I tried to supply more detail for my post last night, but literally moments after I mentioned Elliptic Curve Cryptography and Wiles' Proof Of Fermat's Last Theorem, bitcointalk.org went down. Later that night, my website was hacked by a fairly sophisticated hacker.
Anyway, let me establish a few things. At this point in history it's fairly clear and obvious that NSA et al. are sabotaging not only our cryptographic technology, but our KNOWLEDGE OF CRYPTOGRAPHY. I don't see it as a coincidence that just years after a very talented mathematician spends at least 5 years exploring the arcane properties of elliptic curves, suddenly, Elliptic Curves become fully accepted methods for cryptography for public use. I've suggested some months ago that the NSA sabotages our cryptography and most on here thought the idea was ridiculous, today there is PROOF they are doing just that.
For starters most people on here really don't know much about this subject and there is quite a bit of posturing going on. It's an open forum so that's to be expected. People pretending to correct other people, while making no useful input to the conversation and posting links of which they don't even understand the content. Even this thread is riddled with math mistakes that these people posing as experts seem to miss. For example:
Well, the point must lie on the curve, so it must satisfy y2 = x3 + 7 (mod p).
this equation is wrong and doesn't even work for the point G on the Elliptic Curve.
Gy
2 =
3032293323238629131397093708741358902059848828670291900490749632219017966501037 851199852273530008094362088328117359813331037184493212192641774435470977600Gx
3 +7 mod p =
28522264212469271830151728101663411104844712793013968865831688505076558508754no one is checking anything, most on here are just chattering away on subjects to look knowledgeable. If anyone on here knew about EC math(there are few), they would have pointed out that to express the equation over field
(integers) for instance the equation is:
y = ( x
3 + 7 )
(1/2) (mod p)
having established that...
the fact is if you followed the progression of events it was indeed highly suspect. If you review the Fermat Proof you will see that there are people who can process elliptic curves in ways that make just about anything that has ever been discussed on here look pedestrian by comparison. If you want to understand how the Fermat Proof works, you can start by studying the works of Galois.
http://en.wikipedia.org/wiki/Galois , as well as mastering half a dozen higher order math concepts:
cover and lift, finite field, isomorphism, surjective function, decomposition group, j-invariant of elliptic curves, Abelian group, Grossencharacter, L-function, abelian variety, Jacobian, Néron model, Gorenstein ring, Torsion subgroup (including torsion points on elliptic curves here[20] and here[21]), Congruence subgroup, eigenform, Character (mathematics), Irreducibility (mathematics), Image (mathematics), dihedral, Conductor, Lattice (group), Cyclotomic field, Cyclotomic character, Splitting of prime ideals in Galois extensions (and decomposition group and inertia group), Quotient space, Quotient group , meanwhile people on here are claiming all these things are simple, but not offering any useful pointers on all the things the people in this very thread got wrong so far. In other words- useless nerd.
Part of what the NSA et. al. have been doing for some time is making our crypto algorithms APPEAR simpler than they are. I sometimes suspect that this Bruce Schneier job. As I have established, the theory of elliptic curves is very deep and very complex, but rarely do you ever hear any of these ideas applied to our crypto systems. Once in a while they pop up and the 'experts' pretend as if this is some surprising event that came out of left field. For quite some time, our spying agencies have sequestered mathematicians, pay them and gag them to create this kind of fog of understanding around whatever math we use to hide our information. This tradition goes back at least to Alan Turing.