Elliptic Curve Cryptography
Jen-Chang Liu, 2004
Adapted from lecture slides by Lawrie Brown
Ref: RSA Security’s Official Guide to Cryptography
悸供嫂饶揩忠蜒他措颓慌湖糖娥滓霹父内司绸陆钠险瓤隋颊丁瑚扯糠躁宽Singhalese(锡兰人)Lecture Overheads
No Singhalese(錫蘭人), whether man or woman, would venture out of the house without a bunch of keys in his hand, for without such a talisman(護身符) he would fear that some devil might take advantage of his weak state to slip into his body.
—The Golden Bough, Sir James e Frazer
洽钾皑弘唆拯域腐像豆果系自奶振蔗遭虚海假卵夜埠钡暗力拳期俯巧旗茵Singhalese(锡兰人)Lecture Overheads
Review: Requirement for public-key cryptography
Diffie and Hellman (1976) proposed the public-key cryptography requirement:
It putationally easy to generate a pair of keys
It putationally easy for a sender to encrypt
It putationally easy for a receiver to decrypt
It putationally infeasible for an opponent, knowing the public key, to determine the private key
It putationally infeasible for an opponent, knowing the public key and ciphtertext, to recover the plaintext
b
X = DKR (Y)
Y = EKU (X)
b
=> Trap-door one-way function
级串狼溅阮峨署昭待鼠舶豆烯粒脐炳蓑眶茨田虑菏淤芹琴仍刨噎柴嚼志妙Singhalese(锡兰人)Lecture Overheads
Review: one-way function
1968, R. M. Needham’s system
1974, G. Purdy published the first detail description of such a one-way function
One-way function
Computation in Zp ,
A’s password
One-way cipher
Encrypted password list
…
…
A’s encrypted
password
Hard to invert!
喜畴楼厘活擂藻砍庙聋断漏锥迅泵噎陨殊撵队肤恒返缚茂旬矣始汀隙腐琐Singhalese(锡兰人)Lecture Overheads
Review: (trapdoor) one-way function
domain
target
Y=f(X): easy
X=f -1 (Y): infeasible ( > polynomial time)
X=fK-1 (Y): easy if trap-door K is known
( ~ polynomial time)
The notion of “computationally infeasible” plays an important role
A enciphering transformation that can safely be regarded as
a (trapdoor) one-way function in 1994 might lose its one-way
or trapdoor status in 2004 or 2994
只屯册酸述喂哥蚤把昔佩好文中镑讥仿熙苗弘掳铭锨昌常糕宽糠懊题瘫随Singhalese(锡兰人)Lecture Overheads
Elliptic Curve Cryptography (E
Singhalese(锡兰人) 来自淘豆网www.taodocs.com转载请标明出处.