ECC Notebook
An Interactive Introduction to Elliptic Curve Cryptography
By Maike Massierer and the CrypTool team (www.cryptool.org)
Version 1.3, January 2011
Any feedback regarding this notebook is appreciated. Please mail to [email protected] or [email protected].
If you haven't used Sage before, click here for some instructions to get you started. And even if you are familiar with Sage, please note: In order to have access to the full functionality of the ECC Notebook, you need to click "Edit this" and "Action -> Evaluate All" on (the top left of) every worksheet. If you are still having trouble, please consult the Instructions page.
Table of Contents
List of Figures and Applications
- 2.1 Diffie-Hellman key exchange (1)
- 2.2 Number of possible keys
- 2.3 Calculation of primitive roots
- 2.4 Diffie-Hellman key exchange (2)
- 2.5 Diffie-Hellman key exchange (3)
- 2.6 DLP brute-force search
- 2.7 Running time comparison of exponential, sub-exponential and polynomial-time algorithms
- 3.1 Elliptic curves defined by y^2=x^3+ax+b
- 3.2 Elliptic curves over the real numbers
- 3.3 Elliptic curves over finite fields
- 3.4 Point addition
- 3.5 Point doubling
- 3.6 Point at infinity
- 3.7 Point addition for elliptic curves over the rational numbers
- 3.8 Point addition for elliptic curves over finite fields
- 3.9 Double-and-add algorithm
- 3.10 Comparison of the three methods of scalar multiplication
- 6.1 Recommended key lengths