*This is part one of a series of unknown size; it'll be done when it's done.*

*Part one focuses on the basics: ECC, the particular curve, private and public "keys", and a bonus section on how Monero addresses are generated.*

*Note: Monero is based on the Cryptonote protocol -- though it has diverged and will continue to diverge -- along with numerous other coins; much of this series will apply equally well to the others with some caveats. Monero is easily the largest and most active Cryptonote-based project.*

Hello! I'm an autodidact enthusiast of cryptography, particularly in relation to the crypto-currency Monero. Naturally, you should not assume everything I say is correct, and I hope any egregious errors are pointed out so I can fix them (and help my own understanding). Just calling me an idiot is fine too.

Monero's tagline is "Secure, Private, Untraceable." Secure could refer to a number of facets of a crypto-currency, but here we are only particularly interested in security relating to privacy/anonymity. These articles will be looking at how Monero achieves "privacy", that is unlinkability and untraceability, with references to security where appropriate. This article focuses on some concepts, which will hopefully make understanding the others easier. Without further ado, let's get into it!

*What is Elliptic Curve Cryptography?*

Alright, so what is ECC? From Wikipedia: " **Elliptic curve cryptography** (**ECC**) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. "

Now, what does that mean? *I have no idea.*

More seriously, let's go through it:

- Public-Key Cryptography, or asymmetric cryptography, uses a pair of keys instead of a single private key as in symmetric cryptography (e.g., AES): a public key, to be given out to "the world"; and a private key, to be always kept secret. To be secure, it must be
*hard**intractable*to figure out the private key given the public key; to be usable it must be*easy*to calculate the public key given the private key. ECC relies on the ECDLP for its security.**Takeaways: public/private key pair; private->public is easy, but public->private is "impossible".** - "algebraic structure of elliptic curves":
*What is this???*It is a plane curve satisfying . It might look something like this:

*Who cares?*Right, probably no one. In case someone does, there's a wealth of articles (many related to Bitcoin) out there that explain in detail how they work, how addition is possible, etc. Some examples: A, B, C (a series itself). Numerous videos are out there too, if you're into that.**Takeaways: none,****this funny-looking curve will not help you understand and isn't even how Monero's curve looks.** - "over finite fields": this just means curve points are taken modulo some (large, prime) number. Everyone is familiar with modular addition and subtraction at least (even if they've never heard the word) due to our time-keeping.
*If it is 10am, what time will it be in 5 hours?*An elliptic curve over a finite field might look something like this:**Congrats, you just did modular addition.**

*Whoa, that looks odd.*Yes, it does.**Takeaways: none.****Actually****, note how the points are "reflected" over an invisible line in the center.**

A primary benefit of using ECC vs something like RSA is that keys are much smaller for similar security levels.

**I believe the only things you need to know to proceed are:**

- A point on the curve can be added to or subtracted from another point, or itself.
- A point cannot be multiplied or divided by another point.
- Adding a point to itself allows "scalar multiplication",
**which is where the****magic****happens.**

Subtracting a point from itself isn't very useful, as it'll just return the ECC equivalent of 0. Division by integer isn't possible (the equivalent modular operation -- modular multiplicative inverse -- is, but only with knowledge of the original scalar).

Scalar multiplication is just adding a point to itself over and over; given a point A, 5A = A + A + A + A + A. Since we use astronomically large scalars to prevent easy brute-forcing, we use techniques like *double-and-add** *to allow computation in near-logarithmic time (i.e., really fast!). A quick example:

Suppose our scalar is 27, and we want to compute 27A. Using the naive method, we'd need 26 additions. Instead:

- Add A to itself: 2A. Let's call this new point B.
- Add B to itself: 2B = 4A = C.
- Add C to itself: 2C = 4B = 8A = D.
- Add D to itself: 2D = 4C = 8B = 16A = E.
- Add D to E: 24A = F.
- Add B to F: 26A = G.
- Add A to G: 27A

We went from 26 additions to 7. The difference grows exponentially with larger scalars. The speed difference for an average-size scalar is something along the lines of "all the energy in the universe isn't enough" and "takes less than 1/100th of a second on an average computer", which is interesting to ponder.

That's it for general ECC stuff! If you want more in-depth technical details, please see the links above. :)

*The Monero Curve and Private and Public "Keys"*

Now, onto the Monero-specific stuff. *Finally.*

First some boring stuff like curve constants. From the Cryptonote whitepaper, we get:

We are dealing with the Ed25519 curve, which is a Twisted Edwards Curve. *Good, more meaningless details!*

**Let's quickly go through it:**

*q*: this is the total number of points on this curve. It is mostly irrelevant for our purposes.*d*: an element used in the curve equation below. Not important.*E*: the equation for our Ed25519 curve.*Wow, shiny!*Not important.*G*: the base point or generator point.**This is important!**It is the base from which many operations start. It is the "A" in the above example. In hex, which all of our keys are commonly represented in, it looks like: "5866666666666666666666666666666666666666666666666666666666666666".*Great, back to useless information.**l*: the "order" of the above base point.**This is important**, as it defines the maximum number of points*we**G*to itself over and over and over until you reached*l*-1*G*.*Hs*and*Hp*:*s*means scalar,*p*means point. These will be discussed in a later article.

**Note:**

- Scalars (private keys, really just large integers) are always represented by lowercase letters in equations.
- Points (public keys, really an encoded coordinate on the curve) are always represented by uppercase letters.

In the "real world" (user-facing), both private and public keys in Monero are represented by 64 hex characters, similar to the above representation of *G*. *Time for more useless information. *Scalars are straightforwardly represented as little-endian integers (any integer between 0 and *l *is valid), while points are specially encoded in a way that is too complex for this article. *Or maybe I haven't cared enough about the encoding to research it.*

If we use *x* as our private key and *P *as our public key, then *P *= *xG.*

Some "fun" examples:

*x*= 1 or "0100000000000000000000000000000000000000000000000000000000000000" (remember little-endian);*P*= "5866666666666666666666666666666666666666666666666666666666666666" or*G.*(1*G*=*G*)*x*=*l - 1 or*"ecd3f55c1a631258d69cf7a2def9de1400000000000000000000000000000010";*P*= "58666666666666666666666666666666666666666666666666666666666666e6" (note similarity to*G*); This is the last point before wrapping around. You can think of it like*-G*. Adding G to this value will produce a special identity element, the same as multiplying a point by 0 or order*l*, or subtracting a point from itself.- The integer (
*l*+1)*G*(close enough, it and the next point are tied due to*l*being odd), "ac1999070321b2c6309cc8e31aa89a8b3baa75b5f8febf47855555a3e744bcf0", similar to how 6 is farthest away from 12 on a clock. It (just like*G*and**every**other point) has a complimentary point (in this case produced by (*l*-1) / 2), with which it will sum to the identity element.

*Monero Accounts and Addresses*

This has gone a little long, so I'll just briefly restate the information available here for the standard deterministic derivation. The reason we have two key pairs will be discussed in a future article on stealth addresses.

- Choose a random private spend key, typically by creating 256 random bits then "reducing" mod
*l.*Call this key*b*(to match the whitepaper -- it's confusing I know). - Hash
*b*with the chosen algorithm,*H (*Keccak_256 in our usage). Interpret the result as an integer and reduce it mod*l*as before. Call this key*a.* - Calculate
*B*=*bG*and*A*=*aG.*These are your public spend and public view keys. - Hash (prefix (0x12 in standard Monero) +
*B*+*A*)*H.* - Append the first four bytes of the result to (prefix +
*B*+*A*). This will be 69 bytes (1 + 32 + 32 + 4). - Convert to cnBase58. This is not as straightforward as regular base58, as it uses blocks and padding to result in fixed-length conversions. 69 bytes will always be 95 cnBase58 characters.

Integrated addresses (described here) are the same as above, but with an 8 byte Payment ID appended to *A *in step 4 above and a different prefix (0x13).

That does it for the introduction! Hopefully it wasn't completely incoherent rambling. Additional articles on stealth addresses and ring signatures will be coming out sometime soon. **Feedback is appreciated.**

For those of you looking for a TL;DR (or if you're just bored out of your mind), I've included a random picture (but no TL;DR).

Until next time!

xeroc (70)4 years agoI like the way of your writing. Easy to read even for newcomers while technically correct ... GJ

luigi1111 (55)4 years agoThanks! I had originally planned for the title to include "in plain English", but part way through I wasn't sure how "plain" it would end up being. Still, the focus is absolutely on making it as easy to understand as I can. :)

karenb54 (73)4 years agoCan I press Ctrl Alt Del and start again please

donutly (43)4 years agoThanks for posting this! It was so helpful, I never really understood it like this before.

luigi1111 (55)4 years ago (edited)Stay tuned for more (at unknown future dates of course -- soon^tm).

apes (47)4 years agoyou wanted to share how monero deals with privacy. Is it correct if I assume i can have many public keys and from these keys you cannot know my private key? If i now use mulitple public key my transactions can not connect to me?

luigi1111 (55)4 years agoThis is only an introduction -- prerequisites if you will -- the "meat" will come later.

maximkichev (57)4 years agoIt is very difficult for me ! Okay , we understand and learn what is new every day !

luigi1111 (55)4 years ago (edited)Sorry folks, pics are all screwed up. Will try to fix.

Edit: fixed, I think.

clayton-smock (53)4 years agoThey look good to me!

terrycraft (72)4 years agoQuite clear. Thank you

trogdor (64)4 years agoSir, you just earned a follow.

cwmyao1 (54)4 years agoThanks for sharing.

btcbtcbtc20155 (56)4 years agoThis bring me back to my college time. Thanks.

serkanturan (38)4 years agoI dont understand anything you say but I respect you :)

ben.zimmerman (55)4 years agoEXCELLENT POST! I am so glad that this is trending! :-)

morlon (33)2 years agoGreat article!

When you manage to make smd laugh while reading sth about IT then you really did it right! XD

jimbojones (53)3 years agow00t Monero just doubled in price :)

https://steemit.com/bitcoin/@jimbojones/exclusive-monero-just-hit-usd120

paupau101 (25)3 years agoi've got headache man.

eoslinks (38)3 years agoawesome!

atleast he's not a maximalist (part of monero core team)

samoyedfans (40)2 years agoMonero is a sneaky coin, I like it

ethhawk (25)4 years agoThis is just a description of how Cryptonote coins work not Monero, every Cryptonote fork has this for years already http://chainradar.com/

lethos3 (25)4 years agoand I have them all.

fluffypony (56)4 years agoHe already said that this is part one. It would be crazy for him to detail MRL-0001, MRL-0004, and MRL-0005 (all of which are ONLY in Monero, and fix serious problems that CryptoNote has) in the first part of this series.

ethhawk (25)4 years agoThis article doesn't even mention Cryptonote once and ALL of this cryptography comes from Cryptonote not Monero and every Cryptonote coin has the same for 2 years already http://chainradar.com/

That is false advertising.

luigi1111 (55)4 years agoWhile I have no idea what chainradar.com has to do with anything, I understand your point.

I've added a note at the top.