Elliptic Curve And It's Applications

Introduction

Elliptic curves are a fascinating area of mathematics with profound implications in number theory and cryptography. They provide a rich structure that can be utilized in various applications, particularly in secure communication protocols. In this article, we will explore the fundamental properties of elliptic curves, their group law, and how these mathematical concepts form the basis for several cryptographic algorithms. By understanding elliptic curves, we can gain insight into the underlying principles that ensure the security and efficiency of modern cryptographic systems.

What is Elliptic Curve

An elliptic curve is the graph of an short Weierstrass equation

where and are constants. Below is an example of such a curve. elliptic curve

The Group Law

GroupLaw

  • Adding Points on an Elliptic Curve
    Start with two points

    on an elliptic curve given by the equation . Define a new point as follows. Draw the line through and . We'll see below that intersects in a third point . Reflect across the axis (i.e., change the sign of the -coordinate) to obtain . We define

    Examples below will show that shis is not the same as adding coordinates of the points. It might be better to denote this operation by , but we opt for the simpler notation since we will never be adding points by adding coordinates.
    Assume first that and that neither point is . Draw the line through and . Its slope is

    If , then is vertical. We'll treat this case later, so let's assume that . The equation of is then

    To find the intersection with , substitute to get

    This can be rearranged to the form

    The three roots of this cubic correspond to the three points of intersection of with . Generally, solving a cubic is not easy, but in the present case we already know two of the roots, namely and , since and are points on both and . Therefore, we could factor the cubic to obtain the third value of x. But there is an easier way. If we have a cubic polynomial with roots , then
    Therefore,

    If we know two roots , then we can recover the third as .
    In our case, we obtain

    and

    Now, reflect across the axis to obtain the point :

    In the case that but , the line through and is a vertical line, which therefore intersects E in . REflecting across the axis yields the same point (this is why we put at both the top and the bottom of the axis).Therefore, in this case .
    Now consider the case where When two points on a curve are very close to each other, the line through them approximates a tangent line. Therefore, when the two points coincide, we take the line through them to be the tangent line. Implicit differentiation allows us to find the slope of :

    If then the line is vertical and we set , as before. Therefore, assume that . The equation of is

    as before. We obtain the cubic equation
    This time, we know only one root, namely , but it is a double root since is tangent to at . Therefore, proceeding as before, we obtain

    Finally, suppose . The line through and is a vertical line that intersects in the point that is the reflection of across the axis. When we reflect across the axis to get , we are back at . Therefore

    for all points on . Of course, we extend this to include .
    Let's summarize the above discussion:

Let be an elliptic curve defined by . let and be points on with . Define as follows:

  • If , then where .
  • If but , then .
  • If and , then , where .
  • If and , then .
    Moreover, define

    for all points on .

The addition of points on an elliptic curve satisfies the following properties:

  • (Commutativity) for all on .
  • (existence of identity) for all points on .
  • (existence of inverses) Given on , there exists on with . This point will usually be denoted .
  • (associativity) for all on . In other words, the points on form an additive abelian group with as the identity element.

In cryptography, work over instead of . We writh group operation additively . Fix a generator of primer order . In practice, chosen from some standard(e.g. NIST).

Elliptic Curve's Applications

What is discrete logarithm problem

screct , public , recovering from is hard.

ECDSA

Elliptic Curve Digital Signature Algorithm

Diffie-Hellman Key Exchange

Diffie-Hellman Key Exchange

Schnorr protocol

wants to convince that knows a secret s.t. .

Schnorr protocol

Short Weierstrass curves and their representations for fast computations

http://www.hyperelliptic.org/EFD/g1p/auto-shortw.html