Ponimania Cooffitsies Elliptic Ethereum
The elliptic krychyts represent a mathmatical presentation, the use of cytro transaction and convenience of the centennium of the data blockchain. In this state, we are uttering in the specifics of that, as a basin plant G (also the existence as a point 0) on the elliptic kriva secp256k1 introduced to the six -tine and ten -format forms.
Introduction Eliptic Kriva
On the elliptic kriva, the Point Plant is defined by his coordinates (x, y) that:
X^2 + Y^2 ≡ 1 (MOD P)
Where X and y ya are coordinates of the pole P on the kriva. The point in the indiscretion (considered as O) is served by the element of the identification.
SECP256K1 Elliptic kryv
SECP256K1 – This is a cryptographic elliptic krychy, a stubborn nist, which is a consistent cryptographic system, such as the cipher signatures of RSA and the elliptical. This conquetti krychytiya is the scoring field of 256 bit (32 bytes) for a closed key.
BasePoint G on SECP256K1
The BasePoint G is an important element of the elliptic kriva, the introduction of the point in the non -inferiority. In the Counste SECP256K1 in the BasePoint G is Coordinates:
GX = (79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB …
SHEESTDERTY CONTRICTED
Six -tiptarian presentation of these coordinate – this is what we are interested.
`plain
GX = (79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB …
`
This six -sized code of the existence from the Ryada of the Chisel, each from which the values in the defined bit -leaved. The first 64 Bita introduces a part of the coordinate, in the time as the following 64 bites are imposed by adding information.
Tsesetic presentation
For tech, who is not a sign with a six -tingler note, here is a rapid hand -paddock:
79
introduces a number 255 (2^8 – 1)
Be 'introduces a six -hand value
0003
- 667e
represent the ten -point
0x6c27fe
- F9DCBABC`
In the combined, these six -tipal values presented the one -of -the -Elliptic SECP256K1.
Why is the BasePoint G not appear in the elliptic crooked?
It is not possible to significantly significantly in the cryptographic projects, the base point G SECP256K1 is not pretended to be a pole elliptic kriva. This is connected with the few tricks:
* Reasonableness : Introduction of the basic point g as unintended stack gives it an incidental forces, such as the “attack of the base point” or the “point of entry into the indiscretion”.
* FLY : Into Introduce the Coordinate Algebra secp256k1 can be taken to the false question and decrease.
* Effectiveness : In cryptographic prostate and efficiency of the frequent paragraphs in the attachment of the sub -Mathematical presentation.
Such an image, the hath semi -daddyatheric and tenative presentations of the base disc g on the secp256k1 interstate, they do not meet the elliptic crooked. The phrase and the problems of the immobility, the connected with the introduction of the basin point g such an image that makes it impenetrable for cryptographic implements.
BINGX SUPPLY AVERAGE CONVERGENCE