History of Elliptic Curve Cryptography
History of Elliptic Curve Cryptography
Neal Koblitz and Victor S. Miller independently proposed the use of elliptic curves in
encryption in 1985.
Elliptic curve cryptography algorithms entered wide use from 2004 to 2005.
In the mid-1980s, researchers found that examining elliptic curves could lead to the
discovery of new sources of difficult problems. Elliptic Curve Cryptography (ECC)
introduced a new degree of security to public key cryptosystems, that provide combined
encryption and digital signature services.
The security of elliptic curve cryptosystems, like that of all public-key cryptosystems,
is based on tough mathematical issues at the core. Given two elliptic curve points G
and Y, where Y = kG.
The term “elliptic curve” is derived from the ellipse. Elliptic curves were discovered in
the form of the Diophantine equation for c, after the 17th century. Furthermore, while
calculating the surface of the ellipse is simple, calculating the circumference of the
ellipse is difficult. The equation can be simplified to an integral:
1. ECC keys:
Private key: ECC cryptography’s private key creation is as simple as safely producing
a random integer in a specific range, making it highly quick. Any integer in the field
represents a valid ECC private key.
Public keys: Public keys within ECC are EC points, which are pairs of integer
coordinates x, and y that lie on a curve. Because of its unique features, EC points can
be compressed to a single coordinate + 1 bit (odd or even). As a result, the compressed
public key corresponds to a 256-bit ECC.
2. Generator Point:
Based on the arithmetic of elliptic curves over finite fields, Elliptic-Curve Cryptography (ECC)
provides numerous sets of algorithms:
Encryption algorithms:
Diffie-Hellman: The basic public-key cryptosystem suggested for secret key sharing
is the Diffie-Hellman protocol. If A (Alice) and B (Bob) initially agree on a given curve,
field size, and mathematical type. They then distribute the secret key in the following
manner. We can see that all we need to build the Diffie-Hellman protocol is scalar
multiplication.
Elliptic Curve Digital Signature Algorithm (ECDSA): ECC is one of the most
widely utilized digital signature implementation approaches in cryptocurrencies. In
order to sign transactions, both Bitcoin and Ethereum use the field inverse
multiplication, but also arithmetic multiplication, inverse function, and modular
operation.
Online application: Moreover, ECC is not limited to cryptocurrencies. It is an
encryption standard that will be utilized by most online apps in the future due to its
reduced key size and efficiency. Most commonly used in cryptocurrencies such as
Bitcoin and Ethereum, along with single-way encryption of emails, data, and software.
Blockchain application: The cryptocurrency Bitcoin employs elliptic curve
cryptography. Ethereum 2.0 makes heavy use of elliptic curve pairs with BLS
signatures, as stated in the IETF proposed BLS specification, to cryptographically
ensure that a specific Eth2 validator has really verified a specific transaction.
ECC vs RSA
Security(in Bits) RSA key length required ECC key length required
80 1024 160-223
112 2048 224-255