椭圆曲线密码学互动介绍
An interactive intro to Elliptic Curve Cryptography

原始链接: https://growingswe.com/blog/elliptic-curve-cryptography

## 椭圆曲线密码学:摘要 传统的公钥密码学依赖于诸如分解大数(RSA)之类的数学难题来保障通信安全,但这些方法需要不断增加密钥长度才能提高安全性。椭圆曲线密码学(ECC)提供了一种更高效的替代方案,可以用显著更小的密钥实现相同的安全级别。 ECC 利用椭圆曲线的独特属性——定义特定形状的方程——来创建“陷门”函数。在曲线上添加点很容易,但反向操作(根据结果找到原始点)在计算上是不可行的。这使得安全的密钥交换(ECDH)和数字签名(ECDSA)成为可能。 该过程涉及各方生成一个私钥和一个对应的公钥(曲线上的一个点)。共享公钥允许他们建立一个共享密钥,用于加密通信。签名使用私钥创建,并使用公钥进行验证,从而确保真实性和完整性。 ECC 的优势在于其较小的密钥尺寸。例如,256 位 ECC 密钥提供与 3,072 位 RSA 密钥相当的安全性,使其非常适合资源受限的设备和更快的计算。虽然目前是安全的,但 ECC 容易受到未来量子计算机的攻击,从而推动了对后量子密码替代方案的研究。ECC 如今广泛应用于 TLS 1.3、Signal 和比特币等协议中,为现代安全需求提供了一种强大而高效的解决方案。

Hacker News 新闻 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 一个关于椭圆曲线密码学的交互式介绍 (growingswe.com) 7 分,由 vismit2000 发表于 1 小时前 | 隐藏 | 过去 | 收藏 | 2 条评论 帮助 nickvec 7 分钟前 | 下一个 [–] 访问该网站时看到以下错误。“此网站无法提供安全连接 growingswe.com 发送了无效的响应。ERR_SSL_PROTOCOL_ERROR” 回复 pestatije 1 小时前 | 上一个 [–] 一定有很多函数,单向处理很容易,但反向几乎不可能。我感觉这不仅仅是找到这样的函数,但文章没有深入探讨。 回复 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系 搜索:
相关文章

原文

Suppose two people want to communicate privately over the internet. They could encrypt their messages, scrambling them so that only someone with the right secret key can read them. But that raises an immediate problem: how do they agree on that secret key in the first place? They can't whisper it to each other. Every message between them passes through the open internet, where anyone could be listening.

One solution is public-key cryptography: each person has two linked keys, a private key they keep secret and a public key they share openly. The keys are mathematically related, but computing the private key from the public key is so hard it's effectively impossible. That one-way relationship is what lets you encrypt messages, agree on shared secrets, and sign data to prove authorship.

The first widely used public-key systems were built on the difficulty of specific math problems. RSA relies on the fact that multiplying two large prime numbers is easy, but factoring the result back into those primes is extremely hard. Diffie-Hellman relies on a similar idea using exponents in modular arithmetic (clock arithmetic where numbers wrap around at a fixed value).

Both systems work, and both are still in use. But they share a practical problem: the keys are enormous. A commonly recommended minimum for RSA today is 2048 bits (about 617 decimal digits), but for 128-bit security equivalence RSA needs 3072 bits. As we push for stronger security, the numbers grow fast: RSA key sizes grow much faster than security targets, because the underlying factoring attacks are sub-exponential.

What if a different mathematical structure could give us the same guarantees (easy in one direction, effectively impossible in reverse) but with much smaller numbers? That structure exists, and it comes from the geometry of curves.

Drawing the curve

A mathematical equation can define a shape. Take the equation y=x2y = x^2

Each step picks an xx value, squares it to get yy, and places a dot at that coordinate. As the points accumulate, a curve appears: the parabola. The equation defined the shape all along; we just needed enough points to see it.

Different equations produce different shapes. The equation x2+y2=1x^2 + y^2 = 1

An elliptic curve is another equation of this kind:

y2=x3+ax+by^2 = x^3 + ax + b
联系我们 contact @ memedata.com