Jump to content

Elliptic Curve Digital Signature Algorithm

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 203.206.169.155 (talk) at 23:48, 12 June 2007 (Making DSA a link makes it less confusing - I kept thinking ECDSA was being compared with itself.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Elliptic Curve DSA (ECDSA) is a variant of the Digital Signature Algorithm (DSA) which operates on elliptic curve groups. The EC variant provides smaller key sizes for (supposedly) similar security level. On the other hand, the execution time is roughly the same and the signature size is exactly the same: , where is the security parameter. For example, DSA with 1024-bit and 160-bit and ECDSA over the 160-bit prime field both produce 320-bits signatures and need only few milliseconds [1] for execution on a 2 GHz Pentium.

Signature generation algorithm

Suppose Alice wants to send a signed message to Bob. Initially, the curve parameters must be agreed upon. Also, Alice must have a key pair suitable for elliptic curve cryptography, consisting of a private key (a randomly selected integer in the interval ) and a public key (where ).

For Alice to sign a message , she follows these steps:

  1. Calculate , where HASH is a cryptographic hash function, such as SHA-1.
  2. Select a random integer from .
  3. Calculate , where . If , go back to step 2.
  4. Calculate . If , go back to step 2.
  5. The signature is the pair .

Signature verification algorithm

For Bob to authenticate Alice's signature, he must have a copy of her public key . He follows these steps:

  1. Verify that and are integers in . If not, the signature is invalid.
  2. Calculate , where HASH is the same function used in the signature generation.
  3. Calculate .
  4. Calculate and .
  5. Calculate .
  6. The signature is valid if , invalid otherwise.

Note that using Straus's algorithm (also known as Shamir's trick) a sum of two scalar multiplications can be calculated faster than with two scalar multiplications.

References

  • Accredited Standards Committee X9, American National Standard X9.62-2005, Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), November 16, 2005.
  • Certicom Research, Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography, Version 1.0, September 20, 2000.
  • López, J. and Dahab, R. An Overview of Elliptic Curve Cryptography, Technical Report IC-00-10, State University of Campinas, 2000.
  • Daniel J. Bernstein, Pippenger's exponentiation algorithm, 2002.
  • Daniel R. L. Brown, Generic Groups, Collision Resistance, and ECDSA, Designs, Codes and Cryptography, 35, 119-152, 2005. ePrint version
  • Ian F. Blake, Gadiel Seroussi, and Nigel P. Smart, editors, Advances in Elliptic Curve Cryptography, London Mathematical Society Lecture Note Series 317, Cambridge University Press, 2005.
  • Darrel Hankerson, Alfred Menezes and Scott Vanstone, Guide to Elliptic Curve Cryptography, Springer, Springer, 2004.

See also