![](https://bitcointalk.org/Themes/custom1/images/post/xx.gif) |
May 08, 2021, 08:26:18 PM |
|
Elliptic Curve Vulnerability
Elliptic curve function
y^2 = x^3 +7 This function is visible
y^2 = x^3 +7 mod p is imaginary and invisible, because it is different from ordinary functions Added a mod operation. The disadvantages are poor confidentiality, and the advantages are integers.
#If p=q, k=(3x2+a)/2y1modp
#If P≠Q, then k=(y2-y1)/(x2-x1)modp
Both point addition and point multiplication are available, and Euclid expands modular arithmetic
extended_gcd (denominator, modulus) Please note that not all numbers have Euclidean extended modulus arithmetic For example 1/2 mod 4 fails Only when gcd(a,p)==1, can there be Euclidean extended modulus operation 1/3 mod 7 success
The denominator is the value of the y coordinate, it can be any number, and the loophole comes out
Since p is a prime number, gcd(a,p)==1 Note: The greatest common divisor of gcd How simple is it really, wrong
When gcd(7,7)!=1 this is an important point and When gcd(21,7)!= 1. How to calculate the coordinates of this vulnerability? There are theoretically, I guess, my mathematics level is limited
|