Elliptic Curve Cryptography
We have taken you on a magical journey through the world of cryptography. This is our final piece, where we’ll focus on the elliptic curve cryptography in detail. We’ll also have a look at what the future holds for us.
We have taken you on a magical journey through the world of cryptography. This is our final piece, where we’ll focus on the elliptic curve cryptography in detail. We’ll also have a look at what the future holds for us.
Without further ado, let’s continue where we left off in our previous post.
In this post, the focus is on elliptic curves. We’ll talk about commutative groups, operations on the points of an elliptic curve, intersection and tangent methods, neutral and opposite elements, and much more.
More and more we find that it’s not just technology that gets us where we need to be, but how we use that technology and the enabling factors surrounding it.
This post focuses on cryptography in groups. We will talk more about how to securely exchange information over public channels, and how to ensure security in the key exchange protocol. We will also take a look at which mathematical issues we face and which methods to use for solving them.
The development of the ETCB information system started in the nineties. The systems still contain important parts that were developed back then and are based on the 20 year old technology. Over the years, the system has grown in an evolutionary way – there is more than one hundred different sub-systems supporting various business processes. Those systems have been built over the course of last 20 years, using different technologies, following different user interface guidelines and designs and different philosophies. The situation was complicated further by the merger of Estonian Tax Board and Estonian Customs Board in mid-2000 when their technologically disparate systems were also merged. The system was really heterogeneous in many ways, but at the same time contained big monolithic blocks of critical functionality that were implemented on the decades-old technology.
Welcome to our first blog post in the series on elliptic curve cryptography. With the following posts, you will get an overview of the world of elliptic curves, starting with a brief history and some thoughts on what the future holds. Without further ado, let us begin.
Cybernetica’s Data Exchange Technologies team is glad to announce the next version of our main product: UXP Core. UXP Core 1.11 is mainly a maintenance release with no major changes to the architecture. This blog post outlines the major changes introduced with this release.
For digital societies to function, personal identifiers are useful, if not unavoidable. Quite an array of public services rests on the premise of identitfication and authentication of the citizens – the quality of that process determines the quality of the services, in many cases. According to the World Atlas, there are currently 195 countries in the World. According to the data we have collected from the official sources and related Wikipedia articles, half of the countries have already implemented a kind of unique identifier for their citizens, residents, visitors or (why not the) e-residents. The names for the identifiers vary – depending on the country this attribute can be called Personal Identification Number or Citizen Number or Resident Registration Number or just Taxation ID. What will follow, is a short overview of the essence of personal identifiers and also the history of introducing these.
Our guest post is from Positium, a data analytics company from Tartu, Estonia. They are the only company in the world specialising in mobile positioning data for official statistics. Positium has over 10 years of experience working with global clients and scientists alike, always striving to improve modern statistics with timely and accurate data. They provide a technological platform and methodology for processing mobile phone data for human mobility monitoring, analyses and statistical indicators.