Blog

Elliptic curves: discrete logarithm problem

Written by Dominik Joe Pantůček on 2018-05-10

Algebraic groups built on top of points of elliptic curves together with the scalar multiplication specified as repeated addition can be used as basic building blocks for asymmetric cryptography systems. The strength of these systems if derived from the toughness of the reversing the scalar multiplication operation. It is very expensive to reverse this operation and to answer a question like "how many times we have to multiply point G to get given point P". This problem is called Elliptic Curve Discrete Logarithm Problem - or ECDLP for short. In this article we show the toughness of this problem.

...

Elliptic curves: double and add

Written by Dominik Joe Pantůček on 2018-05-03

Last time we have shown how to perform scalar multiplication of point on elliptic curve in simple Weierstrass form over a finite field. We have also shown that all the required properties hold for all rational points of the curve - which is a good thing. The problem we have not tackled yet is the complexity of the scalar multiplication operation. Today we are about to present a method of performing fast scalar multiplication in which the complexity of the operation grows much slower than the size of the scalar.

...

Elliptic curves: prime-order curves

Written by Dominik Joe Pantůček on 2018-04-26

As we have shown last time, just mapping elliptic curve in simple Weierstrass form over a finite field does not make the curve automatically practical for cryptography. Using just a few points from the whole set cannot be very secure. Today we present two important properties the curve must possess in order to be of some practical use.

...

Elliptic curves: scalar multiplication revisited

Written by Dominik Joe Pantůček on 2018-04-19

Applying the scalar multiplication to points on elliptic curves over finite fields works the same way as over real numbers. The difference is that over a finite field, the operation can actually be - and it is - used for some real-world cryptography. If we look at the operation in detail, we also find some interesting features which may help or complicate things a bit when it comes to implementing such cryptography. This week we show how it works.

...

Elliptic curves: multiplication by scalar

Written by Dominik Joe Pantůček on 2018-04-12

As we are heading towards the actual cryptography using elliptic curves, we need to define an operation that allows us to combine numbers and points. This operation is called scalar multiplication and allows us to - yes - multiply a point by a scalar value (that is - a number). Using this technique, we are getting closer to the ultimate goal of using elliptic curves for some cryptography to secure our online communication.

...