Public Key Cryptography by Batten Lynn Margaret
Author:Batten, Lynn Margaret
Language: eng
Format: epub
Publisher: Wiley
Published: 2013-01-06T16:00:00+00:00
5.3 The Elliptic Curve Factoring Scheme
In this section, we describe how elliptic curves can be used to factor numbers suspected of being composite. We saw in Section 2.2 that Fermat's Little Theorem can be used to check if a number is prime or not. In fact, it cannot definitively prove that a number is prime, as some composite numbers pass the FLT test.
We can also use elliptic curve cryptography to test if a number is prime. This is because when adding points, we need to compute an inverse for the slope. If we add enough points together and the modulus is in fact composite, there is a high probability that along the way we will be unable to compute an inverse because we found a factor of the modulus. Again, if all point additions are correctly computed, this is no guarantee that the modulus is a prime.
This method of factoring was first described formally in [24], but we give a brief algorithm here for the method.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6847)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6548)
Machine Learning Security Principles by John Paul Mueller(6514)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(6177)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(6144)
Solidity Programming Essentials by Ritesh Modi(4168)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3803)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3557)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Future Crimes by Marc Goodman(3367)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3329)
Learn Computer Forensics - Second Edition by William Oettinger(3301)
Incident Response with Threat Intelligence by Roberto MartÃnez(3025)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2999)
Mobile App Reverse Engineering by Abhinav Mishra(2902)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2891)
The Code Book by Simon Singh(2855)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2800)
