Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Aspects of Elliptic Curve Cryptography

Type
Slides
Tags
cryptography
Authors
Florian Heß
Event
Chaos Communication Congress 21th (21C3) 2004
Indexed on
Mar 27, 2013
URL
http://events.ccc.de/congress/2004/fahrplan/files/213-21C3-hess-4.pdf
File name
213-21C3-hess-4.pdf
File size
415.6 KB
MD5
0daa2cdba6ddc1d4a3923868309e4968
SHA1
7d53b6694836f25aa6b418d7e61d55d1c6643671

The talk will give an introduction to elliptic curve cryptography and explain some recent developments regarding attacks on the discrete logarithm problem on elliptic curves. In practice, elliptic curve cryptography can for example be employed in the TLS/SSL and IPsec protocols. It is well suited for use in constraint devices such as smart cards. Two main tasks of cryptography are encryption and digital signatures. In order to solve these tasks one employs in general suitable one way functions as fundamental building blocks in public key encryption and digital signature schemes. These are functions for which images are very easy but preimages very hard to compute. The security of encryption and digital signatures is then directly linked to the hardness of computing preimages under such one way functions. Strictly speaking, the existence of one way functions is not known. There are some candidates however, and under current knowledge particularly efficient candidates can be obtained from exponentiation in elliptic curves over finite fields. The reverse operation is called discrete logarithm problem. The investigation of the hardness of the discrete logarithm problem is mathematically challenging. The talk will explain the relevant mathematical objects and discuss these and further issues in simple terms. Towards the end of the talk I intend to report on some advanced attacks on the discrete logarithm problem.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !