In
cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the
Digital Signature Algorithm
The Digital Signature Algorithm (DSA) is a public-key cryptosystem and Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiation and the discrete logarithm problem. DSA is a varia ...
(DSA) which uses
elliptic-curve cryptography.
Key and signature-size
As with elliptic-curve cryptography in general, the bit
size
Size in general is the Magnitude (mathematics), magnitude or dimensions of a thing. More specifically, ''geometrical size'' (or ''spatial size'') can refer to linear dimensions (length, width, height, diameter, perimeter), area, or volume ...
of the
private key believed to be needed for ECDSA is about twice the size of the
security level, in bits. For example, at a security level of 80 bits—meaning an attacker requires a maximum of about
operations to find the private key—the size of an ECDSA private key would be 160 bits. On the other hand, the signature size is the same for both DSA and ECDSA: approximately
bits, where
is the security level measured in bits, that is, about 320 bits for a security level of 80 bits.
Signature generation algorithm
Suppose
Alice
Alice may refer to:
* Alice (name), most often a feminine given name, but also used as a surname
Literature
* Alice (''Alice's Adventures in Wonderland''), a character in books by Lewis Carroll
* ''Alice'' series, children's and teen books by ...
wants to send a signed message to
Bob. Initially, they must agree on the curve parameters
. In addition to the field and equation of the curve, we need
, a base point of prime order on the curve;
is the multiplicative order of the point
.
The order
of the base point
must be prime. Indeed, we assume that every nonzero element of the ring
is invertible, so that
must be a field. It implies that
must be prime (cf.
Bézout's identity).
Alice creates a key pair, consisting of a private key integer
, randomly selected in the interval