1994-12-13 - Re: What, exactly is elliptic encryption?

Header Data

From: “Perry E. Metzger” <perry@imsi.com>
To: eric@remailer.net (Eric Hughes)
Message Hash: ea6138ec596ef4e00768744be81ee57be22917d67efecc106e5f5178e02bff70
Message ID: <9412131850.AA12653@snark.imsi.com>
Reply To: <199412131842.KAA02350@largo.remailer.net>
UTC Datetime: 1994-12-13 18:51:19 UTC
Raw Date: Tue, 13 Dec 94 10:51:19 PST

Raw message

From: "Perry E. Metzger" <perry@imsi.com>
Date: Tue, 13 Dec 94 10:51:19 PST
To: eric@remailer.net (Eric Hughes)
Subject: Re: What, exactly is elliptic encryption?
In-Reply-To: <199412131842.KAA02350@largo.remailer.net>
Message-ID: <9412131850.AA12653@snark.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain



Eric Hughes says:
>    From: "Perry E. Metzger" <perry@imsi.com>
>    Basically, there are ways of extending public key methods into fields
>    other than the integers modulo some prime
> 
> Small correction.  While integer modulo a prime are fields (i.e. they
> have division), elliptic curve solutions only have a group structure,
> which is usually written as addition.

I stand corrected...

.pm





Thread