ECC vs SLH DSA
This document explores the comparison between Elliptic Curve Cryptography (ECC) - specifically ECDSA and EdDSA - and Stateless Hash-based Digital Signature Algorithm (SLH DSA).
Introduction
Elliptic Curve Cryptography (ECC)
Historical Context
Computational Power in 1985
Theory and Functionality
How ECC Works
1. Elliptic Curve Definition
2. Point Operations on the Curve
Point Addition
Point Multiplication
3. Key Generation
4. ECDSA (Elliptic Curve Digital Signature Algorithm)
Signing & Verification
5. Security Principle
Security Principle
ECC in Bitcoin and Other Blockchains
Computational Power: 2000-2010
Current State of ECC (2024)
Computational Power in 2024
Vulnerabilities of ECC
Stateless Hash-based Digital Signature Algorithm (SLH DSA)
Introduction to Quranium's Approach
Theory and Functionality of SLH DSA
How SLH DSA Works
1. Generate a large set of one-time key pairs
2. Create a Merkle tree from the public keys
3. Sign messages using the one-time private keys
4. Verify signatures using the corresponding public keys and Merkle tree path
Practical Example: ECC vs SLH DSA
Scenario: Signing a 1 KB transaction
Aspect
ECC (ECDSA)
SLH DSA
Analysis
Real-world Implications
Security Principle
Comparison: ECC vs SLH DSA
Detailed Comparison: secp256k1, ECDSA, EdDSA vs SLH DSA
Aspect
secp256k1 (ECDSA)
EdDSA (Ed25519)
SLH DSA (Quranium)
Key Points:
Diagrams and Blockchain Usage
1. secp256k1 (ECDSA)
2. EdDSA (Ed25519)
3. SLH DSA (Quranium)
Quranium's Implementation
Architecture Diagrams
ECC-based Blockchain Architecture
Quranium's SLH DSA-based Architecture
Last updated