Cryptocurrencies are a mean of executing online transactions. They use a variety of cryptographic techniques to secure and verify these transactions, which are functionally supported by the Blockchain platform. Blockchain is a continuously growing, distributed ledger of files that contains all transactions between users of cryptocurrencies in a verifiable and permanent manner. It consists of blocks that are connected and secured cryptographically. Cryptocurrencies use algorithms to produce pairs of public and private keys. These pairs, cryptographically merged with a message between the participants, are the building blocks of the relevant transactions. Bitcoin uses the ECDSA algorithm to produce the above-mentioned keys. The purpose of our work is to present some useful motifs for the domain parameters of base point (P) and the order (n) of the subgroup produced by it, while choosing the elliptic curve and the Galois field on which we formulate the algorithm, in order to obtain safer private keys. The results of the research are experimental due to the limited infrastructure, but explanatory for the purpose of our work. The resulting conclusions highlight the value of the proper selection of the structural parameters of these algorithms and possible alternatives to the curve, field and domain parameters that can be used.
Cite this paper
Kontogiannis, P. V. and Varvarigou, T. (2019). ECDSA Private Keys Study of Security. Open Access Library Journal, 6, e5423. doi: http://dx.doi.org/10.4236/oalib.1105423.
Narayanan, A., Bonneau, J., Felten, E., Miller, A. and Goldfender, S. (2015) Bitcoin and Cryptocurrency Technologies. Princeton University, Princeton, NJ.
Johnson, D., Menezes, A. and Vanstone, S. (2001) The Elliptic Curve Digital Signature Algorithm (ECDSA). Department of Combinatorics & Optimization, University of Waterloo. http://www.cs.miami.edu/home/burt/lea rning/Csc609.142/ecdsa-cert.pdf
Silverman, J.H. (2006) An Introduction to the Theory of Elliptic Curves. Brown University and NTRU Cryptosystems, Inc. https://www.math.brown.edu/~jhs/Prese ntations/WyomingEllipticCurve.pdf
Kha-lique, A., Sood, S. and Singh, K. (2010) Implementation of Elliptic Curve Digital Signature Algorithm. Internatuonal Journal of Computer Applications, 2, No. 2. http://www.ijcaonline.org/volume2/ number2/pxc387876.pdf
Corbellini, A. (2015) Elliptic Curve Cryptography: Breaking Security and a Comparison with RSA. http://andrea.corbellini.name/2015/06/08/ elliptic-curve-cryptography-breaking-security- and-a-comparison-with-rsa/