Elliptic curve cryptography is a branch of mathematics that deals with curves or functions that take the format
These curves have some properties that are of interest and use in cryptography – where we define the addition of points as the reflection in the x axis of the third point that intersects the curve.
Firstly we calculate the equation of the line G to B and find where it intersects the function and multiply the (y) coordinate by (-1). This is a very simple geometric and algebraic calculation when the two points are known.
What happens though if we want to add two points which are the same – for example we want to add G + G = 2G. This is similar to standard calculus methods of calculating derivatives and we end up just taking tangent to the curve at the point and find where it intersects the curve and again flip it in the x – axis.
In fact, as shown in the picture above we can repeat the process and repeat the process. So to get 4G we can take the point 2G and add it to itself again to find 4G – again this is done by taking the tangent of the curve at 2G and finding where it intersects the function. This also shows you how you can quickly perform multiple multiplications quickly - to calculate 4G takes two calculations instead of 3 and can be extended to 32G taking 5 steps instead of 33.
The Bitcoin curve is based secp256k1 curve based on modular mathematics and takes the form below:
y2=x3+7 mod n where n=1.158x1077
This introduces a new form of mathematics of group field theory or modular arithmetic. Even though it sounds intimidating it’s actually quite simple and straight forward and we are all very familiar with it in the form of clocks! As clocks measure in 12 hour sets then 12 hours from any point is just the same point – and in Bitcoin this field (or clock) is 1.158x10^77 units. You can imagine the chart wrapping round on itself.
Another point is that when defined in this way as a field on prime order n the curve no longer takes real numbers (i.e. decimals) which is very useful in computing as you don’t get decimals and error codes. In fact the curve instead of being smooth becomes a series of dots. The figure below shows a curve of finite field of prime order 17.
In fact multiplication and addition in this space obey the same principles as normal elliptic curves just with a bit of changing from modular arithmetic. You can still get the same results as with elliptic curves over real numbers when you add points together which looks like below – although the simple geometry breaks down and it looks fully chaotic and random.
This is how Bitcoin creates Public Keys from private keys. The equation below is the transformation of a private key to a public key.
Public_K= G x Private_K
In this case the Public_K is a point in the secp2561k curve with both x and y coordinates and G is the generator point. The generator point is the same for everyone and is just an arbitrarily defined point.
If the Private_K is 32 then the multiplication of Private_K and the point G(x,y) is simply 32G is:
Private_K x G=32G=G+G+G+G…..G
This is where the discrete logarithm problem comes in and is what gives public and private keys their security and one way trajectory.
- What is a Bitcoin Private Key?
- How to create a Bitcoin address from a Public Key?
- How do digital signatures in Bitcoin work?
- What is a Bitcoin Fork?
- How does the Bitcoin Network actually work?
- How does a hashing algorithm work?
- Bitcoin Transactions – Scriptsig and Scriptpubkey – locking and unlocking a transaction?
- Using VPNs and Password Managers to Secure Your NFTs
- B2Broker Introduces cTrader as a White Label Platform
- CryptoCompare Lists Potential Ethereum Hard Fork Tokens
- Crypto Spot Trading Volumes Reach 20-Month Low
- Binance Leads YTD Crypto Exchange Volumes as Competition Heats Up
- Total Value Locked in DeFi Protocols Plunged 65.7% in Q2
- Crypto Adoption on the Rise: Countries Pioneering Digital Asset Usage
- Meeting FirstByte Media: Comments from Cosmin Mesenschi, CEO & Founder of FirstByte Media
- Meet ZENIQ: The Decentralized Blockchain-Powered Ecosystem
- GAUGECASH Integrates Chainlink Keepers to Decentralize Automation of Novel Liquidity Pool, GAUGEFIELD
This website is only provided for your general information and is not intended to be relied upon by you in making any investment decisions. You should always combine multiple sources of information and analysis before making an investment and seek independent expert financial advice.
Where we list or describe different products and services, we try to give you the information you need to help you compare them and choose the right product or service for you. We may also have tips and more information to help you compare providers.
Some providers pay us for advertisements or promotions on our website or in emails we may send you. Any commercial agreement we have in place with a provider does not affect how we describe them or their products and services. Sponsored companies are clearly labelled.