Elliptic Curve Crypto:General disclaimer: Difference between revisions

From Elliptic Curve Crypto
m rewording
loser issues and lame crypto
Line 1: Line 1:
We cannot guarantee the safety or security or [[Elliptic_Curve_Crypto:Privacy_policy|privacy]] of elliptic curve cryptographic systems on a basis of honor or reputation or civil liability. [[Strong cryptography]] based on elliptic curves is dependent on the difficulty of the elliptic curve discrete [[logarithm problem]]. We do our best to document the caveats and assumptions on which the security of any particular cryptographic scheme is based.
We cannot guarantee the safety or security or [[Elliptic_Curve_Crypto:Privacy_policy|privacy]] of elliptic curve cryptographic systems on a basis of honor or reputation or civil liability. [[Strong cryptography]] based on elliptic curves is dependent on the difficulty of the elliptic curve discrete [[logarithm problem]]. We do our best to document the caveats and assumptions on which the security of any particular cryptographic scheme is based.
There’s [[Bad curves and weak crypto|bad math and some things just don’t work out]] the way they should, even at a level of high school algebra, and that’s what we’re discovering here about the original references on which many official elliptic curve crypto recommendations are based. Documenting and tracking “loser issues” with “lame crypto” and other advanced persistent threats will have to be a focus of our work here.

Revision as of 03:37, 2 January 2025

We cannot guarantee the safety or security or privacy of elliptic curve cryptographic systems on a basis of honor or reputation or civil liability. Strong cryptography based on elliptic curves is dependent on the difficulty of the elliptic curve discrete logarithm problem. We do our best to document the caveats and assumptions on which the security of any particular cryptographic scheme is based.

There’s bad math and some things just don’t work out the way they should, even at a level of high school algebra, and that’s what we’re discovering here about the original references on which many official elliptic curve crypto recommendations are based. Documenting and tracking “loser issues” with “lame crypto” and other advanced persistent threats will have to be a focus of our work here.