LLMpediaThe first transparent, open encyclopedia generated by LLMs

Elliptic-curve cryptography

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Expansion Funnel Raw 126 → Dedup 16 → NER 13 → Enqueued 9
1. Extracted126
2. After dedup16 (None)
3. After NER13 (None)
Rejected: 3 (not NE: 3)
4. Enqueued9 (None)
Similarity rejected: 7
Elliptic-curve cryptography
NameElliptic-curve cryptography
TypePublic-key cryptography
Introduced1985
InventorNeal Koblitz; Victor Miller
Based onElliptic curves over finite fields

Elliptic-curve cryptography is a family of public-key cryptographic techniques based on the algebraic structure of elliptic curves defined over finite fields, developed to provide comparable security with smaller key sizes than earlier systems. The subject traces roots through foundational work by Neal Koblitz and Victor Miller and later influenced implementations and policy in institutions such as National Institute of Standards and Technology, European Telecommunications Standards Institute, Internet Engineering Task Force, National Security Agency, and European Union Agency for Cybersecurity. Practical deployments appear across products from RSA Security, Microsoft, Apple Inc., Google, Amazon (company), and standards in protocols used by TLS, SSH, Bitcoin, Ethereum (software platform), and OpenSSL.

History

Early theoretical proposals emerged in 1985 when Neal Koblitz and Victor Miller published independent papers proposing elliptic curves for cryptography, contemporaneous with breakthroughs in public-key schemes by Whitfield Diffie, Martin Hellman, and Ronald Rivest, Adi Shamir, Leonard Adleman. Research in the 1990s connected to algorithmic number theory advanced by teams at Bell Labs, Stanford University, MIT, IBM, and University of California, Berkeley, with practical interest from Certicom Research, Sun Microsystems, Netscape Communications Corporation, and standards bodies like International Organization for Standardization. High-profile debates about key sizes and patent claims involved Certicom, legal scrutiny in jurisdictions including United States and European Union, and policy discussions in forums run by National Institute of Standards and Technology and Internet Engineering Task Force. Later events, including concerns raised by disclosures associated with Edward Snowden and analysis by researchers at University of Waterloo, École Polytechnique Fédérale de Lausanne, Max Planck Institute for Computer Science, and Princeton University, influenced adoption trajectories in commercial products from Cisco Systems, Oracle Corporation, Mozilla Foundation, and cloud providers such as Microsoft Azure and Google Cloud Platform.

Mathematics and Foundations

The mathematical foundation rests on the theory of elliptic curves over finite fields developed within algebraic geometry by figures linked to André Weil, Niels Henrik Abel, Évariste Galois, and later formalized in the work of John Tate, Jean-Pierre Serre, Alexander Grothendieck, and Birch and Swinnerton-Dyer. Core components include group law definitions, point addition and scalar multiplication, and arithmetic in fields studied by Carl Friedrich Gauss and extended in computational number theory by Schoof, Atkin, Morain, and Henri Cohen. Security relies on the intractability of the elliptic curve discrete logarithm problem, an analogue of challenges studied by Peter L. Montgomery, Don Coppersmith, Arjen Lenstra, and Hendrik Lenstra Jr. in relation to integer factorization and discrete logarithms in finite fields. Implementations often use curve models such as Weierstrass form, Montgomery form, and Edwards curves, with mathematical analysis from researchers at University of Washington, Columbia University, University of California, San Diego, and Cornell University.

Cryptographic Algorithms and Protocols

Elliptic-curve techniques underpin key exchange protocols like Elliptic Curve Diffie–Hellman, digital signature schemes such as Elliptic Curve Digital Signature Algorithm and Edwards-curve variants, and integrated constructions in hybrid encryption used by Pretty Good Privacy, S/MIME, OpenPGP, and secure messaging systems developed by teams at Signal Foundation, WhatsApp, and Telegram Messenger LLP. Protocol specifications and engineering work appear in documents from Internet Engineering Task Force, Transport Layer Security Working Group, IEEE 802.11, and proprietary stacks in Apple Inc. and Microsoft Corporation products. Cryptographic libraries implementing these algorithms include OpenSSL, LibreSSL, BoringSSL, Bouncy Castle, NSS (software), libsodium, and vendor stacks from Cisco Systems and Intel Corporation.

Security and Attacks

Security evaluations consider mathematical attacks such as Pollard's rho algorithm, index calculus adaptations explored by researchers at Algorithmica-affiliated groups, and special-case vulnerabilities related to anomalous curves and pairing-based reductions studied by teams at Brown University, University of California, Santa Barbara, University of Maryland, and Duke University. Side-channel attacks exploiting implementation channels were demonstrated by researchers at Georgia Institute of Technology, University of Cambridge, University of Oxford, École Normale Supérieure, and industry labs from Google and Microsoft Research, prompting countermeasures like constant-time algorithms championed by Daniel J. Bernstein and mitigation work by David J. Bernstein's collaborators and authors at Intel and ARM Holdings. Quantum-computing threats articulated by researchers at IBM, Google DeepMind, D-Wave Systems, Rigetti Computing, Microsoft Quantum, and academic groups at University of Chicago and University of Oxford motivate post-quantum initiatives led by National Institute of Standards and Technology and research teams at PQCrypto conferences.

Implementation and Performance

Implementations balance performance on constrained devices produced by ARM Holdings, Qualcomm, Broadcom, and microcontroller vendors used in products by Samsung Electronics and Xiaomi with server-grade throughput on platforms from Intel Corporation, AMD, NVIDIA, and cloud services from Amazon Web Services, Google Cloud Platform, and Microsoft Azure. Optimizations exploit algorithms from Peter L. Montgomery for scalar multiplication, windowing methods advanced at Bell Labs, and assembler-level tuning by contributors at OpenSSL and BoringSSL. Hardware acceleration and instruction set support appear in processors designed by Intel and ARM and in secure elements from STMicroelectronics, NXP Semiconductors, Infineon Technologies, and Microchip Technology. Side-channel resistant implementations and formal verification efforts are pursued by teams at Microsoft Research, University of Cambridge, INRIA, and ETH Zurich.

Standards and Adoption

Standards specifying curves, parameterization, and protocol use are published by National Institute of Standards and Technology, International Organization for Standardization, IEEE, Internet Engineering Task Force, European Telecommunications Standards Institute, and industry consortia including CA/Browser Forum and FIDO Alliance. Widely used named curves include those standardized by NIST and alternatives endorsed by communities around Curve25519 and Ed25519 promoted by researchers including Daniel J. Bernstein and implemented in projects like OpenSSH, OpenSSL, LibreSSL, and Signal. Adoption in cryptocurrencies and blockchain platforms involves projects such as Bitcoin, Ethereum (software platform), Monero, and Zcash, while government and military procurement in jurisdictions including United States Department of Defense and agencies influenced by National Security Agency guidance have shaped deployment strategies. Category:Cryptography