Where Would You Find 79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81? Ans: In Bitcoins

--

One of the most important and interesting areas of cybersecurity is elliptic curve cryptography (ECC). Basically, it protects you like no other method on the Internet. In the creation of the secure tunnel between you and this article, there is likely to be a key negotiation using ECDH (Elliptic Curve Diffie Hellman), and in digitally signing something online, it’s likely that there was an ECDSA (Elliptic Curve Digital Signature Algorithm) signature involved.

At the core of ECC, we have a number of parameters: a, b, p, n and G. a and b define the parameters of the elliptic curve that we use, p is the prime number, n is the order of the curve (the number of points it has), and G is the base point:

In Bitcoins, Satoshi Nakamoto selected the sepc256k1 curve, and where the value of a is your private key (and used to sign for transactions with ECDSA), and aG is your public key. But, what’s G for each curve? Well, we can determine that by just using an a value of 1. This will give us P=1G.

The following is an implementation for a range of curves (Ed25519, BLS 12377, sepc256k1, P256 and Pallas) [here]:

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.