Ch10 Crypto7e
Ch10 Crypto7e
y and
Network
Security
Seventh Edition, Global Edition
by William Stallings
(A5) Commutative:
© 2017 Pearson Education, Ltd., All rights reserved. a b = b a for all a, b in G
© 2017 Pearson Education, Ltd., All rights reserved.
Elliptic Curves Over
Zp
• Elliptic curve cryptography uses curves whose variables and
coefficients are finite
Binary
curves Prime
over curves
GF(2m) over Zp
• Each user chooses a private key nA and generates a public key PA=nA
*G
Cm = {kG, Pm+kPB}
• To decrypt the ciphertext, B multiplies the first point in the pair by B’s
secret key and subtracts the result from the second point:
Pm+kPB–nB(kG) = Pm+k(nBG)–nB(kG) = Pm