Elliptic curve cryptography is powerful. Calculating public key from known private key and base point can be handled easily. On … More
Category: Cryptography
Counting Points on Elliptic Curves over Finite Field: Order of Elliptic Curve Group
ECDSA enables to produce signatures faster. Besides, its both signatures and keys are much smaller than adopted alternative options offering … More
Elegant Signatures with Elliptic Curve Cryptography
Elegance is the only beauty that never fades. This is a loving Audrey Hepburn quote. I struggle to adapt this … More
New Generation Cryptocurrency
The British newspaper announced that a man who bought 27$ of bitcoin in 2009 would recall this investment in 2013 … More
Signing Contents Digitally: An Email Implementation
“I was happy when I design my own signature. Also, deciding to put my signature under this job makes me … More
Exchanging Encrypted Mails
2016 released Snowden is a biographical movie fictionalised life story of Former NSA employee Edward Snowden. The movie reveals illegal surveillance techniques of the government organization. Also, … More
Protecting Java Codes: Encrypted Class Loader
Cloud services are adopted by both start-ups and enterprises in recent years. However, it comes security issues. At this point, … More
Key Exchange: From Carrying Handcuffed Briefcases To Modern Cryptosystems
You should be familiar to handcuffed briefcases in spy movies. Most probably, shared secret key is in the briefcase and the … More
Double and Add Method
Computing a new point on an elliptic curve Q = kP for given k and P could be performed by combination … More
The Math Behind Elliptic Curves in Koblitz Form
In the previous post, we’ve mention the math behind addition law for elliptic curves over Galois Field GF(p) – prime … More