Posts about encryption, zite development and everything else you wantFollow in NewsfeedFollowing
Today, we'll talk about MAC, DLIES and ECIES.
The first topic is DLIES, or Discrete Logarithm Integrated Encryption Scheme.
Pretend Alice wants to send a message to Bob. Alice doesn't want others to read the message, so she's going to encrypt it. Let's help Alice!
Hello! Today I'm going to tell you about ECDH, or Elliptic Curve Diffie-Hellman protocol.
First of all, let's remember what EC means and what DH means.
EC is an Elliptic Curve. You can read about Elliptic Curve arithmetic on this blog. If you don't want to read it, here's an overview: We have some objects (points) which we can add. The usual rules apply, i.e. .
DH is Diffie-Hellman protocol, i.e. a key derivation protocol. You can read about it on this blog as well. An overview: If Alice and Bob have private keys and they don't share, they can make up some integers and ( is any integer, is a big prime integer). Then, they generate public keys: which they give to each other. Then, they generate shared key that they use for symmetric encryption: .
Now, we're going to merge these two unmergable things. How? Read here.
Today, let's talk about key derivation.
Pretend Alice and Bob are talking to each other, and they want to encrypt their messages. Of course, encryption requires a key, so they have to find a key somewhere. They could just meet in Alice's house, but... Alice and Bob are a little bit far from each other, so they can't meet directly. They also can't use mail to send the key because it could be compromised, and so on.
Today, let's talk about Elliptic Curve arithmetic.
First of all, what is an elliptic curve? If we're working infield, we can say that an elliptic curve is defined by two real numbers and that follows the equation:
This form is called the Weierstrass equation.