Professional Documents
Culture Documents
Project Report on
Bachelor of Science
in
Mathematics
By
CERTIFICATE
Place: Thrissur
Date: 14/03/2024
ii
Research and Post Graduate Department of Mathematics
St.Thomas College (Autonomous),Thrissur
CERTIFICATE
Place: Thrissur
Date: 14/03/2024
iii
Research and Post Graduate Department of Mathematics
St.Thomas College (Autonomous),Thrissur
CERTIFICATE
Place: Thrissur
Date: 14/03/2024
iv
Research and Post Graduate Department of Mathematics
St.Thomas College (Autonomous),Thrissur
CERTIFICATE
Place: Thrissur
Date: 14/03/2024
v
Research and Post Graduate Department of Mathematics
St.Thomas College (Autonomous),Thrissur
CERTIFICATE
2024.
Place: Thrissur
Date: 14/03/2024
vi
DECLARATION
(Autonomous), Thrissur
vii
DECLARATION
(Autonomous), Thrissur
viii
DECLARATION
(Autonomous), Thrissur
ix
DECLARATION
(Autonomous), Thrissur
x
DECLARATION
xi
ACKNOWLEDGEMENTS
The success and final outcome of this project required a lot of guid-
ance and assistance from many people and I would like to thank all of
them. First and foremost, I pay my obeisance to God, the almighty to
have bestowed upon me good health, courage and inspiration. I express
my heartfelt thanks to Rev.Dr.Martin K A., Principal, St. Thomas Col-
lege (Autonomous), Thrissur.I owe my deepest gratitude to my super-
visor, Mr. Ashbin Mathew Assistant Professor, Department of Mathe-
matics, St. Thomas College (Autonomous), Thrissur, for his admirable
inspiration, constant courage and assistance in the preparation of this
project. I’m greatly indebted to Assistant Professor Dr. Viji M., Head
and all the faculty members of Department of Mathematics for their
support and cooperation. I am extremely thankful to my family and
friends for the whole hearted support, encouragement and love upon
me. I also place on record, my sense of gratitude to one and all who,
directly and indirectly, have lead their helping hand in this work
xii
ACKNOWLEDGEMENTS
The success and final outcome of this project required a lot of guid-
ance and assistance from many people and I would like to thank all of
them. First and foremost, I pay my obeisance to God, the almighty to
have bestowed upon me good health, courage and inspiration. I express
my heartfelt thanks to Rev.Dr.Martin K A., Principal, St. Thomas Col-
lege (Autonomous), Thrissur.I owe my deepest gratitude to my super-
visor, Mr. Ashbin Mathew Assistant Professor, Department of Mathe-
matics, St. Thomas College (Autonomous), Thrissur, for his admirable
inspiration, constant courage and assistance in the preparation of this
project. I’m greatly indebted to Assistant Professor Dr. Viji M., Head
and all the faculty members of Department of Mathematics for their
support and cooperation. I am extremely thankful to my family and
friends for the whole hearted support, encouragement and love upon
me. I also place on record, my sense of gratitude to one and all who,
directly and indirectly, have lead their helping hand in this work
xiii
ACKNOWLEDGEMENTS
The success and final outcome of this project required a lot of guid-
ance and assistance from many people and I would like to thank all of
them. First and foremost, I pay my obeisance to God, the almighty to
have bestowed upon me good health, courage and inspiration. I express
my heartfelt thanks to Rev.Dr.Martin K A., Principal, St. Thomas Col-
lege (Autonomous), Thrissur.I owe my deepest gratitude to my super-
visor, Mr. Ashbin Mathew Assistant Professor, Department of Mathe-
matics, St. Thomas College (Autonomous), Thrissur, for his admirable
inspiration, constant courage and assistance in the preparation of this
project. I’m greatly indebted to Assistant Professor Dr. Viji M., Head
and all the faculty members of Department of Mathematics for their
support and cooperation. I am extremely thankful to my family and
friends for the whole hearted support, encouragement and love upon
me. I also place on record, my sense of gratitude to one and all who,
directly and indirectly, have lead their helping hand in this work
xiv
ACKNOWLEDGEMENTS
The success and final outcome of this project required a lot of guid-
ance and assistance from many people and I would like to thank all of
them. First and foremost, I pay my obeisance to God, the almighty to
have bestowed upon me good health, courage and inspiration. I express
my heartfelt thanks to Rev.Dr.Martin K A., Principal, St. Thomas Col-
lege (Autonomous), Thrissur.I owe my deepest gratitude to my super-
visor, Mr. Ashbin Mathew Assistant Professor, Department of Mathe-
matics, St. Thomas College (Autonomous), Thrissur, for his admirable
inspiration, constant courage and assistance in the preparation of this
project. I’m greatly indebted to Assistant Professor Dr. Viji M., Head
and all the faculty members of Department of Mathematics for their
support and cooperation. I am extremely thankful to my family and
friends for the whole hearted support, encouragement and love upon
me. I also place on record, my sense of gratitude to one and all who,
directly and indirectly, have lead their helping hand in this work
xv
ACKNOWLEDGEMENTS
The success and final outcome of this project required a lot of guid-
ance and assistance from many people and I would like to thank all of
them. First and foremost, I pay my obeisance to God, the almighty to
have bestowed upon me good health, courage and inspiration. I express
my heartfelt thanks to Rev.Dr.Martin K A., Principal, St. Thomas Col-
lege (Autonomous), Thrissur.I owe my deepest gratitude to my super-
visor, Mr. Ashbin Mathew Assistant Professor, Department of Mathe-
matics, St. Thomas College (Autonomous), Thrissur, for his admirable
inspiration, constant courage and assistance in the preparation of this
project. I’m greatly indebted to Assistant Professor Dr. Viji M., Head
and all the faculty members of Department of Mathematics for their
support and cooperation. I am extremely thankful to my family and
friends for the whole hearted support, encouragement and love upon
me. I also place on record, my sense of gratitude to one and all who,
directly and indirectly, have lead their helping hand in this work
xvi
ABSTRACT
Cryptography is the practice and study of techniques for secure com-
munication in the presence of third parties. It involves encrypting and
decrypting data to ensure confidentiality, integrity, and authenticity.
Cryptography plays a crucial role in various applications such as se-
cure communication, digital signatures, secure transactions, and data
protection.There are mainly two types of cryptography : Symmetric
Cryptography and Asymmetric Cryptography. Classical cryptosystems
are those cryptosystems which were used in olden times. Now with
the advancement in technology modern cryptographic techniques have
gained popularity.
Elliptic curve cryptography is one such technique. The Elliptic Curve
Cryptography (ECC) is modern family of public-key cryptosystems,
which is based on the algebraic structures of the elliptic curves over fi-
nite fields and on the difficulty of the Elliptic Curve Discrete Logarithm
Problem (ECDLP). ECC implements all major capabilities of the asym-
metric cryptosystems: encryption, signatures and key exchange.Elliptic
curve analogue of Elgamal cryptosystem, Diffie Hellman key exchange
and comparison with RSA is studied. ECC has wide range of applica-
tions in the modern era.
There are several potential vulnerabilities to elliptic curve cryptogra-
phy.Although there are certain ways to attack ECC, the advantages of
elliptic curve cryptography for wireless security mean it remains a more
secure option. The increasing relevance and necessity of computers, on-
line data communication makes it necessary to learn how messages can
be conveyed securely.
xvii
Contents
CERTIFICATE . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
DECLARATION . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
ACKNOWLEDGEMENTS . . . . . . . . . . . . . . . . . . . . . xii
ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
CONTENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
0 PRELIMINARIES 1
0.1 Finite Field . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
0.2 Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
0.3 Congruent Modulo n . . . . . . . . . . . . . . . . . . . . . 2
0.4 Addition Modulo n . . . . . . . . . . . . . . . . . . . . . . . 2
0.5 Euler Totient Function . . . . . . . . . . . . . . . . . . . . 2
0.6 Primality and Factorization . . . . . . . . . . . . . . . . . 2
1 INTRODUCTION TO CRYPTOGRAPHY 3
1.1 Objectives of Cryptography . . . . . . . . . . . . . . . . . 3
1.2 Types of Cryprtography . . . . . . . . . . . . . . . . . . . . 4
1.2.1 Secret Key Cryptography . . . . . . . . . . . . . . 4
1.2.2 Public Key Cryptography . . . . . . . . . . . . . . 4
1.3 Hash Functions . . . . . . . . . . . . . . . . . . . . . . . . . 5
2 CLASSICAL CRYPTOSYSTEMS 6
2.1 The Shift Cipher: . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 The Substitution Cipher: . . . . . . . . . . . . . . . . . . . 7
2.3 The Vigenère Cipher: . . . . . . . . . . . . . . . . . . . . . 8
2.4 The Hill Cipher: . . . . . . . . . . . . . . . . . . . . . . . . 9
2.5 The Permutation Cipher: . . . . . . . . . . . . . . . . . . . 10
xviii
2.6 Rotor Mechanics: . . . . . . . . . . . . . . . . . . . . . . . . 10
2.7 Disadvantages of Classical Cryptosystems . . . . . . . . . 11
Bibliography 34
xix
Chapter 0
PRELIMINARIES
Finite fields are any fields (abstraction of numbers) with a finite set of elements.It
also has mathematical operations (addition and multiplication) that can be per-
formed on the elements in the set and the following holds
1. These operators, addition (+) and multiplication (.), perform binary opera-
tions
2. The result of adding element c and d must be in the set, making addition
closed.
0.2 Group
1
ELLIPTIC CURVE CRYPTOGRAPHY
For a positive integer n, two integers a and b are said to be congruent modulo
n (or a is congruent to b modulo n), if a and b have the same remainder when
divided by n (or equivalently if {(a-b)} is divisible by n). It can be expressed as
a ≡ b (mod n). Also,
a ≡ b (mod n) ⇔ n|(a − b)
For any positive integer n, let S be the complete set of residues {0, 1, 2, . . . , (n−1)}.
Then addition modulo n on S is defined as follows. For a and b in S , take the
usual sum of a and b as integers, and let r be the element of S to which the result
is congruent modulo n.
where n is the given positive integer, and p1 , p2 , . . . , pk are the distinct prime
factors of n.
INTRODUCTION TO
CRYPTOGRAPHY
1. Confidentiality
Confidentiality ensures that only the intended recipient can decrypt the mes-
sage and read its contents.
2. Non-repudiation
3
ELLIPTIC CURVE CRYPTOGRAPHY
3. Integrity
4. Authenticity
Authenticity ensures the sender and recipient can verify each other’s identities
and the destination of the message.
• AES
• DES
• Caesar cipher
distributed and should remain with the owner only. The public key can be given
to any other entity.
• ECC
• Diffie-Hellman
• DSS
Hash functions are irreversible, one-way functions which protect the data, at the
cost of not being able to recover the original message. Hashing is a way to trans-
form a given string into a fixed length string. A good hashing algorithm will
produce unique outputs for each input given. The only way to crack a hash is
by trying every input possible, until you get the exact same hash. A hash can be
used for hashing data (such as passwords) and in certificates.
• MD5
• SHA-1
• Whirlpool
CLASSICAL CRYPTOSYSTEMS
The Shift Cipher is probably the most well know historical cipher. It is a monoal-
phabetic cipher, which is based on modular arithmetic. Ciphers are called monoal-
phabetic if, once a key is chosen, it maps each alphabetic character to a unique
alphabetic character. Here is the formal definition of the Shift Cipher:
Definition:
Let P = C = K = Z26 . For 0 ≤ k ≤ 25, define ek (p) = (p + k) mod 26 and
dk (c) = (c − k) mod 26, where (p, c ∈ Z26 ).
As can be seen from the definition the cipher has only 26 distinct keys. The famous
Caesar Cipher is a plain Shift Cipher with k = 3. In order to encipher a message
using the Shift Cipher one has to first choose a key. Using the table below a plain
text string should be converted to a string of integers. The next step is to add
6
ELLIPTIC CURVE CRYPTOGRAPHY
value of the key to each integer reducing it modulo 26. And at last sequence of
integers should be converted to a cipher text string.
Decryption works in the similar way. The difference is that during description
one should subtract value of the key instead of adding it. In order to encrypt a
word ”julius” using the Shift Cipher with key k = 3 one, as described above, would
convert the plaintext to a sequence of integers resulting (9 20 11 8 20 18). After
should be added to each of the integers reducing the result modulo 26 if needed.
9 + 3 = 11; 20 + 3 = 23; 11 + 3 = 14; 8 + 3 = 11; 20 + 3 = 23; 18 + 3 = 21
After the integer string corresponding to the original message must be split on
n blocks of length m, where m is the length of the chosen key. The key is added
modulo 26 to each block.At last the blocks are concatenated and converted to
cipher text. As with the Shift Cipher tode crhhh h h njnk bhhhypt a message
one should subtract modulo 26 the key from each block. To demonstrate how
the procedure works we will encrypt a string ”attackatdown” using the keyword
”cipher” of length 6. The numerical equivalent of k is (2 8 15 7 4 17). The plain
text is transformed to integer string (0 19 19 0 2 10 0 19 3 14 22 13). Since m = 6
we split the plain text in two blocks and perform addition modulo 26.
Thus the ciphertext is ”CBIHGBCBSVAE”. In case if length of the plaintext is
not divisible by length of the key, only part of the key can be used for encoding the
last several characters of the original message. To decrypt the ciphertext ”CBI-
HGBCBSVAE” we follow the same sequence of steps. The numerical equivalent
of k is (2 8 15 7 4 17). The ciphertext can be written using integers as (21 8 7 6 1
2 1 18 21 0 4). Now subtract value of the keyword modulo 26 from the ciphertext.
The integer string should be split on blocks of length m so that each block would
have a form of Pn = (pn , 1, pn , 2, ..., pn , m). After multiplying each block 4Pn by a
each cycle. The idea was not new. It was already used during the American Civil
War. Probably the most well known rotor machine is Enigma.
The original Enigma was developed by Arthur Scherbius in 1919. During the
Second World War Germans used a variation of the original device. It used three
rotors chosen from a set of five. The three rotors were interconnected, so first rotor
would turn the second each full iteration, and second would turn the third. In
addition a number of extra mechanisms, a reflector for instance, were used to make
the cipher more secure. Due to incorrect usage of the devices Allies eventually
managed to break the code. The reading of information in the messages, Enigma
did not protect anymore, is sometimes credited with ending the war atleast a year
earlier than it would have otherwise.
3. Lack of Scalability: Classical cryptosystems may not scale well for use in
modern computing environments, especially when dealing with large amounts
of data or high-speed communication channels.
MODERN CRYPTOGRAPHIC
SYSTEMS
13
ELLIPTIC CURVE CRYPTOGRAPHY
data, asymmetric key cryptosystems are typically used to encrypt shorter mes-
sages. A combination of the two systems can be used for efficiency. A common
scenario is to use symmetric key encryption to encrypt large databases and ex-
change the shared key using asymmetric encryption.
The security of an asymmetric key cryptosystem relies on the security of the
private key.
Example : The Diffie-Hellman (D-H) key exchange protocol, the Digital Signature
Standard (DSS), and the Rivest, Shamir, Adleman (RSA) algorithm are some
examples of asymmetric key crypto-systems.
1. Key Generation:
• Choose an integer e such that 1 < e < φ(n) and e is coprime to φ(n). e will
be the public exponent.
3. Encryption:
• To encrypt a message M , the sender obtains the recipient’s public key (n, e).
4. Decryption:
• To decrypt the ciphertext C, the recipient uses their private key (n, d).
• The recipient computes the original message M using the decryption function:
M = C d mod n.
RSA Example:
Key Generation for Alice:
• Modulus: n = p × q = 143.
• Public key: e = 7.
Encryption by Bob:
• Bob encrypts his message M = 9 using Alice’s public key (n, e) = (143, 7).
Decryption by Alice:
• Alice decrypts the ciphertext C = 48 using her private key (d, n) = (103, 143).
• Alice can digitally sign a message by creating a hash of the message, encrypt-
ing the hash with her private key, and sending the encrypted hash along with
the message.
• Bob can verify the authenticity of the message by decrypting the hash with
Alice’s public key and comparing it with the hash of the original message.
• For confidentiality, Alice can encrypt her message with Bob’s RSA public key
before sending it.
• Digital certificates contain information about the certificate owner and their
public key, signed by a certificate authority, simplifying the process of ob-
taining and verifying public keys.
• From the cyclic group Fq , he chooses any element g and an element a such
that gcd(a, q) = 1.
• Then he computes h = g a .
• Bob calculates s′ = pa = g ak .
• He divides M ∗ s by s′ to obtain M as s = s′ .
“‘
Example:
2. Step 2: Alice selected a private key a = 4 and Bob selected a private key
b=3
5. Step 5: Alice receives public key y = 16 and Bob receives public key x = 6
INTRODUCTION TO ELLIPTIC
CURVES
. Elliptic curves are not the same as ellipses and hence has little relation to ellipses
and conic sections.The name comes from certain integrals involved in computing
the arc length of an ellipse, which involve square roots of cubic and quadratic poly-
nomials in x. Elliptic curves appear in many diverse areas of mathematics, ranging
from number theory to complex analysis, and from cryptography to mathematical
physics.
4.1 Definition:
y 2 = x3 + Ax + B (4.1)
where A and B are constants .This type of equation is called a Weierstrass equa-
tion, and said to be in Weierstrass form, or Weierstrass normal form.
The definition of elliptic curve also requires that the curve be non-singular. Geo-
metrically, this means that the graph has no cusps, self-intersections, or isolated
points. Algebraically, this holds if and only if the discriminant, ∆, is not equal to
zero.
∆ = 4A3 + 27B 2 ̸= 0 (4.2)
19
ELLIPTIC CURVE CRYPTOGRAPHY
Suppose that P and Q are two distinct points on an elliptic curve, and the P is
not -Q. To add the points P and Q, a line is drawn through the two points. This
line will intersect the elliptic curve in exactly one more point, call -R. The point
-R is reflected in the x-axis to the point R. The law for addition in an elliptic
curve group is P + Q = R.
Figure 4.2: Draw the vertical line through R. It hits E in another point.
Figure 4.3: We define the sum of P and Q on E to be the reflected point. We denote it by P ⊗ Q
or just P +Q
To add a point P to itself, a tangent line to the curve is drawn at the point P. If
yP is not 0, then the tangent line intersects the elliptic curve at exactly one other
point, -R. -R is reflected in the x-axis to R. This operation is called doubling the
point P ; the law for doubling a point on an elliptic curve group is defined by:
P + P = 2P = R
Figure 4.4: If we think of adding P to Q and let Q approach P , then the line L becomes the
tangent line to E at P .
Figure 4.5: Then we take the third intersection point R, reflect across the x-axis, and call the
resulting point P ⊗ P or 2P
The line through P and -P is a vertical line which does not intersect the elliptic
curve at a third point; thus the points P and -P cannot be added as previously.
It is for this reason that the elliptic curve group includes the point at infinity O.
By definition, P + (−P ) = O. As a result of this equation, P + O = P in the
elliptic curve group. O is called the additive identity of the elliptic curve group;
all elliptic curves have an additive identity.
Figure 4.6: The vertical line through P and -P does not intersect E in a third point
Point Addition: Consider two distinct points P and Q such that P = (x1 , y1 )
and Q = (x2 , y2 ). Let R = P + Q where R = (x3 , y3 ), then
x3 = λ 2 − x1 − x2
y3 = λ(x1 − x3 ) − y1
(y2 − y1 )
λ=
(x2 − x1 )
, λ is the slope of the line through P and Q.
Point Doubling :Consider a point P in the elliptic curve such that P =
(x1 , y1 ), where y1 ̸= 0. Let R = 2P where R = (x2 , y2 ), then
x2 = λ2 − 2x1
y2 = λ(x1 − x2 ) − y1
3x21 + a
λ=
2y1
, λ is the tangent at point P and a is one of the parameters chosen with the elliptic
curve.
Scalar multiplication: What point doubling shows us is that we can perform
a new kind of operation called scalar multiplication where P + P = 2P and 2
is a scalar multiple. This property is nonlinear and gives rise to two important
considerations: finite cyclic groups and the discrete log problem.
The set of points on an elliptic curve form an abelian group under elliptic curve
point addition.
• The binary operator is closed. It either intersects with a 3rd point on the
curve or the point at infinity (identity).
• Additive Identity: Given a point P (x, y) on the elliptic curve, there exists an
identity element such that 0 + P = P . This identity element is known as the
point at infinity.
• Additive Inverse: Given a point P (x, y) on the curve, there exists another
point P (x, −y) such that −P + P = 0.
• Commutativity: When we pick two points, there is only one other third point.
You can’t get four intersections in an elliptic curve. Since we only have one
possible solution, then it is clear that A + B = B + A.
Let K = Fq be the finite field with q elements and E an elliptic curve defined over
K. While the precise number of rational points of an elliptic curve E over K is in
general difficult to compute, the points over a finite field is comparatively easy to
compute. The number of points on the curve grows proportionally to the number
of elements in the field.
The set of points E( Fq ) is a finite abelian group. It is always cyclic or the product
of two cyclic groups, depending whether q is even or odd. For example, the curve
defined by y 2 = x3 − x over F71 has 72 points (71 affine points including (0,0) and
one point at infinity) over this field.
Elliptic curves over finite fields are notably applied in cryptography and for
the factorization of large integers. These algorithms often make use of the group
structure on the points of E. Algorithms that are applicable to general groups,
can thus be applied to the group of points on an elliptic curve.
ELLIPTIC CURVE
CRYPTOGRAPHY
27
ELLIPTIC CURVE CRYPTOGRAPHY
2 (where the
defined over two finite fields: Fp (where p is prime and p > 3) or Fm
fields size p = 2m). This means that the field is a square matrix of size p × p and
the points on the curve are limited to integer coordinates within the field only.
All algebraic operations within the field (like point addition and multiplication)
result in another point within the field. The elliptic curve equation over the finite
field Fp takes the following modular form:
y 2 ≡ x3 + Ax + B mod p
An elliptic curve over the finite field Fp consists of:
Example: The elliptic curve over finite field y 2 ≡ x3 + 7 mod 17 consists of the
blue points in the figure, i.e. in practice the "elliptic curves" used in cryptography
are "sets of points in square matrix", not classical "curves".
Figure 5.1: Example of elliptic curve over the finite field F 17: y 2 ≡ x3 + 7 mod 17
The point P (5, 8) belongs to the curve but the point (9, 15) does not belong
to the curve
The security of ECC depends on the difficulty of Elliptic Curve Discrete Logarithm
Problem. Let P and Q be two points on an elliptic curve such that kP = Q, where
k is a scalar. Given P and Q, it is computationally infeasible to obtain k, if k is
sufficiently large. But it is relatively easy to find Q where k and P are known.
k is the discrete logarithm of Q to the base P . Thus, point multiplication is the
basic operation in ECC. For example, the multiplication of a scalar ‘k’ with any
point ‘P ’ on the curve in order to obtain another point ‘Q’ on the curve.
The ECC algorithm works on the elliptic curve discrete logarithm problem (ECDLP).
This cryptography method is harder to crack since there is no known solution to
the mathematical problem given by the equation producing the elliptical curve in
a graph. Therefore, only one way remains for hackers: a brute-force attack —
or a trial-and-error approach, in other words. This complexity makes ECC more
secure compared to RSA.
ECC by structure is more secure compared to RSA because it offers optimal se-
curity with shorter key lengths. As a result, it requires a lesser load for network
and computing power, which translates into a better user experience.
There is a fixed publicly known finite field Fa . Elliptic curve E is defined over it
and the base point B ∈ E. Alice and Bob choose a random integer a and keeping
it secret and computes aB. They publish this point.
To send a message Pm to Bob, Alice chooses a random integer k and sends
the pair of points (kB, Pm + k(av B)) where av is Bob’s public key. To read the
message, Bob multiplies the first point in the pair by ay and subtracts from the
second point:
Pm + k(av B) − k(av B) = Pm
If Mr.X can solve the ECDLP, then he can determine av from the publicly
known information B and av B.
Suppose U and V want to agree upon a key which will later be used in conjunction
with a classical cryptosystem. They first publicly choose a finite field F , and an
elliptic curve E defined over it. Their key will be constructed from a random point
P on the elliptic curve. Their task is to choose the point P in such a way that all
of their communication with one another is public and yet no one other than the
two of them knows what P is.
U and V first publicly choose a point B ∈ E to serve as their base and the
order of B should be very large. To generate the key, first U chooses a random
integer u of the order of magnitude q which U keeps secret. Then U computes
uB ∈ E which makes public. V also does the same; V choose a random integer v
and makes public vB. The secret key they use is Puv ∈ E. Note that both users
can compute this key. However, M r.X, the third party, knows only uB and B.
Without solving ECDLP, i.e., finding u knowing B and uB (or finding u knowing
B and B), there seems to be no way to compute uvB knowing only uB and B.
• Less computation power: Since the ECC key is shorter the computation
power is also less computational power, ECC offers high security with faster,
shorter keys compared to RSA and take more energy to factor than it does
to calculate an elliptic curve objective function.
• Large encryption size: ECC increases the size of the encrypted message sig-
nificantly more than RSA encryption. The default key length for ECC private
keys is 256 bits, but many different ECC key sizes are conceivable depending
on the curve.
• A more complex: The ECC algorithm is more complete and more difficult to
implement than RSA. Algorithms cost have been computed from the compu-
tation of the elliptic curve operation and finite field operations that determine
the running time of the scalar multiplication integer sub-decomposition (ISD)
method.
square matrix, and the points on the curve can only have integer locations
within the field.
CONCLUSION
Cryptography is the process of hiding or coding information so that only the person
a message was intended for can read it. The art of cryptography has been used
to code messages for thousands of years and continues to be used in bank cards,
computer passwords, and e-commerce. In today’s age of computers, cryptography
is often associated with the process where an ordinary plain text is converted to
cipher text which is the text made such that intended receiver of the text can
only decode it and hence this process is known as encryption. The process of
conversion of cipher text to plain text this is known as decryption. There are
many cryptographic techniques.
ECC is a powerful cryptography approach. It generates security between key
pairs for public key encryption by using the mathematics of elliptic curves. ECC
creates keys that are more difficult, mathematically, to crack. ECC has gradually
been growing in popularity recently due to its smaller key size and ability to
maintain security. This trend will probably continue as the demand on devices
to remain secure increases due to the size of keys growing, drawing on scarce
mobile resourcesto also makes sense to adopt ECC to maintain high levels of
both performance and security. Also ECC is increasingly in wider use as websites
strive for greater online security in customer data and greater mobile optimization,
simultaneously. More sites using ECC to secure data means a greater need for this
kind of quick guide to elliptic curve cryptography.
1. https://cryptobook.nakov.com/asymmetric-key-ciphers/elliptic-curve-cryptography-
ecc
2. https://www.techtarget.com/searchsecurity/definition/elliptical-curve-cryptography
3. https://www.geeksforgeeks.org/blockchain-elliptic-curve-cryptography/
4.https://www.techtarget.com/searchsecurity/definition/RSA
5.https://www.geeksforgeeks.org/classical-cryptography-and-quantum-cryptography/
6.https://en.wikipedia.org/wiki/Elliptic-curvecryptography::text=Elliptic2Dcurve20
cryptography20(ECC),fields)20to20provide20equivalent20security.
7.https://ebooks.inflibnet.ac.in/csp11/chapter/elliptic-curve-cryptosystem/
8.https://www.researchgate.net/publication/272162532Implementationof
ElGamalEllipticCurveCryptographyoverprimefieldusingC
9.https://enigbe.medium.com/about-elliptic-curves-and-dlp-ed76c5e27497
10.https://avinetworks.com/glossary/elliptic-curve-cryptography/
11.https://www.keyfactor.com/blog/elliptic-curve-cryptography-what-is-it-how-does-
it-work/
12.https://docs.oracle.com/cd/E19047-01/sunscreen151/806-5397/i996724/
index.html: :text=Encryption20is20the20process20by,is20called20the20plaintext20message.
34