EVALUATION REPORT FOR CRYPTREC SECURITY LEVEL OF CRYPTOGRAPH(8)

时间:2025-03-09

Abstract. This report discusses the elliptic curve discrete logarithm problem and the known methods to solve it. We consider the implications of these methods for choosing the domain parameters in elliptic curve based cryptographic schemes. We also study s

8S.D.GALBRAITH AND N.P.SMART

We define a function d on the group

d :G →{0,1}

such that d (g )=1around 1/2t of the time.For example,the function d is often defined by returning d (g )=1if a certain subset of t of the bits representing a group element R are set to zero.The elements in G for which d (g )=1will be called distinguished .

Now it is only the distinguished group elements which are transmitted back to the central server.In other words,only 1in 2t points in the random walk are sent to the server.This means that one expects the random walks to need to continue another 2t steps in the worst case before a collision occurs between two random walks.Hence,the computing time now becomes O √+2

t −1 in the average case,whilst the storage becomes O √l/2t .

Both these complexity estimates are for the average case running time and storage requirements.Since the algorithms are Las Vegas in nature there is the possibil-ity that they never terminate (although this is highly unlikely).In addition the distribution of the running time can have quite a large variance.

One might be tempted to balance the above two equations by choosing 2

t −1≈ πl/2/m so that the time requirement is O (√l/m )while the space requirement is O (m ).In practice this is not what is done,since any single processor probably

cannot execute 2t =O (√l/m )operations.Instead,the space requirement is chosen

in such a way that the central server has enough memory,and that single processors can produce distinguished points at an convenient rate (for instance,one or two distinguished points each day).

It must be remembered that all the distinguished points are sent to a central server where they are stored.This leads to practical memory and network consid-erations which are an obstacle to performing this method in very large groups.

Finally,we note that a parallel random walk attack similar to the one mentioned above is known for finding collisions in cryptographic hash functions.This means that elliptic curve cryptosystems should have parameter sizes chosen according to the same security criteria as hash function output sizes.Implication 3.When choosing elliptic curve parameter sizes it must be remem-bered that the work effort required is essentially reduced by a linear factor in terms of the number of processors available to an attacker.

Elliptic curve parameter sizes should be chosen to be at least as large as recom-mended hash function output sizes.

2.5.Practical considerations.As already remarked it is usual to choose

l ≈N,

and general theory implies that N ≈q .So in most fielded elliptic curve cryptosys-tems we have

l ≈q

…… 此处隐藏:881字,全部文档内容请下载后查看。喜欢就下载吧 ……
EVALUATION REPORT FOR CRYPTREC SECURITY LEVEL OF CRYPTOGRAPH(8).doc 将本文的Word文档下载到电脑

精彩图片

热门精选

大家正在看

× 游客快捷下载通道(下载后可以自由复制和排版)

限时特价:7 元/份 原价:20元

支付方式:

开通VIP包月会员 特价:29元/月

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219