Exercises TSIT03 Cryptology: Elliptic Curve Cryptography [PDF]

Exercises TSIT03 Cryptology: Elliptic Curve Cryptography. 1) Determine all points on the elliptic curve. E = 1(x, y) : y

44 downloads 80 Views 56KB Size

Recommend Stories


Elliptic Curve Cryptography (ECC)
Love only grows by sharing. You can only have more for yourself by giving it away to others. Brian

Elliptic curve cryptography
Pretending to not be afraid is as good as actually not being afraid. David Letterman

Press Release Elliptic Curve Cryptography
How wonderful it is that nobody need wait a single moment before starting to improve the world. Anne

Simple Power Analysis of Elliptic Curve Cryptography
Happiness doesn't result from what we get, but from what we give. Ben Carson

Fast and compact elliptic-curve cryptography
We can't help everyone, but everyone can help someone. Ronald Reagan

Applications and Benefits of Elliptic Curve Cryptography
You have to expect things of yourself before you can do them. Michael Jordan

Secure and Efficient RNS Approach for Elliptic Curve Cryptography
Respond to every call that excites your spirit. Rumi

image encryption and decryption using elliptic curve cryptography
Don’t grieve. Anything you lose comes round in another form. Rumi

Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography
We must be willing to let go of the life we have planned, so as to have the life that is waiting for

Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
Sorrow prepares you for joy. It violently sweeps everything out of your house, so that new joy can find

Idea Transcript


Exercises TSIT03 Cryptology: Elliptic Curve Cryptography 1) Determine all points on the elliptic curve E = {(x, y) : y 2 = x3 + x + 6 mod 11} 2) Use the elliptic curve E to calculate kα for 1 < k < 14, where α = (2, 7) 3) Use the elliptic curve E and the generator point α in ECC ElGamal encryption, and calculate a) the public key when the secret key is 6 b) the public key when the secret key is 2 c) the public key when the secret key is 7 4) Use the elliptic curve E and the generator point α in ECC ElGamal encryption, with the recipient’s secret key 7. One use of your random number generator gives you the number 3. a) Encrypt the message 10 b) Decrypt the cryptogram, and verify that you can retrieve the message 5) Use the elliptic curve E and the generator point α in ECC Diffie-Hellman key exchange. What is the shared key when the secrets keys are 2 and 6 respectively? 6) Use the elliptic curve E and the generator point α in ECC ElGamal digital signatures, with your secret key 6. One use of your random number generator gives you the number 3. a) Sign the message 10 b) Verify the signature using the public key 7) Show that if P = (x, 0) is a point on an elliptic curve, then 2P = ∞

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.