Cryptography Reference
In-Depth Information
way into TLS in the past few years. TLS 1.2 introduced support for Elliptic-Curve
Cryptography ( ECC ) in 2008. Although it hasn't, at the time of this writing, found
its way into any commercial TLS implementations, it's expected that ECC will
become an important element of public-key cryptography in the future. I explore
the basics of ECC here — enough for you to add support for it in the chapter
9, which covers TLS 1.2 — but overall, I barely scratch the surface of the fi eld.
ECC — elliptic-curves in general, in fact — are complex entities. An elliptic-
curve is defi ned by the equation y 2
b. a and b are typically fi xed
and, for public-key cryptography purposes, small numbers. The mathematics
behind ECC is extraordinarily complex compared to anything you've seen so
far. I won't get any deeper into it than is absolutely necessary.
Figure 3-5 shows the graph of y 2
x 3
ax
x 3
ax
b, the ellip tic curv e defi ned by
x 3
ax has no solu-
a
1, b
0. Notice the discontinuity between 0 and 1;
tions between 0 and 1 because x 3
x
<
0.
3
2
1
0
1
2
3
3
2
1
0
1
2
3
Figure 3-5: Elliptic curve with a =
1, b = 0
Cryptographic operations are defi ned in terms of multiplicative operations
on this curve. It's not readily apparent how one would go about “multiplying”
anything on a curve, though. Multiplication is defi ned in terms of addition,
and “addition,” in ECC, is the process of drawing a line through two points
and fi nding it's intersection at a third point on the curve as illustrated in
Figure 3-6.
Search WWH ::




Custom Search