12
(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves 1

Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011)

Elliptic Curves

1

Page 2: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

Figure 10.4 Example of Elliptic Curves

2

Page 3: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

Abelian group meets the following axioms:

3

Page 4: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

4

Page 5: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

5

Page 6: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

6

Page 7: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

7

Page 8: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

8

Page 9: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

Elliptic Curve Cryptography

9

Page 10: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

10

Page 11: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

11

Page 12: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

Elliptic Curve Digital Signature Algorithm (from https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm)

12