Month: March 2024
Secure elliptic curves: security engineering perspective – Elliptic Curves
8.4.5 Secure elliptic curves: security engineering perspective As illustrated by the Dual_EC_DRBG example, the mathematical perspective on the security of elliptic curves is not sufficient. As cryptographers Dan Bernstein and Tanja Lange explain in their SafeCurves initiative [22], preventing backdoors in cryptographic mechanisms based on elliptic curves requires rigidity. Rigidity refers to a curve generation…
Explore More