The universe in a single okra

I thank the plant which birthed it, and my body which tended and welcomed each leaf and flower. I thank the soil for holding its roots, and the sky for an invitation to grow. I thank the sun in its…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




Elliptic Curve Cryptography

A look into the cryptography that protects your cryptocurrencies

This article will look into Elliptic Curve cryptography and the math behind it to generate the private keys which keep our bitcoins safe.

First I want to talk about private keys. A large number of people have no idea what a private key is, they may know what it does but they don’t know what it represents. I think a large part of this is to do with the format it is often presented in. Most private keys are presented like this,

This is hexadecimal and often leads people to think that private keys are written in some foreign language that they cannot comprehend. In actuality, the text above simply represents a decimal number that you and I encounter every day. In this case, the hexadecimal above represents,

As you can see this is quite a big number and it’s the size of this number that protects cryptocurrencies from brute force attacks. Now would be a good time to take a look at this article on base systems to understand how hexadecimal, binary and decimal all relate to each other.

This is ultimately what the private key is. 256 1’s and 0’s that enable it to be interpreted by a computer. For us, it simply represents a number, a very large number that is virtually impossible to guess. To put how in context how many possible private keys there are out there have a read of this quote,

What's cool is that now that you understand what a private key actually is you can generate one yourself offline with a coin. Heads equals 1, tails equals 0 grab a piece of paper and flip the coin 256 times. Note down the numbers and there you have it, your own private key.

Note while this is cool it’s still best to use a private key generator online if you get a 0 on your first coin toss you lose half of the potential numbers available to you get another and suddenly you’ve lost half of that half. Since the vast size of the domain space is what protects your private key from brute force attacks this is something to keep in mind

The elliptic curve provides an equivalent level of security with a smaller key size which reduces the computation miners have to complete to verify them. ECC 256 bit equal to RSA 3072 bit

symmetric about the x-axis, draw straight line through curve will intersect the curve at no more than 3 points

Starting from a generator point you draw a tangential line and note where it intersects the curve. From this point, you mirror it on the x-axis to get a new point. You then draw a line from the generator point to the new point, this will intersect the curve at one other point, you then mirror that point on the x-axis and again draw a line from the generator point to the new point you do this N times where N is your private key. The resultant point after completing this process N times is your public key in the form (x, y). In reality, you only need to know the x value as you can determine the y value from the curve, this is known as a compressed public key and is prepended with a 02 or 03 depending on the polarity of the y corrdinate (+/-). The curve has a domain space based on its key size if a point falls outside of the domain the delta between the max and the point is used as the new value.

y² = x³ + ax + b

asymmetric vs symmetric Diffie-helmen is an ephemeral shared secret rather than a RSA private key which tends to last much longer this means that if someone has our history of encrypted messages and somehow discovers the RSA private key they have access to the entire history whereas with an ephemeral Diffie-helman key if they discover what that shared secret is they will only be able to decrypt information in that session.

Thanks to James Deangelo

Add a comment

Related posts:

MIT researchers automate drug design with machine learning

Developing and improving medications is typically a long and very involved process. Chemists build and tweak molecules, sometimes aiming to create a new treatment for a specific disease or symptom…

FG yet to fund capital projects 43 days after budget assent

Forty-three days after the 2019 budget was signed into law by President Muhammadu Buhari, the Federal Government has yet to release funds to Ministries, Departments and Agencies for the…

Elon Musk by Ashlee Vance

Elon Musk by Ashlee Vance. -Musk have entered the most challenging industries and this brings critiques with it. People criticized him as he will going to fail as….