A Highly Efficient ECPM Quantum Circuit for Binary Elliptic Curve Cryptanalysis

被引:0
|
作者
Wardhani, Rini Wisnu [1 ]
Putranto, Dedy Septono Catur [2 ,3 ]
Cho, Jaehan [1 ]
Kim, Howon [1 ]
机构
[1] Pusan Natl Univ, Sch Comp Sci & Engn, Busan 609735, South Korea
[2] Pusan Natl Univ, IoT Res Ctr, Busan 609735, South Korea
[3] Pusan Natl Univ, Blockchain Platform Res Ctr, Busan 609735, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Elliptic curves; Qubit; Logic gates; Elliptic curve cryptography; Hardware; Quantum circuit; Galois fields; Quantum algorithm; Protocols; Optimization; Cryptography; Elliptic curve; ECPM; quantum cryptanalysis; shor; DISCRETE LOGARITHMS; TOFFOLI GATE; MULTIPLICATION; COMPUTATION; ALGORITHMS;
D O I
10.1109/ACCESS.2024.3489552
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper provides a detailed analysis and estimation of the quantum resources required for depth-optimized elliptic curve point multiplication (ECPM), with a focus on qubits, Toffoli gates, CNOT gates, and circuit depth. The proposed ECPM quantum circuit, which is tailored for binary elliptic curve cryptanalysis using Shor's algorithm, incorporates improved arithmetic operations into optimized point addition (PA) and point doubling (PD) processes. The quantum resources required for single-step and full- step ECPM implementations (comprising 2n PD +2 PA) were systematically evaluated to enable in-depth cryptanalysis of binary elliptic curve cryptography using Shor's algorithm. The proposed approach offers a significant improvement in resource efficiency compared to circuits that rely solely on the existing PA, which typically require (2n+2)PA operations. The execution of a full iteration of quantum cryptanalysis using the Shor circuit was estimated to require 2n(3 )+ 2n(log3+1)+32n(2) logn+8n(2)+ O(n((log 3+1))) Toffoli gates, approximately 2n + 7n log(6)n+7 qubits, and a circuit depth of approximately 7+ n log(3) 9. Comparisons with leading Toffoli gate-level analysis results validate our findings, which demonstrate reduced quantum resource usage. In addition, key findings related to techniques for solving discrete logarithm problems are summarized, drawing from influential previous studies and current advancements.
引用
收藏
页码:161569 / 161583
页数:15
相关论文
共 50 条
  • [31] Implementation of Elliptic Curve Cryptography in Binary Field
    Susantio, D. R.
    Muchtadi-Alamsyah, I.
    4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710
  • [32] Efficient algorithms for elliptic curve cryptosystems
    Guajardo, J
    Paar, C
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 342 - 356
  • [33] Efficient Pairings on Twisted Elliptic Curve
    Nogami, Yasuyuki
    Akane, Masataka
    Sakemi, Yumi
    Morikawa, Yoshitaka
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 430 - +
  • [34] Energy Efficient Elliptic Curve Processor
    Keller, Maurice
    Marnane, William
    INTEGRATED CIRCUIT AND SYSTEMS DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2009, 5349 : 287 - 296
  • [35] Efficient Elliptic Curve Point Multiplication Using Digit-Serial Binary Field Operations
    Sutter, Gustavo D.
    Deschamps, Jean-Pierre
    Luis Imana, Jose
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2013, 60 (01) : 217 - 225
  • [36] Efficient Lightweight Hardware Structures of Point Multiplication on Binary Edwards Curves for Elliptic Curve Cryptosystems
    Rashidi, Bahram
    Abedini, Mohammad
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (09)
  • [37] Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications
    Aljaedi, Amer
    Jamal, Sajjad Shaukat
    Rashid, Muhammad
    Alharbi, Adel R.
    Alotaibi, Mohammed
    Alanazi, Dalal J.
    APPLIED SCIENCES-BASEL, 2023, 13 (12):
  • [38] Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
    Das, Ashok Kumar
    Paul, Nayan Ranjan
    Tripathy, Laxminath
    INFORMATION SCIENCES, 2012, 209 : 80 - 92
  • [39] Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol
    Wang, Shengbao
    Cao, Zhenfu
    Strangio, Maurizio Adriano
    Wang, Lihua
    IEEE COMMUNICATIONS LETTERS, 2008, 12 (02) : 149 - 151
  • [40] Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem
    Yang, Jen-Ho
    Chang, Chin-Chen
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 3 - +