ECC Trivia: There Are Two Elliptic Curve Points For Every x-Axis Point

--

So, what’s the square root of 9? You, might say it is 3, but that not the right answer … as the right answer is 3 and -3. What has that go to do with cybersecurity, well, I’ll explain.

So, let me do a bit of trivia here. In ECC (Elliptic Curve Cryptography), we have a point on a curve and we operate on it. If we call that point P. Then we might add P to itself to get 2P (a point doubling). And so with 2P, I can’t reverse the operation to find P. That’s the core of the security of ECC, in that we can’t reverse an adding (or multiplying operation). We can then have a random value of n — known as a scalar value, and then compute: Q =nP. In this case, we should not be able to compute n, even though we know the points P and Q. For this, we can then define n as our secret (or private key), and Q as our public key. If we then standardize P as a generator point (G), we know have a public key system.

But, did you know we actually end up with two possible points?

Going back to my roots

ECC involves uses an equation such as:

y²=x³+ax + b (mod p)

and where p is a prime number. One example is the Bitcoin curve (secp256k1) of:

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.