ELLIPTICAL CURVE CRYPTOGRAPHY - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

ELLIPTICAL CURVE CRYPTOGRAPHY

Description:

-Anusha Uppaluri ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique) ECC was introduced by Victor Miller and Neal ... – PowerPoint PPT presentation

Number of Views:149
Avg rating:3.0/5.0
Slides: 13
Provided by: AnushaU
Category:

less

Transcript and Presenter's Notes

Title: ELLIPTICAL CURVE CRYPTOGRAPHY


1
ELLIPTICAL CURVE CRYPTOGRAPHY
  • -Anusha Uppaluri

2
  • ECC- A set of algorithms for key generation,
    encryption and decryption (public key encryption
    technique)
  • ECC was introduced by Victor Miller and Neal
    Koblitz in 1985
  • Good alternative to other asymmetric
    cryptography algorithms
  • Greater security for a given key size
  • Smaller key size more compact implementations
  • Is related to discrete logarithm cryptography

3
  • Asymmetric cryptographic systems use
  • functions whose inverse is difficult to
    calculate.
  • Ex RSA-factoring very large numbers, Diffie
  • Helman Key exchange- discrete log problem

4
Difficulty of forward and inverse operation
against key length
5
  • ECCs inverse operation gets harder much faster

6
What is ECC?
  • Elliptic curve is defined by the equation
  • y2x3axb

Elliptic curve
7
  • Consider a very large prime number P, a square
    graph PxP in size.
  • Define an elliptic curve satisfying the above
    equation.
  • Considering the points (x,y) on the curve a group
    which is a subset of all the points on the graph
    is created.
  • Point multiplication is the critical operation
    used calculate kP where k is an integer and P is
    a point on curve.

8
  • Discrete Logarithm Problem is the inverse of
    point multiplication given points Q,P find k
    such that QkP
  • Pollards rho attack is the best possible attack
    on ECC
  • Pollards rho attack gets lot harder much faster
    with increase in key size.

9
ECC compared with RSA
10
  • Smaller ECC keys implies cryptographic
    operations in fewer processor cycles, faster
    operations, less power consumed, lower memory
    demands
  • Ideal for portable devices
  • Few cases wherein elliptical curve discrete
    logarithm problem becomes vulnerable to
    subexponential techniques.

11
References
  • http//www.deviceforge.com/articles/AT4234154468.h
    tml
  • http//www.rsa.com/rsalabs/node.asp?id2013
  • http//searchsecurity.techtarget.com/sDefinition/0
    ,,sid14_gci784941,00.html

12
Questions?
Write a Comment
User Comments (0)
About PowerShow.com