# Mike Rosing - Elliptic Curve Cryptography - Security Considerations (Highlights) ![rw-book-cover|256](https://freecontent.manning.com/cultivating-practical-expertise-learning-from-elliptic-cur%20ve-cryptography-for-developers/) ## Metadata **Review**:: [readwise.io](https://readwise.io/bookreview/39010427) **Source**:: #from/readwise #from/reader **Zettel**:: #zettel/fleeting **Status**:: #x **Authors**:: [[Mike Rosing]] **Full Title**:: Elliptic Curve Cryptography - Security Considerations **Category**:: #articles #readwise/articles **Category Icon**:: 📰 **URL**:: [www.embeddedrelated.com](https://www.embeddedrelated.com/showarticle/1591.php) **Host**:: [[www.embeddedrelated.com]] **Highlighted**:: [[2024-03-25]] **Created**:: [[2024-03-25]] ## Highlights - Over a finite field when we have $y= g^x \mod{p}$ with y and g known, finding x is called the Discrete Log Problem. ([View Highlight](https://read.readwise.io/read/01hsthqk4s1za3kh1tn67n2w6b)) ^697671003 - [For elliptic curve algebra](https://www.embeddedrelated.com/showarticle/1590.php) over a finite field the equation $Y=xG$ with known points Y and G, finding x is called the Elliptic Curve Discrete Log Problem (ECDLP). This is really hard to do with the best algorithms solving for x being proportional to the $\sqrt r$, where r is the order of the point G. ([View Highlight](https://read.readwise.io/read/01hstjqdz2nmfyrsrhgwqxshaj)) ^697674670 - The embedding degree is the smallest value of k for an elliptic curve over $F_{q^k}$ that has the same very large prime factor. ([View Highlight](https://read.readwise.io/read/01hstjwz115sn3jh7f3vntjhea)) ^697675168 - However, for algorithms which use the pairing of elliptic curve points we want small values of k such as those listed in the above table. ([View Highlight](https://read.readwise.io/read/01hstjzey9scdy92vsmwjtt2c6)) ^697676692