Skip to main content
  • 266 Accesses

Elliptic curves have been used in integer factoring algorithms and in primality proving algorithms, and also for designing public-key cryptosystems. This section introduces elliptic curves and associated group operations, along with basic structural properties of particular interest in cryptography.

Defining Equation

An elliptic curve E over a field F is defined by a Weierstrass equation

$$E/F : y^2+ a_1xy + a_3y = x^3 + a_2x^2 + a_4x + a_6$$
((1))

with \(a_1,a_2,a_3,a_4,a_6 \in F\) and \(\Delta \neq 0\), where Δ is the discriminant of E and is defined as follows:

$$\left.\begin{aligned}\Delta &= -d_2^2d_8 - 8d_4^3 - 27d_6^2 + 9d_2d_4d_6 \\ d_2 &= a_1^2 + 4a_2 \\ d_4 &= 2a_4 + a_1a_3 \\ d_6 &= a_3^2 + 4a_6 \\ d_8 &= a_1^2a_6 + 4a_2a_6 - a_1a_3a_4 + a_2a_3^2 - a_4^2.\end{aligned}\right\}$$
((2))

If L is any extension field of F, then the set of L-rational points on E is

where ∞ is the point at infinity.

Two elliptic curves E 1 and E 2 defined over F and given by Weierstrass equations (1...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Koblitz, N. (1994). A Course in Number Theory and Cryptography (2nd ed.). Springer-Verlag, Berlin.

    Google Scholar 

  2. Silverman, J. (1986). The Arithmetic of Elliptic Curves. Springer-Verlag, Berlin.

    MATH  Google Scholar 

  3. Silverman, J. (1994). Advanced Topics in the Arithmetic of Elliptic Curves. Springer-Verlag, Berlin.

    MATH  Google Scholar 

  4. Washington, L. (2003). Elliptic Curves: Number Theory and Cryptography. CRC Press, Boca Raton, FL.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Hankerson, D., Menezes, A. (2005). Elliptic Curve. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_130

Download citation

Publish with us

Policies and ethics