-> back to Academic Signature Homepage

Download additional Domains for ECC
(up to 1033 bit length)
 

Below on this page, you find links to some additional domains for use in Academic Signature

Beware: If you happen to be an Australian citizen, don't talk or mail to me about this page - just quietly receive this info!
If you would talk to me about crypto exceeding 512 bit, (as I understand) your government could interpret this as illegal export and sentence you to up to 10 years in jail. Let me express my condolence to Australians for having to live under such Orwellian governance.


The elliptic curve domains presented here were created by me(Michael Anders).
You are welcome to use them(at no cost) for noncommercial purpose.

Properties:
They have a substantially higher bit length than any other domains I could find on the web or anywhere else, i.e. substantially larger than the domains supplied by NIST(max 521bit) or ECC- brainpool(max 512bit).
(You may easily retype the NIST or ECC-bp domains in "els-Format" and import them into academic signature. Don't use the NIST Domains if you live in a country where they may be patent or copyright protected.)

Safety:
Actually a 256 bit domain size is considered perfectly safe for decades. I created the domains to give my crypto software "Academic Signature" somewhat of a challenge regarding execution speed.
A side purpose is to satisfy the overkill safety needs of full blown hyper-paranoiacs and -admittedly- to show off a little bit .... ;-)

Personal flavour:
I felt free to incorporate some hex-wordart.
I incorporated the sha256-hash of a copyright note.

Details&Comments:
They were created on my normal office desktop pc with some substantial help by software written by Mike (in these times I better not mention his full name - he knows its him).

They were not fine tuned to contain any weakness - heaven how could I by just using a normal office pc!

They are stored in human readable form(hibyte left) that is also importable into the ECC-program "Academic Signature".

You can easily inspect them and find that all degrees of freedom have been used to introduce either hex-wordart or else to engrave the copyright hash. Other than that, they only contain strings of zeroes or ffff's to fill them up to the required bitlength. The small numbers at the end of modulus and parameter "B" result from counting up the modulus trial-value until a prime is hit and counting up the value of the parameter B until a prime Galois group order is encountered, respectively. Coefficient A is either used for hex-art or kept close to the modulus for a speedier computation.
The lower half of the galois group order ("q-Modul") and the y-coordinate of the used primitive point("Y0) are beyond my disposition and thus look random.
X0 can be almost freely selected and may again be subject to hex-art.

************************************************************************************************

Domain name:        anders_1032_1
Filename
and Link:
                 anders_1032_1.els   my aca_sig  ecdsa-signature
Prime size:                 1033 bit
Content:

ID: anders_1032_1
MODUL: fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc73
coeff_A: fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc70
coeff_B: d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d0015b3
q_MODUL: 0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000184ce99c462d57387687f83e43f191166f0a07b527136b230558cabe982fc856bf6239a1c95e44421a71c553d223e1e8b6941687648973a94d4027ca61abe02331
X0: 0d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d0015d
Y0: 57029d58aeccbf320f5c337d84b7b30d8a412149ed8c526a4d9c0faa829f4ebfbb966bd235bf7dbcb21679b463ecdf73eb80031fb1855e96d37b67731863374e4295dcf904eac0f4cf22604bbfb66c6e4b1e72de7ad6a7289b6c921f8bebf2fcef346ba5f9ce1d6ce660510e345118d42168edb704be01b3ac41f7e485cfdd3df9
 
 END


Comment:

The basic prime modulus contains many "ff"-bytes to facilitate modulo-reductions.
coeff_B does not contain a copyright note.
It just happened to look like a human readable political rant incited by current utterings of a powerful man and is terminated by the counter value when a prime group order was encountered for the first time. Just like anyone else, for this domain the commercial sector is explicitly welcome to use this domain without cost, if they got the guts to do that.
The prime motivation for creating this 1033-bit domain was the desire to clarify that activists in our western democracies reject to accept limits to the cryptographic strength of freely available crypto tools imposed by our self-appointed godfathers of mass surveillance and eavesdropping.

As I understand, "exporting" info about crypto surpassing the 512-bit security level can get you into jail e.g. if you are an australian citizen. Since half the bitlength is considered to be the security level for ECC, I needed more than 1024 bit to clearly trespass this "red line" of the "nobus"-agencies of the "five eyes" countries. As I am german, publishing this domain should be safe for me. Australians in such legal trouble could point to this page and claim that freely available post 512-bit security is already out there. Let's see when the impressive, professionally managed project bouncy castle will offer past 1024 bit ECC.....



Domain name:
        DT_1033
Filename
and Link:
                 DT_1033.els   my aca_sig  ecdsa-signature
Prime size:                 1033 bit
Content:

ID: DT_1033
MODUL: fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc73
coeff_A: fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc70
coeff_B: d02a1d001500a00bad0011a20000d02a1d001500a00bad00fa5c1540000d02a1d001500a2001d10400000000d02a1d001500a00bad0011a20000d02a1d001500a00bad00fa5c1540000d02a1d001500a2001d104000000000000d02a1d001500a00fa5c154001500a00fa5c154001500a00fa5c154001500a00fa5c15400000018
q_MODUL: 0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077642f0c9ae72397d016f3deb9df558290e220f6ab7e15cefdc1f624ed659d99253aea217d79df374951b7f1b47f5d0944a9a4602723e8035bb8a13b381f216cd
X0: d02a1d001500a00bad0011a20000d02a1d001500a00bad00fa5c1540000d02a1d001500a2001d10400000000d02a1d001500a00bad0011a20000d02a1d001500a00bad00fa5c1540000d02a1d001500a2001d104000000000000d02a1d001500a00fa5c154001500a00fa5c154001500a00fa5c154001500a00fa5c15400000001
Y0: 4aa949ac925d3b2b859d17a8e012bd073d4d4c79f35725e3504317b48be11c18a58d3e0d3f077b0774a7b2d9f8f9d586564f640b6c8694b48625196b39778eb860579fa53e568f1da7263e229d16f1bc31417990a4b9192c3d3696e68bd977e1f5aac333a378b68175da55f99d80b6c0fb2fe02cffb64c11c69d578d6cc4abe438
 
 END


Comment:

This is a sister domain of anders_1032_1. As you can see this domain shares the basic prime module with the sister domain. (This does not pose any cryptographic problem.)
Of course it has a different group order.
As you can see from the meager counter value of " ....000018" at the tail of search parameter B, I hit a prime almost immediately. The search finished quickly. Fortuna apparently liked reading B.....






Domain name:        anders_1024_1
Filename
and Link:
                 anders_1024_1.els   my aca_sig  ecdsa-signature
Prime size:                 1024 bit
Content:

ID: anders_1024_1
MODUL: fa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007
coeff_A: fa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004
coeff_B: de5ff15ffdeadffffae5ff15ff900dfffff1ea5ff15ffbe54fffff1ea5ff15ffc001fffff1ea5ff15ff25a5afe0000000000000b0b0000000000000d672c90d27a8070266ee8fc8e4b016d9ec4f0edbef9abd2dfd1e8c429db5e2c400000000000000000000000000a11ce000000000000000000000000000000000000000005
q_MODUL: fa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c6962c2d0c03cabd2665e5763d5c7fb9fc8e9f7438d5ebc58b50780fb9de0df58a6e3bb579921d612530f353e569e1d3527589b979ea4bfa07ac5caaa97f2707
X0: 0de5ff15ffdeadffffae5ff15ff900dfffff1ea5ff15ffbe54fffff1ea5ff15ffc001fffff1ea5ff15ff25a5afe0000000de5ff15ffdeadffffae5ff15ff900dfffff1ea5ff15ffbe54fffff1ea5ff15ffc001fffff1ea5ff15ff25a5afe0000000deadbeef15badf00d00400a11ce00a2d00b0b000000000000000000000000
Y0: 19f0536939e17b5ebe9bd4e4d3c06b0ad43acae9724a73b2410b17975bbc35d62a5ff6a86931d82f92fb6c84c60e05a18a569d2a437df946f454bc74f3c2894d0e59fc8864ba37fb90273c6a833352ef614075fff1622e4df17ad7f900c2a9ad3aa2f52c12c3112a82a87c584d5be050a49a17bc618b85edee26a78b4bb53650
 
 END


Comment:

The modulus contains many zero bytes to facilitate modulo-reductions.
coeff_B contains the hex-art statement:
"DES is dead   AES is good   FLEAS is best   FLEAS is cool   FLEAS is ... ...." (please excuse my hubris) followed by zeroes, followed by the sha256 of my copyright note followed by zeroes, followed by a small obeisance to a crypto celebrity, followed by the counter value when a prime group order was encountered for the first time.
As you can see from the meager counter value I got very lucky with the group order and hit a prime at attempt #5, when about 1000 attempts are to be expected statistically.


Domain name:        anders_1024_2
Filename
and Link:
                 anders_1024_2.els   my aca_sig  ecdsa-signature
Prime size:                 1024 bit
Content:

ID: anders_1024_2
MODUL: deadbeef001500bad00f00d00deadbeef001500bad00f00d00deadbeef001500bad00f00d00deadbeef001500bad00f00d00deadbeef001500bad00f00d00deadbeef001500bad00f00d00deadbeef001500bad00f00d00deadbeef001500bad00f00d00deadbeef001500bad00f00d00deadbeef001500bad00f00d00000553
coeff_A: b0b00ad02e500a11ce00b0b00ad02e500a11ce00b0b00ad02e500a11ce00b0b00ad02e500a11ce00b0b00ad02e500a11ce00b0b00ad02e500a11ce00b0b00ad02e500a11ce00b0b00ad02e500a11ce00b0b00ad02e500a11ce00b0b00ad02e500a11ce00b0b00ad02e500a11ce00b0b00ad02e500a11ce000000000000000000
coeff_B: de5001500dead0000ae5001500900d0000f1ea5001500be540000f1ea5001500c0010000f1ea5ff15ff25a5afe00000000000000000000000000000006c06c057a813fe4fc86eea79422c2f42581b924c73626b35043223f6c24edb1b00000000000000000000000000000000000000000000000000000000000000000000163
q_MODUL: deadbeef001500bad00f00d00deadbeef001500bad00f00d00deadbeef001500bad00f00d00deadbeef001500bad00f00d00deadbeef001500bad00f00d00dea795ed3665842e7c5bbe6164c8694f28bfecbbdccaf14eb1d029be82868f7167ee3d3492126a4eee72ff26a1a9461187a59b40cc8bcfbe87af0405c66f562d68d
X0: 0de5ff15ffdeadffffae5ff15ff900dfffff1ea5ff15ffbe54fffff1ea5ff15ffc001fffff1ea5ff15ff25a5afe0000000de5ff15ffdeadffffae5ff15ff900dfffff1ea5ff15ffbe54fffff1ea5ff15ffc001fffff1ea5ff15ff25a5afe0000000deadbeef15badf00d00400a11ce00a2d00b0b000000000000000000000001
Y0: 26f3cec2a668d0d3262431b83d8324cb8314c306a7e619c40cd25964492c5dbcf2a179da1d75c1758a158939c351c4cfcab769575fc6c4c31e9505ce161d800c7b49255813c3190a5595b5f6a7514a60f8efc8b9eef49c4cb1c536cbba81e3bf81816790d45b71b14c886c00915e2c9180a6a249eec84097c3cd8f85eb0d05fd
 
 END


Comment:

The modulus has no special form and does not allow for using any special shortcuts to speed up calculations. Thus calculations take about threefold time compared to anders_1024_1 and signature verification thus takes about 1 second on my office desktop pc. The modulus has my favourite "deadbeef is bad food"- form.
coeff_A contains the hex-art statement:
--find out for yourself, this is a very affectionate statement ;-) .... followed by some zeroes
coeff_B contains the hex-art statement:
"DES is dead   AES is good   FLEAS is best   FLEAS is cool   FLEAS is ... ...." (again, please excuse my hubris) followed by zeroes, followed by the sha256 of another copyright note followed by zeroes, followed by the counter value when a prime group order was encountered for the first time.
As you can see from the counter value I got not so lucky with the group order this time and hit a prime at attempt #355, multiply this by 6 threads on my quadcore to get 2130 trials when about 1000 attempts were to be expected statistically -aaargh.



Domain name:        anders_800_1
Filename
and Link:
                 anders_800_1.els   my aca_sig  ecdsa-signature
Prime size:                 800 bit
Content:
ID: anders_800_1
MODUL: ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000047
coeff_A: ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044
coeff_B: de5ff15ffdeadffffae5ff15ff900dfffff1ea5ff15ffbe54fffff1ea5ff15ffc001fffff1ea5ff15ff25a5afe00000000000000000000000000d672c90d27a8070266ee8fc8e4b016d9ec4f0edbef9abd2dfd1e8c429db5e2c4000000000000000003bf
q_MODUL: ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000569d604b9866f4c07149d7adbc08639860bec66de3ac32bfffb4a8a301ef80ce26685b2fbca6c4d3f073566a7efadf547d05
X0: de5ff15ffdeadffffae5ff15ff900dfffff1ea5ff15ffbe54fffff1ea5ff15ffc001fffff1ea5ff15ff25a5afede5ff15ffdeadffffae5ff15ff900dfffff1ea5ff15ffbe54fffff1ea5ff15ffc001fffff1ea5ff15ff25a5afeffffffffffffffff
Y0: 5ef7703d1143a5ccc4d9c0b5cf4074ec9376f6aefb6168e7797484e1759b4b45444708331e294ae6d974985b93b7695a0ec3a599f894d43c731f836de9bb9c6c7a2faee44aac9c0f0b0bf9f1e88f71f8db383aa4e35b9eff511f465a8c901f9f90248f8a 

 END


Comment:

As you can see from the counter value of parameter B, I was not too lucky with the 800-bit domain again and hit a prime group order well beyond the statistical expectation value(five threads ran in parallel, so I had to determine galois group order of an 800 bit elliptic curve several thousand times... I cursed more than once during two weeks of number crunching on my poor little office-PC.)


Domain name:        anders_768_1
Filename
and Link:
                 anders_768_1.els   my aca_sig  ecdsa-signature
Prime size:                 768 bit
Content:
ID: anders_768_1
MODUL: fb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e7
coeff_A: fb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4
coeff_B: de5ff15ffdeadffffae5ff15ff900dfffff1ea5ff15ffbe54fffff1ea5ff15ffc001fffff1ea5ff15ff25a5afe0000000000f0000000d672c90d27a8070266ee8fc8e4b016d9ec4f0edbef9abd2dfd1e8c429db5e2c400000000000000000185
q_MODUL: faffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff823dec7f8ef180dc44c9e5cd2c1e351b51faf52779db9decc9a3e13d526b0eb2b1816ddd401d83de0dd0f3999de2fc4f
X0: de5ff15ffdeadffffae5ff15ff900dfffff1ea5ff15ffbe54fffff1ea5ff15ffc001fffff1ea5ff15ff25a5afede5ff15ffdeadffffae5ff15ff900dfffff1ea5ff15ffbe54fffff1ea5ff15ffc001fffff1ea5ff15ff25a5afeffffffffffff
Y0: 0559cdf3dc6b1e8e0364eb9bdac0b9b72e714c2a6e14a2cc9a188a4e6f67599b83886d1cdf4e1272f282c51b2bfee63f425f210a7f5b80de67d1d64a19bb8f4e1739d16acf3635efc7a8ff6840f93f0d4c6e6be5298275b2bad0b84aef2dec95
 
 END




Domain name:        anders_640_1
Filename
and Link:
                 anders_640_1.els   my aca_sig  ecdsa-signature
Prime size:                 640 bit
Content:
 
ID: anders_640_1
MODUL: b0b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000217
coeff_A: b0b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000214
coeff_B: a11ceffffb0bffffa2dffffecd5affffffffffffffffd672c90d27a8070266ee8fc8e4b016d9ec4f0edbef9abd2dfd1e8c429db5e2c4ffffffffffffffff00000000000000000000000000000000011d
q_MODUL: b0b0000000000000000000000000000000000000000000000000000000000000000000000000000040693ef5b986c36e8e4e3875d3ad5a90a01902f487c64bde90c26dc557013ab00756f5a9101b5c09
X0: a11ce00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b0b 
Y0: 3ceeebfa34aa8c9a9ed635296e74987e688cba0b772498be4660ac8977d4751b43b087d718d608396b7e82721dd423bc433f76cc76c18d3d3ac00c719f9f22662676189eebdfa4d7f347364daaf766e2
 
 END



Just for your Infomation:
I append the largest openly available domain from other sources, NIST-521, in "els"-format below.
Depending on what country you reside in, you may be able to manually copy&paste it for import into "Academic Signature" without risking legal threats about alleged patent infringement(?). This domain can be used in the more advanced of commercial crypto-products.
Beware! the NSA may have backdoors in place. Use at own risk.
 
ID: NSA_p521
MODUL:
01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
coeff_A:
01fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc
coeff_B:
51953eb9618e1c9a1f929a21a0b68540eea2da725b99b315f3b8b489918ef109e156193951ec7e937b1652c0bd3bb1bf073573df883d2c34f1ef451fd46b503f00
q_MODUL:
01fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa51868783bf2f966b7fcc0148f709a5d03bb5c9b8899c47aebb6fb71e91386409
X0:
c6858e06b70404e9cd9e3ecb662395b4429c648139053fb521f828af606b4d3dbaa14b5e77efe75928fe1dc127a2ffa8de3348b3c1856a429bf97e7e31c2e5bd66
Y0:
011839296a789a3bc0045c8a5fb42c7d1bd998f54449579b446817afbd17273e662c97ee72995ef42640c550b9013fad0761353c7086a272c24088be94769fd16650
 
 END


*******************************************************************************************************************************************