Elliptic Curve Cryptography
February 24, 2024
Elliptic curve cryptography (ECC) is a popular choice for the security of data
online, including key exchanges, digital signatures, and encryption. ECC is often used in digital signatures,
email and message security, and many credit cards. It’s important that ECC is secure! We’re going to look
into the mathematical aspect of ECC to see how secure it is: the equation
itself is expressed as y2=x3+ax+b, where a and b are some coefficients.
Elliptic curves are a trapdoor function, where it is easy to get from one value to the
next, however given that final value, it would be complicated to work backwards and achieve
the initial value. The curve itself is in a sideways bell curve, and is always symmetric
across the x-axis.
You can connect two points on the elliptic curve with a line, and it will also touch
the elliptic curve a third time. If you were to reflect this point across the x-axis, this
point will be the sum of the values of the two initial points. Typically, in elliptic curve
cryptography, you would repeatedly be doing these actions (often denoted by x•P).
For 256-bit whole numbers, the minimum amount of operations would be 0. To find the
greatest amount of operations, we have to consider the greatest possible binary expansion,
which would be 2255+2254+...+21+20, meaning for
a maximum amount of 255 point doublings. The point doublings will sum to a total of 510 point
operations.
Using elliptic curve cryptography is often a lot more preferred in comparison to other
public key cryptography options since there is often a lesser amount of storage used. Elliptic
curve cryptography is often compared to RSA, which utilizes prime factorization to achieve
certain values. Although RSA is faster than ECC, there is a difference in storage, making
ECC more optimal today.
A large portion of popular cryptographic methods are done through the combination of
algebra, number theory, and combinatorics, and shows how so much of cryptography is based on
mathematics. If you’re interested, there's many different types of cryptographic systems
that are really cool, such as RSA, AES, and the Caesar Cipher.
Contact Me!
Feel free to message me anytime about anything! :)