Presentation is loading. Please wait.

Presentation is loading. Please wait.

Discrete Methods in Mathematical Informatics Lecture 1: What is Elliptic Curve? 9 th October 2012 Vorapong Suppakitpaisarn

Similar presentations


Presentation on theme: "Discrete Methods in Mathematical Informatics Lecture 1: What is Elliptic Curve? 9 th October 2012 Vorapong Suppakitpaisarn"— Presentation transcript:

1 Discrete Methods in Mathematical Informatics Lecture 1: What is Elliptic Curve? 9 th October 2012 Vorapong Suppakitpaisarn http://www-imai.is.s.u-tokyo.ac.jp/~mr_t_dtone/ vorapong@mist.i.u-tokyo.ac.jp, Eng. 6 Room 363 Download Slide at: https://www.dropbox.com/s/xzk4dv50f4cvs18/Lecture%201.pptx?m

2 First Section of This Course [5 lectures] Lecture 1: What is Elliptic Curve? Lecture 2: Elliptic Curve Cryptography Lecture 3-4: Fast Implementation for Elliptic Curve Cryptography Lecture 5: Factoring and Primality Testing L. C. Washington, “Elliptic Curves: Number Theory and Cryptography”, Chapman & Hall/CRC, 2003. Lecture 1: Chapter 1, Chapter 2 (2.1, 2.2) Lecture 2: Chapter 6 (6.1 – 6.6) Lecture 5: Chapter 7 L. C. Washington, “Elliptic Curves: Number Theory and Cryptography”, Chapman & Hall/CRC, 2003. Lecture 1: Chapter 1, Chapter 2 (2.1, 2.2) Lecture 2: Chapter 6 (6.1 – 6.6) Lecture 5: Chapter 7 Recommended Reading H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen, F. Vercauteren, "Handbook of Elliptic and Hyperelliptic Curve Cryptography", Chapman & Hall/CRC, 2005. A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano, "Elliptic Curve Cryptography Engineering", Proc. of IEEE Vol. 94, No. 2, pp. 395- 406 (2006). H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen, F. Vercauteren, "Handbook of Elliptic and Hyperelliptic Curve Cryptography", Chapman & Hall/CRC, 2005. A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano, "Elliptic Curve Cryptography Engineering", Proc. of IEEE Vol. 94, No. 2, pp. 395- 406 (2006). In each lecture, 1-2 exercises will be given, Choose 3 Problems out of them. Submit to vorapong@mist.i.u-tokyo.ac.jp before 31 Dec 2012 In each lecture, 1-2 exercises will be given, Choose 3 Problems out of them. Submit to vorapong@mist.i.u-tokyo.ac.jp before 31 Dec 2012 Grading

3 First Section of This Course [5 lectures] Lecture 1: What is Elliptic Curve? Lecture 2: Elliptic Curve Cryptography Lecture 3-4: Fast Implementation for Elliptic Curve Cryptography Lecture 5: Factoring and Primality Testing L. C. Washington, “Elliptic Curves: Number Theory and Cryptography”, Chapman & Hall/CRC, 2003. Lecture 1: Chapter 1, Chapter 2 (2.1, 2.2) Lecture 2: Chapter 6 (6.1 – 6.6) Lecture 5: Chapter 7 L. C. Washington, “Elliptic Curves: Number Theory and Cryptography”, Chapman & Hall/CRC, 2003. Lecture 1: Chapter 1, Chapter 2 (2.1, 2.2) Lecture 2: Chapter 6 (6.1 – 6.6) Lecture 5: Chapter 7 Recommended Reading H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen, F. Vercauteren, "Handbook of Elliptic and Hyperelliptic Curve Cryptography", Chapman & Hall/CRC, 2005. A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano, "Elliptic Curve Cryptography Engineering", Proc. of IEEE Vol. 94, No. 2, pp. 395- 406 (2006). H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen, F. Vercauteren, "Handbook of Elliptic and Hyperelliptic Curve Cryptography", Chapman & Hall/CRC, 2005. A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano, "Elliptic Curve Cryptography Engineering", Proc. of IEEE Vol. 94, No. 2, pp. 395- 406 (2006). In each lecture, 1-2 exercises will be given, Choose 3 Problems out of them. Submit to vorapong@mist.i.u-tokyo.ac.jp before 31 Dec 2012 In each lecture, 1-2 exercises will be given, Choose 3 Problems out of them. Submit to vorapong@mist.i.u-tokyo.ac.jp before 31 Dec 2012 Grading

4 Problem 1: The Artillerymens Dilemma (is not a) Puzzle http://cashflowco.hubpages.com/ ? Height = 0: 0 Ball  Square Height = 1: 1 Ball  Square Height = 2: 1 + 4 = 5 Balls  Not Square Height = 3: 1 + 4 + 9 = 14 Balls  Not Square Height = 4: 1 + 4 + 9 + 16 = 30 Balls  Not Square Elliptic Curve

5 Problem 1: The Artillerymens Dilemma (is not a) Puzzle (cont.) (0,0) (1,1) y = x (1/2,1/2)

6 Problem 1: The Artillerymens Dilemma (is not a) Puzzle (cont.) (0,0) (1,1) y = x (1/2,1/2) (1/2,-1/2) y = 3x-2

7 Problem 2: Right Triangle with Rational Sides We want to find a right triangle with rational sides in which area = 5 3 4 5 6 15 8 17 60 15/2 4 17/2 15 5

8 Problem 2: Right Triangle with Rational Sides (cont.) a b c ab/2 = 5 Elliptic Curve Note

9 Problem 2: Right Triangle with Rational Sides (cont.) (-4,6)

10 Problem 2: Right Triangle with Rational Sides (cont.) (-4,6) (1681/144,62279/1728)

11 Problem 2: Right Triangle with Rational Sides (cont.) 20/3 3/2 41/6 5 (-4,6) (1681/144,62279/1728)

12 Exercises Exercise 1 Exercise 2

13 Problem 3: Fermat’s Last Theorem http://wikipedia.com/ Conjectured by Pierre de Fermat in Arithmetica (1637). “I have discovered a marvellous proof to this theorem, that this margin is too narrow to contain” There are more than 1,000 attempts, but the theorem is not proved until 1995 by Andrew Wiles. One of his main tools is Elliptic Curve!!!

14 Problem 3: Fermat’s Last Theorem (cont.) Fermat kindly provided the proof for the case when n = 4 Elliptic Curve By several elliptic curves techniques, Fermat found that all rational solutions of the elliptic curve are (0,0), (2,0), (-2,0)

15 Formal Definitions of Elliptic Curve (0,0) (1,1) y = x (1/2,1/2) (1/2,-1/2) Weierstrass Equation Elliptic Curve Point Addition

16 Formal Definitions of Elliptic Curve (cont.) Point Addition

17 Formal Definitions of Elliptic Curve (cont.) x = 1/2 (1/2,1/2) (1/2,-1/2) Point Addition Point Double (-4,6) (1681/144,62279/1728)

18 Formal Definitions of Elliptic Curve (cont.) Point Double

19 First Section of This Course [5 lectures] Lecture 1: What is Elliptic Curve? Lecture 2: Elliptic Curve Cryptography Lecture 3-4: Fast Implementation for Elliptic Curve Cryptography Lecture 5: Factoring and Primality Testing L. C. Washington, “Elliptic Curves: Number Theory and Cryptography”, Chapman & Hall/CRC, 2003. Lecture 1: Chapter 1, Chapter 2 (2.1, 2.2) Lecture 2: Chapter 6 (6.1 – 6.6) Lecture 5: Chapter 7 L. C. Washington, “Elliptic Curves: Number Theory and Cryptography”, Chapman & Hall/CRC, 2003. Lecture 1: Chapter 1, Chapter 2 (2.1, 2.2) Lecture 2: Chapter 6 (6.1 – 6.6) Lecture 5: Chapter 7 Recommended Reading H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen, F. Vercauteren, "Handbook of Elliptic and Hyperelliptic Curve Cryptography", Chapman & Hall/CRC, 2005. A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano, "Elliptic Curve Cryptography Engineering", Proc. of IEEE Vol. 94, No. 2, pp. 395- 406 (2006). H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen, F. Vercauteren, "Handbook of Elliptic and Hyperelliptic Curve Cryptography", Chapman & Hall/CRC, 2005. A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano, "Elliptic Curve Cryptography Engineering", Proc. of IEEE Vol. 94, No. 2, pp. 395- 406 (2006). In each lecture, 1-2 exercises will be given, Choose 3 Problems out of them. Submit to vorapong@mist.i.u-tokyo.ac.jp before 31 Dec 2012 In each lecture, 1-2 exercises will be given, Choose 3 Problems out of them. Submit to vorapong@mist.i.u-tokyo.ac.jp before 31 Dec 2012 Grading

20 Exercises Exercise 1 Exercise 2

21 Thank you for your attention Please feel free to ask questions or comment.

22 Scalar Multiplication Scalar Multiplication on Elliptic Curve S = P + P + … + P = rP when r 1 is positive integer, S,P is a member of the curve Double-and-add method Let r = 14 = (01110) 2 Compute rP = 14P r = 14 = (0 1 1 1 0) 2 Weight = 3 P3P3P7P7P14P 6P6P2P2P 3 – 1 = 2 Point Additions 4 – 1 = 3 Point Doubles r times O


Download ppt "Discrete Methods in Mathematical Informatics Lecture 1: What is Elliptic Curve? 9 th October 2012 Vorapong Suppakitpaisarn"

Similar presentations


Ads by Google