Elliptic curve cryptography | Infosec (2024)

Cryptography

As its name suggests, elliptic curve cryptography (ECC) uses elliptic curves (like the one shown below) to build cryptographic algorithms. Because of the features of elliptic curves, it is possible to duplicate classical integer-based public key crypto with ECC.

Doing so also provides a few advantages compared to the integer-based asymmetric cryptography.

Building encryption with elliptic curves

Public key cryptography is based on mathematically “hard” problems. These are mathematical functions that are easy to perform but difficult to reverse. The problems used in classical asymmetric cryptography are the discrete logarithm problem (exponents are easy, logarithms are hard) and the factoring problem (multiplication is easy, factoring is hard).

Elliptic curve cryptography is based on the fact that certain mathematical operations on elliptic curves are equivalent to mathematical functions on integers:

  • Adding two points on an elliptic curve is equivalent to multiplication
  • Multiplying two points on an elliptic curve is equivalent to exponentiation

These operations are the same operations used to build classical, integer-based asymmetric cryptography. This means that it is possible to slightly tweak existing cryptographic algorithms to work with points on an elliptic curve.

For example, Diffie-Hellman is all about exponentiation. Key exchange is based on the fact that (xa)b=(xb)a=xab. Due to the fact that logarithms are “hard” (i.e. have complexity that is exponentially related to the length of the exponents), Diffie-Hellman users can publicly exchange xa and xb without fearing that an eavesdropper could learn the values of their private keys a and b.

With elliptic curve cryptography, xa becomes aX, where X is a point on the elliptic curve. Since point division is equivalent to logarithms, it’s a “hard” problem, making it infeasible to learn a from aX. Using this relationship, it is possible to build Diffie-Hellman using elliptic curves.

Why use ECC?

ECC is based on the same “hard” problems as classical integer-based public key cryptography. This means that ECC algorithms will also be breakable when quantum computing makes Shor’s Algorithm usable.

That said, ECC has a couple of advantages over integer-based public key cryptography. The first of these is key length, as demonstrated in the table below.

This table compares the effective key strength of symmetric cryptography, integer-based public key cryptography, and ECC. As shown, ECC requires much lower key lengths to achieve the same level of security as RSA and Diffie-Hellman. While symmetric cryptography needs even shorter key lengths (and is more quantum resistant), it doesn’t have the same functionality as asymmetric cryptography.

This shorter key length makes ECC more efficient than its integer-based counterparts. An ECC algorithm has lower memory and power requirements than other classical public-key cryptography, making it a better choice for resource-constrained devices like smartphones and Internet of Things (IoT) devices.

Using ECC securely

At the algorithm-level, ECC is as secure as RSA, Diffie-Hellman, and similar algorithms because it is based on the same “hard” problems. Unless a non-quantum algorithm is found that efficiently solves the factoring or discrete logarithm problems, these algorithms are secure until large enough quantum computers are available.

Where ECC can be complex is curve selection. A number of different elliptic curves exist, and some are more secure than others. When implementing ECC, it is important to select a curve that is well-studied and that has no known weaknesses.

Elliptic curve cryptography | Infosec (4)

Learn Applied Cryptography

Build your applied cryptography and cryptanalysis skills with 13 courses covering hashing, PKI, SSL/TLS, full disk encryption and more.

Start Learning

Conclusion

ECC is an adaption of integer-based classical asymmetric cryptography. Because it is more efficient in terms of key length and power consumption, it is a useful alternative to integer-based algorithms.

Sources

https://avinetworks.com/glossary/elliptic-curve-cryptography/

https://www.quantiki.org/wiki/shors-factoring-algorithm

https://security.stackexchange.com/questions/200822/if-pgp-is-2048-or-4098-then-what-is-128-bit-encryption

Posted: March 8, 2021

Elliptic curve cryptography | Infosec (5)

Howard Poston

View Profile

Howard Poston is a copywriter, author, and course developer with experience in cybersecurity and blockchain security, cryptography, and malware analysis. He has an MS in Cyber Operations, a decade of experience in cybersecurity, and over five years of experience as a freelance consultant providing training and content creation for cyber and blockchain security. He is also the creator of over a dozen cybersecurity courses, has authored two books, and has spoken at numerous cybersecurity conferences. He can be reached by email at howard@howardposton.com or via his website at https://www.howardposton.com.

Elliptic curve cryptography | Infosec (2024)
Top Articles
What is CFD | What is Computational Fluid Dynamics? | SimScale
Accept International Payments with Paytm Card Machine
Edina Omni Portal
Unit 30 Quiz: Idioms And Pronunciation
Spn 1816 Fmi 9
Enrique Espinosa Melendez Obituary
Goodbye Horses: The Many Lives of Q Lazzarus
Brendon Tyler Wharton Height
Truist Park Section 135
Unraveling The Mystery: Does Breckie Hill Have A Boyfriend?
Paula Deen Italian Cream Cake
Crime Scene Photos West Memphis Three
Fallout 4 Pipboy Upgrades
Campaign Homecoming Queen Posters
[PDF] INFORMATION BROCHURE - Free Download PDF
Radio Aleluya Dialogo Pastoral
Nashville Predators Wiki
Abortion Bans Have Delayed Emergency Medical Care. In Georgia, Experts Say This Mother’s Death Was Preventable.
Inside the life of 17-year-old Charli D'Amelio, the most popular TikTok star in the world who now has her own TV show and clothing line
Itziar Atienza Bikini
2020 Military Pay Charts – Officer & Enlisted Pay Scales (3.1% Raise)
Craigslist Mt Pleasant Sc
Lehmann's Power Equipment
Nurse Logic 2.0 Testing And Remediation Advanced Test
X-Chromosom: Aufbau und Funktion
I Saysopensesame
We Discovered the Best Snow Cone Makers for Carnival-Worthy Desserts
Mail.zsthost Change Password
Cvs El Salido
Marion City Wide Garage Sale 2023
LCS Saturday: Both Phillies and Astros one game from World Series
Craigslist List Albuquerque: Your Ultimate Guide to Buying, Selling, and Finding Everything - First Republic Craigslist
manhattan cars & trucks - by owner - craigslist
Craigs List Tallahassee
Red Sox Starting Pitcher Tonight
Wega Kit Filtros Fiat Cronos Argo 1.8 E-torq + Aceite 5w30 5l
6143 N Fresno St
Roto-Rooter Plumbing and Drain Service hiring General Manager in Cincinnati Metropolitan Area | LinkedIn
Myanswers Com Abc Resources
Craigslist Florida Trucks
Seminary.churchofjesuschrist.org
Traumasoft Butler
Dwc Qme Database
Smite Builds Season 9
Breaking down the Stafford trade
Matt Brickman Wikipedia
Pickwick Electric Power Outage
The Complete Uber Eats Delivery Driver Guide:
Playboi Carti Heardle
Enjoy Piggie Pie Crossword Clue
18443168434
Zom 100 Mbti
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 5844

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.