From: norm@netcom.com (Norman Hardy)
To: cypherpunks@toad.com
Message Hash: ebc1f02835920a95745e1b720e3df34d8e402ec5316e0c433c35db10f2842a0b
Message ID: <acdc748500021004e06b@DialupEudora>
Reply To: N/A
UTC Datetime: 1995-11-25 23:50:13 UTC
Raw Date: Sun, 26 Nov 1995 07:50:13 +0800
From: norm@netcom.com (Norman Hardy)
Date: Sun, 26 Nov 1995 07:50:13 +0800
To: cypherpunks@toad.com
Subject: Learning Elliptic Curves
Message-ID: <acdc748500021004e06b@DialupEudora>
MIME-Version: 1.0
Content-Type: text/plain
I have found an easy introduction to elliptic curves. It is "Rational
Points on Elliptic Curves" by Joseph H. Silverman & John Tate.
(Springer-Verlag ISBN: 0-387-97825-9 or 3-540-97825-9) It is a breezy
undergraduate introduction. It emphasizes the mathematical elegance. It
mentions crypto applications but does not delve deeply.
Schneier recommends "Elliptic Curve Public Key Cryptosystems" by Alfred J.
Menezes. (Kluwer Academic Publishers ISBN: 0-7923-9368-6) That book has
only a very compressed theory section which already requires knowledge of
field theory. I think that the first book is a good intro to the second,
which does cover crypto applications.
What I learned is that elliptic curves are an alternative to finite fields
for crpto purposes. Here is what they have in common:
There are many (2^70 -- 2^2000) values any one of which can be represented
in the machine in constant space. a_i is the ith one of these values. If
someone sends you a_i it is real hard to figure out what i is. There is an
operation that isn't too expensive for computing a_(i+j) given a_i and a_j.
For some big integer i you can compute a_i in about (log i)^3 steps. For
RSA, knowing how to do these two computations does not reveal what the
period of the sequence is, i.e. what is the first i such that a_0 = a_i.
Knowing the period is tantamount to knowing the private key.
Return to November 1995
Return to “norm@netcom.com (Norman Hardy)”
1995-11-25 (Sun, 26 Nov 1995 07:50:13 +0800) - Learning Elliptic Curves - norm@netcom.com (Norman Hardy)