Top Banner
(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves 1
12

Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

Aug 30, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011)

Elliptic Curves

1

Page 2: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

Figure 10.4 Example of Elliptic Curves

2

Page 3: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

Abelian group meets the following axioms:

3

Page 4: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

4

Page 5: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

5

Page 6: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

6

Page 7: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

7

Page 8: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

8

Page 9: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

Elliptic Curve Cryptography

9

Page 10: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

10

Page 11: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

11

Page 12: Elliptic Curves - Eastern Mediterranean University · Web view(from W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, 2011) Elliptic Curves Figure

Elliptic Curve Digital Signature Algorithm (from https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm)

12