- Draw a straight line through and .
- The line intersects the curve at a third point, .
- Reflect over the x-axis to obtain the point .
Fields
Elliptic curves can be defined over different types of fields. The most commonly used fields in cryptography are:- Finite Fields: Denoted for a prime , these fields consist of the set , with addition and multiplication performed modulo . Finite fields provide a discrete set of points and are essential for practical cryptographic applications due to their computational efficiency.
- Fields of Real Numbers: While elliptic curves over the real numbers are useful for visualisation and theoretical understanding, they are not used in cryptographic implementations because real numbers cannot be represented exactly in a computer and computations over are inefficient.
Relevance in Cryptography
Elliptic curves play a pivotal role in modern cryptography, leading to a field known as Elliptic Curve Cryptography (ECC). ECC enables the creation of cryptographic keys that are significantly smaller than those required by traditional systems like RSA, while providing equivalent security levels. This efficiency makes ECC particularly valuable in environments with limited computational resources, such as mobile devices and embedded systems. The security of ECC is based on the difficulty of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Given a point PP on an elliptic curve and a scalar multiple (where is an integer and is a point on the curve), it is computationally infeasible to determine from and . This one-way function underpins the security of ECC, making it resistant to attacks that attempt to derive private keys from public keys. In cryptographic systems:- Private Key: A randomly selected integer within a specified range.
- Public Key: The point , where is a publicly known base point on the curve.