Generalized Weierstrass Equation of elliptic curves: Here, x and y and constants all belong to a field of say rational numbers, complex numbers, finite fields (Fp) or Galois Fields (GF(2n)). 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

The Curve Equations depend on the field If Characteristic field is not 2: If Characteristics of field is neither 2 nor 3: 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Points on the Elliptic Curve (EC) Elliptic Curve over field L It is useful to add the point at infinity The point is sitting at the top of the y-axis and any line is said to pass through the point when it is vertical It is both the top and at the bottom of the y- axis 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

© Dept. of Computer Sc. and Engg, IIT Kharagpur The Abelian Group Given two points P,Q in E(Fp), there is a third point, denoted by P+Q on E(Fp), and the following relations hold for all P,Q,R in E(Fp) P + Q = Q + P (commutativity) (P + Q) + R = P + (Q + R) (associativity) P + O = O + P = P (existence of an identity element) there exists ( − P) such that − P + P = P + ( − P) = O (existence of inverses) 23-27th May 2011 Anurag Labs, DRDO, Hyderabad 23-27 May 2011, Anurag Labs, DRDO, Hyderabad

Elliptic Curve Picture x y Consider elliptic curve E: y2 = x3 - x + 1 If P1 and P2 are on E, we can define P3 = P1 + P2 as shown in picture Addition is all we need 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Addition in Affine Co-ordinates y=m(x-x1)+y1 x y Let, P≠Q, y2=x3+Ax+B 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Doubling of a point Let, P=Q What happens when P2=∞? 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Adding with the point O P1=P1+ O=P1 P2=O=∞ y P1 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

© Dept. of Computer Sc. and Engg, IIT Kharagpur Sum of two points Define for two points P (x1,y1) and Q (x2,y2) in the Elliptic curve Then P+Q is given by R(x3,y3) : 23-27th May 2011 Anurag Labs, DRDO, Hyderabad 23-27 May 2011, Anurag Labs, DRDO, Hyderabad

© Dept. of Computer Sc. and Engg, IIT Kharagpur Point at infinity O P+P = 2P As a result of the above case P=O+P O is called the additive identity of the elliptic curve group. Hence all elliptic curves have an additive identity O. 23-27th May 2011 Anurag Labs, DRDO, Hyderabad 23-27 May 2011, Anurag Labs, DRDO, Hyderabad

Projective Co-ordinates Two-dimensional projective space over K is given by the equivalence classes of triples (x,y,z) with x,y z in K and at least one of x, y, z nonzero. Two triples (x1,y1,z1) and (x2,y2,z2) are said to be equivalent if there exists a non-zero element λ in K, st: (x1,y1,z1) = (λx2, λy2, λz2) The equivalence class depends only the ratios and hence is denoted by (x:y:z) 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Projective Co-ordinates If z≠0, (x:y:z)=(x/z:y/z:1) What is z=0? We obtain the point at infinity. The two dimensional affine plane over K: There are advantages with projective co-ordinates from the implementation point of view 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

It is usual to assume the EC has no singular points Singularity For an elliptic curve y2=f(x), define F(x,y)=y2-F(x). A singularity of the EC is a pt (x0,y0) such that: It is usual to assume the EC has no singular points 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

If Characteristics of field is not 3: Hence condition for no singularity is 4A3+27B2≠0 Generally, EC curves have no singularity 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Elliptic Curves in Characteristic 2 Generalized Equation: If a1 is not 0, this reduces to the form: If a1 is 0, the reduced form is: Note that the form cannot be: 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

Points to Ponder Suppose that the cubic polynomial X3+Ax+B factors as (X-e1)(X-e2)(X-e3). Show that 4A3+27B2=0 iff two or more of e1, e2 and e3 are the same. Sketch the curves: E1: Y2=X3-7X+3 E2: Y2=X3-3X+2 note that the curve E2 is not an elliptic curve. It has a singular point. 23-27th May 2011 Anurag Labs, DRDO, Hyderabad

References D. Stinson, Cryptography: Theory and Practice, Chapman & Hall/CRC Lawrence C. Washington, Elliptic Curves: Number Theory and Cryptography, Chapman & Hall/CRC Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, An Introduction to Mathematical Cryptography, Springer. 23-27th May 2011 Anurag Labs, DRDO, Hyderabad