A Highly Efficient ECPM Quantum Circuit for Binary Elliptic Curve Cryptanalysis

被引:0
|
作者
Wardhani, Rini Wisnu [1 ]
Putranto, Dedy Septono Catur [2 ,3 ]
Cho, Jaehan [1 ]
Kim, Howon [1 ]
机构
[1] Pusan Natl Univ, Sch Comp Sci & Engn, Busan 609735, South Korea
[2] Pusan Natl Univ, IoT Res Ctr, Busan 609735, South Korea
[3] Pusan Natl Univ, Blockchain Platform Res Ctr, Busan 609735, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Elliptic curves; Qubit; Logic gates; Elliptic curve cryptography; Hardware; Quantum circuit; Galois fields; Quantum algorithm; Protocols; Optimization; Cryptography; Elliptic curve; ECPM; quantum cryptanalysis; shor; DISCRETE LOGARITHMS; TOFFOLI GATE; MULTIPLICATION; COMPUTATION; ALGORITHMS;
D O I
10.1109/ACCESS.2024.3489552
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper provides a detailed analysis and estimation of the quantum resources required for depth-optimized elliptic curve point multiplication (ECPM), with a focus on qubits, Toffoli gates, CNOT gates, and circuit depth. The proposed ECPM quantum circuit, which is tailored for binary elliptic curve cryptanalysis using Shor's algorithm, incorporates improved arithmetic operations into optimized point addition (PA) and point doubling (PD) processes. The quantum resources required for single-step and full- step ECPM implementations (comprising 2n PD +2 PA) were systematically evaluated to enable in-depth cryptanalysis of binary elliptic curve cryptography using Shor's algorithm. The proposed approach offers a significant improvement in resource efficiency compared to circuits that rely solely on the existing PA, which typically require (2n+2)PA operations. The execution of a full iteration of quantum cryptanalysis using the Shor circuit was estimated to require 2n(3 )+ 2n(log3+1)+32n(2) logn+8n(2)+ O(n((log 3+1))) Toffoli gates, approximately 2n + 7n log(6)n+7 qubits, and a circuit depth of approximately 7+ n log(3) 9. Comparisons with leading Toffoli gate-level analysis results validate our findings, which demonstrate reduced quantum resource usage. In addition, key findings related to techniques for solving discrete logarithm problems are summarized, drawing from influential previous studies and current advancements.
引用
收藏
页码:161569 / 161583
页数:15
相关论文
共 50 条
  • [21] A highly efficient threshold key escrow scheme based on elliptic curve cryptosystem
    Zhang, Wenjuan
    Yu, Meisheng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1177 - 1180
  • [22] A Highly Efficient Cipher Processor for Dual-Field Elliptic Curve Cryptography
    Lai, Jyu-Yuan
    Huang, Chih-Tsun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2009, 56 (05) : 394 - 398
  • [23] A Highly Efficient Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem
    Zhang, WenJuan
    Yu, MeiSheng
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 527 - 532
  • [24] Highly Area-Efficient Implementation of Modular Multiplication for Elliptic Curve Cryptography
    Rahman, Md Sazedur
    Hossain, Md Selim
    2020 IEEE REGION 10 SYMPOSIUM (TENSYMP) - TECHNOLOGY FOR IMPACTFUL SUSTAINABLE DEVELOPMENT, 2020, : 1078 - 1081
  • [25] Cryptanalysis of elliptic curve hidden number problem from PKC 2017
    Xu, Jun
    Hu, Lei
    Sarkar, Santanu
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (02) : 341 - 361
  • [26] Cryptanalysis of elliptic curve hidden number problem from PKC 2017
    Jun Xu
    Lei Hu
    Santanu Sarkar
    Designs, Codes and Cryptography, 2020, 88 : 341 - 361
  • [27] Attacking a binary GLS elliptic curve with Magma
    Computer Science Department, CINVESTAV-IPN, Mexico, Mexico
    Lect. Notes Comput. Sci., 1600, (308-326):
  • [28] Attacking a Binary GLS Elliptic Curve with Magma
    Chi, Jesus-Javier
    Oliveira, Thomaz
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 308 - 326
  • [29] A family of elliptic curve pseudorandom binary sequences
    Huaning Liu
    Designs, Codes and Cryptography, 2014, 73 : 251 - 265
  • [30] A family of elliptic curve pseudorandom binary sequences
    Liu, Huaning
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (01) : 251 - 265