A Highly Efficient ECPM Quantum Circuit for Binary Elliptic Curve Cryptanalysis

被引:0
|
作者
Wardhani, Rini Wisnu [1 ]
Putranto, Dedy Septono Catur [2 ,3 ]
Cho, Jaehan [1 ]
Kim, Howon [1 ]
机构
[1] Pusan Natl Univ, Sch Comp Sci & Engn, Busan 609735, South Korea
[2] Pusan Natl Univ, IoT Res Ctr, Busan 609735, South Korea
[3] Pusan Natl Univ, Blockchain Platform Res Ctr, Busan 609735, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Elliptic curves; Qubit; Logic gates; Elliptic curve cryptography; Hardware; Quantum circuit; Galois fields; Quantum algorithm; Protocols; Optimization; Cryptography; Elliptic curve; ECPM; quantum cryptanalysis; shor; DISCRETE LOGARITHMS; TOFFOLI GATE; MULTIPLICATION; COMPUTATION; ALGORITHMS;
D O I
10.1109/ACCESS.2024.3489552
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper provides a detailed analysis and estimation of the quantum resources required for depth-optimized elliptic curve point multiplication (ECPM), with a focus on qubits, Toffoli gates, CNOT gates, and circuit depth. The proposed ECPM quantum circuit, which is tailored for binary elliptic curve cryptanalysis using Shor's algorithm, incorporates improved arithmetic operations into optimized point addition (PA) and point doubling (PD) processes. The quantum resources required for single-step and full- step ECPM implementations (comprising 2n PD +2 PA) were systematically evaluated to enable in-depth cryptanalysis of binary elliptic curve cryptography using Shor's algorithm. The proposed approach offers a significant improvement in resource efficiency compared to circuits that rely solely on the existing PA, which typically require (2n+2)PA operations. The execution of a full iteration of quantum cryptanalysis using the Shor circuit was estimated to require 2n(3 )+ 2n(log3+1)+32n(2) logn+8n(2)+ O(n((log 3+1))) Toffoli gates, approximately 2n + 7n log(6)n+7 qubits, and a circuit depth of approximately 7+ n log(3) 9. Comparisons with leading Toffoli gate-level analysis results validate our findings, which demonstrate reduced quantum resource usage. In addition, key findings related to techniques for solving discrete logarithm problems are summarized, drawing from influential previous studies and current advancements.
引用
收藏
页码:161569 / 161583
页数:15
相关论文
共 50 条
  • [1] Concrete quantum cryptanalysis of binary elliptic curves
    Banegas G.
    Bernstein D.J.
    van Hoof I.
    Lange T.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (01): : 451 - 472
  • [2] Depth-Optimization of Quantum Cryptanalysis on Binary Elliptic Curves
    Putranto, Dedy Septono Catur
    Wardhani, Rini Wisnu
    Larasati, Harashta Tatimma
    Ji, Janghyun
    Kim, Howon
    IEEE ACCESS, 2023, 11 : 45083 - 45097
  • [3] Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve
    Toorani, Mohsen
    Shirazi, Ali Asghar Beheshti
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 428 - 432
  • [4] Concrete quantum cryptanalysis of binary elliptic curves via addition chain
    Taguchi, Ren
    Takayasu, Atsushi
    QUANTUM INFORMATION PROCESSING, 2024, 23 (04)
  • [5] Concrete quantum cryptanalysis of binary elliptic curves via addition chain
    Ren Taguchi
    Atsushi Takayasu
    Quantum Information Processing, 23
  • [7] EFFICIENT QUANTUM CIRCUITS FOR BINARY ELLIPTIC CURVE ARITHMETIC: REDUCING T-GATE COMPLEXITY
    Amento, Brittanney
    Roetteler, Martin
    Steinwandt, Rainer
    QUANTUM INFORMATION & COMPUTATION, 2013, 13 (7-8) : 631 - 644
  • [8] Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
    Nitaj, Abderrahmane
    Susilo, Willy
    Tonien, Joseph
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 206 - 221
  • [9] Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem
    Larasati, Harashta Tatimma
    Kim, Howon
    INFORMATION SECURITY APPLICATIONS, 2021, 13009 : 91 - 104
  • [10] Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Mohammad Sabzinejad Farash
    The Journal of Supercomputing, 2014, 70 : 987 - 1001