{"id":29071,"date":"2015-02-06T14:50:12","date_gmt":"2015-02-06T19:50:12","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/elliptic-curve-cryptography-wikipedia-the-free-encyclopedia.php"},"modified":"2015-02-06T14:50:12","modified_gmt":"2015-02-06T19:50:12","slug":"elliptic-curve-cryptography-wikipedia-the-free-encyclopedia","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/elliptic-curve-cryptography-wikipedia-the-free-encyclopedia.php","title":{"rendered":"Elliptic curve cryptography &#8211; Wikipedia, the free encyclopedia"},"content":{"rendered":"<p><p>    Elliptic curve cryptography (ECC) is an approach to    public-key cryptography based on    the algebraic structure of elliptic curves over finite fields.    One of the main benefits in comparison with non-ECC    cryptography (with plain Galois fields as a    basis) is the same level of security provided by keys of    smaller size.  <\/p>\n<p>    Elliptic curves are applicable for encryption, digital signatures, pseudo-random generators    and other tasks. They are also used in several integer factorization algorithms that have    applications in cryptography, such as Lenstra elliptic curve    factorization.  <\/p>\n<p>    Public-key cryptography is based on the intractability of certain mathematical    problems. Early    public-key systems are secure assuming that it is difficult to    factor a large integer composed of    two or more large prime factors. For elliptic-curve-based    protocols, it is assumed that finding the discrete    logarithm of a random elliptic curve element with respect    to a publicly known base point is infeasible: this is the    \"elliptic curve discrete logarithm problem\" or ECDLP. The    entire security of ECC depends on the ability to compute a    point multiplication    and the inability to compute the multiplicand given the    original and product points. The size of the elliptic curve    determines the difficulty of the problem.  <\/p>\n<p>    The primary benefit promised by ECC is a smaller key size,    reducing storage and transmission requirements, i.e. that an    elliptic curve group could provide the same level of security    afforded by an RSA-based system with a large modulus and    correspondingly larger key: for example, a 256-bit ECC public    key should provide comparable security to a 3072-bit RSA public    key.  <\/p>\n<p>    The use of elliptic curves in cryptography was suggested    independently by Neal Koblitz[1] and    Victor S. Miller[2] in 1985.    Elliptic curve cryptography algorithms entered wide use in 2004    to 2005.  <\/p>\n<p>    For current cryptographic purposes, an elliptic curve is    a plane    curve over a finite field (rather than the real numbers)    which consists of the points satisfying the equation  <\/p>\n<p>    along with a distinguished point at infinity, denoted .    (The coordinates here are to be chosen from a fixed finite field of    characteristic not equal to 2 or    3, or the curve equation will be somewhat more complicated.)  <\/p>\n<p>    This set together with the group operation of elliptic curves is an    Abelian    group, with the point at infinity as identity element. The    structure of the group is inherited from the divisor group of the    underlying algebraic variety. As is the case for    other popular public key cryptosystems, no mathematical proof    of security has been published for ECC as of 2009[update].  <\/p>\n<p>    The U.S. National Institute of Standards and Technology    (NIST) has endorsed ECC in its Suite B set of    recommended algorithms, specifically Elliptic Curve    DiffieHellman (ECDH) for key exchange and Elliptic Curve    Digital Signature Algorithm (ECDSA) for digital signature. The    U.S. National Security Agency (NSA)    allows their use for protecting information classified up to    top    secret with 384-bit keys.[3]  <\/p>\n<p>    While the RSA patent expired in 2000, there may be patents in force    covering certain aspects of ECC technology, though some    (including RSA    Laboratories[4] and    Daniel J. Bernstein[5]) argue    that the Federal elliptic curve digital signature standard    (ECDSA; NIST FIPS 186-3) and certain practical ECC-based key    exchange schemes (including ECDH) can be implemented without    infringing them.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/en.wikipedia.org\/wiki\/Elliptic_curve_cryptography\" title=\"Elliptic curve cryptography - Wikipedia, the free encyclopedia\">Elliptic curve cryptography - Wikipedia, the free encyclopedia<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. One of the main benefits in comparison with non-ECC cryptography (with plain Galois fields as a basis) is the same level of security provided by keys of smaller size. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-29071","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29071"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29071"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29071\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}