pull/2/head
Andreas M. Antonopoulos 11 years ago
parent 3e0135eddc
commit d971b1b2d8

@ -22,6 +22,20 @@ To use public key cryptography, Alice will ask Bob for his public key. Then, Ali
Elliptic Curve Cryptography is a type of assymetric or public-key cryptography based on the discrete logarithm problem as expressed by multiplication on the the points of an elliptic curve over a finite prime field.
[latexmath]
++++
\begin{equation}
{K = G \bigotimes k}
\end{equation}
++++
[latexmath]
++++
\begin{equation}
{y^2 \mod p = (x^3 + 7) \mod p}
\end{equation}
++++
In elliptic curve cryptography, a predetermined _generator_ point on an elliptic curve is multiplied by a _private key_, which is simply a 256-bit number, to produce another point somewhere else on the curve, which is the corresponding public key. In most implementations, the private and public keys are stored together as a _key pair_. However, it is trivial to re-produce the public key if one has the private key, so storing only the private key is also possible.

Loading…
Cancel
Save