EVALUATION REPORT FOR CRYPTREC SECURITY LEVEL OF CRYPTOGRAPH(16)

时间:2025-03-09

Abstract. This report discusses the elliptic curve discrete logarithm problem and the known methods to solve it. We consider the implications of these methods for choosing the domain parameters in elliptic curve based cryptographic schemes. We also study s

16S.D.GALBRAITH AND N.P.SMART

function f which has divisor(f)=p(P)−p(O E).Defineϕ(P)to be the differential

ωP:=1d f.Then one can show that the mapϕ:P→ωP is a well-defined homomorphism intoΩ1(E).

To complete the description of(2)we need the homomorphismΩ1(E)→Z/p Z.

We may expand any differentialω∈Ω1(E)in terms of a uniformizer t at a point

P0.In other words,we may writeω= j a j t j dt.The Riemann-Roch theorem shows that a0cannot be zero sinceωis holomorphic(so it has no poles)and also

the divisor ofωhas degree2g−2=0(and so it cannot have any zeroes either).

The mapΩ1(E)→Z/p Z is simplyω= j a j t j dt→a0.That this is a homo-morphism follows from the fact that one may add the power series j a j t j in a termwise manner.

We now show how this map is used to solve the ECDLP on anomalous curves.

The attack is very simple,we merely evaluate the mapϕfrom the previous section

on both P and Q.Note that this map can be efficiently computed using a version

of the double-and-add method like that used to compute the Tate pairing.Since

this is a homomorphism into the additive group Z/p Z,the discrete logarithm is

simplyλ≡ϕ(Q)/ϕ(P)(mod p).This can be solved efficiently using the Euclidean

algorithm.

Implication7.In the case of large odd characteristic one should always have

l=q.

We emphasise that this test is trivial to perform and that the probability of a

random non-supersingular curve failing this test is negligible.

3.5.Weil descent.This method applies to elliptic curves overfield extensions of

the form F q n where q is a prime or prime power and where n>1.The principle

is to transform the ECDLP from E(F q n)to a discrete logarithm problem on the

Jacobian of a curve C over F q.Since subexponential algorithms exist for the discrete

logarithm problem in high genus curves,this gives a possible method of attack

against the ECDLP.

The technique of Weil descent to solve the elliptic curve discrete logarithm prob-

lem(ECDLP)wasfirst proposed by Frey[8].This strategy was detailed further by

Galbraith and Smart[11].These papers were rather general in their scope,but were

not detailed enough to give precise and efficient algorithms to solve the ECDLP for

specific curves.

The work of Gaudry,Hess and Smart[16]was less general than the earlier works

but gave much more powerful and efficient techniques.In particular,they gave

a very efficient algorithm to reduce the ECDLP to the discrete logarithm in a

Jacobian of a hyperelliptic curve over F q.We refer to the method of[16]as the

GHS attack.

Menezes and Qu[28]analysed the GHS attack in some detail and demonstrated

that it did not apply to the case when q=2and n is prime.Since this is the

common case in real world applications,the work of Menezes and Qu means that

the GHS attack does not apply to most deployed systems.However,there are a

fewfielded elliptic curve systems which use thefields F2155and F2185,in the IPSEC

standards.Hence there is considerable interest as to whether the GHS attack makes

all curves over thesefields vulnerable.

…… 此处隐藏:1252字,全部文档内容请下载后查看。喜欢就下载吧 ……
EVALUATION REPORT FOR CRYPTREC SECURITY LEVEL OF CRYPTOGRAPH(16).doc 将本文的Word文档下载到电脑

精彩图片

热门精选

大家正在看

× 游客快捷下载通道(下载后可以自由复制和排版)

限时特价:7 元/份 原价:20元

支付方式:

开通VIP包月会员 特价:29元/月

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219