A Highly Efficient ECPM Quantum Circuit for Binary Elliptic Curve Cryptanalysis

被引:0
|
作者
Wardhani, Rini Wisnu [1 ]
Putranto, Dedy Septono Catur [2 ,3 ]
Cho, Jaehan [1 ]
Kim, Howon [1 ]
机构
[1] Pusan Natl Univ, Sch Comp Sci & Engn, Busan 609735, South Korea
[2] Pusan Natl Univ, IoT Res Ctr, Busan 609735, South Korea
[3] Pusan Natl Univ, Blockchain Platform Res Ctr, Busan 609735, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Elliptic curves; Qubit; Logic gates; Elliptic curve cryptography; Hardware; Quantum circuit; Galois fields; Quantum algorithm; Protocols; Optimization; Cryptography; Elliptic curve; ECPM; quantum cryptanalysis; shor; DISCRETE LOGARITHMS; TOFFOLI GATE; MULTIPLICATION; COMPUTATION; ALGORITHMS;
D O I
10.1109/ACCESS.2024.3489552
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper provides a detailed analysis and estimation of the quantum resources required for depth-optimized elliptic curve point multiplication (ECPM), with a focus on qubits, Toffoli gates, CNOT gates, and circuit depth. The proposed ECPM quantum circuit, which is tailored for binary elliptic curve cryptanalysis using Shor's algorithm, incorporates improved arithmetic operations into optimized point addition (PA) and point doubling (PD) processes. The quantum resources required for single-step and full- step ECPM implementations (comprising 2n PD +2 PA) were systematically evaluated to enable in-depth cryptanalysis of binary elliptic curve cryptography using Shor's algorithm. The proposed approach offers a significant improvement in resource efficiency compared to circuits that rely solely on the existing PA, which typically require (2n+2)PA operations. The execution of a full iteration of quantum cryptanalysis using the Shor circuit was estimated to require 2n(3 )+ 2n(log3+1)+32n(2) logn+8n(2)+ O(n((log 3+1))) Toffoli gates, approximately 2n + 7n log(6)n+7 qubits, and a circuit depth of approximately 7+ n log(3) 9. Comparisons with leading Toffoli gate-level analysis results validate our findings, which demonstrate reduced quantum resource usage. In addition, key findings related to techniques for solving discrete logarithm problems are summarized, drawing from influential previous studies and current advancements.
引用
收藏
页码:161569 / 161583
页数:15
相关论文
共 50 条
  • [41] Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme
    Hsu, Chien-Lung
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (06): : 367 - 372
  • [42] Fast software implementation of binary elliptic curve cryptography
    Bluhm, Manuel
    Gueron, Shay
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2015, 5 (03) : 215 - 226
  • [43] Large families of elliptic curve pseudorandom binary sequences
    Liu, Huaning
    Zhan, Tao
    Wang, Xiaoyun
    ACTA ARITHMETICA, 2009, 140 (02) : 135 - 144
  • [44] New formulae for efficient elliptic curve arithmetic
    Hisil, Huseyin
    Carter, Gary
    Dawson, Ed
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 138 - 151
  • [45] Design of an Efficient Elliptic Curve Cryptography Coprocessor
    MuthuKumar, B.
    Jeevananthan, Dr. S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 34 - +
  • [46] Efficient Elliptic Curve Operators for Jacobian Coordinates
    Eid, Wesam
    Al-Somani, Turki F.
    Silaghi, Marius C.
    ELECTRONICS, 2022, 11 (19)
  • [47] Efficient Elliptic Curve Cryptography for Embedded Devices
    Liu, Zhe
    Weng, Jian
    Hu, Zhi
    Seo, Hwajeong
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [48] Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher
    Lone, Parveiz Nazir
    Singh, Deep
    Stoffova, Veronika
    Mishra, Deep Chandra
    Mir, Umar Hussain
    Kumar, Neerendra
    MATHEMATICS, 2022, 10 (20)
  • [49] Efficient Ephemeral Elliptic Curve Cryptographic Keys
    Miele, Andrea
    Lenstra, Arjen K.
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 524 - 547
  • [50] Cryptanalysis and improvement of a user authentication scheme for internet of things using elliptic curve cryptography
    Bayat, Majid
    Atashgah, Mohammad Beheshti
    Barari, Morteza
    Aref, Mohammad Reza
    International Journal of Network Security, 2019, 21 (06): : 897 - 911