Attacking a Binary GLS Elliptic Curve with Magma

被引:4
|
作者
Chi, Jesus-Javier [1 ]
Oliveira, Thomaz [1 ]
机构
[1] CINVESTAV IPN, Dept Comp Sci, Mexico City, DF, Mexico
来源
关键词
WEIL DESCENT;
D O I
10.1007/978-3-319-22174-8_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present a complete Magma implementation for solving the discrete logarithm problem (DLP) on a binary GLS curve defined over the field F-262. For this purpose, we constructed a curve vulnerable against the gGHS Weil descent attack and adapted the algorithm proposed by Enge and Gaudry to solve the DLP on the Jacobian of a genus-32 hyperelliptic curve. Furthermore, we describe a mechanism to check whether a randomly selected binary GLS curve is vulnerable against the gGHS attack. Such method works with all curves defined over binary fields and can be applied to each element of the isogeny class.
引用
收藏
页码:308 / 326
页数:19
相关论文
共 50 条
  • [1] Attacking a binary GLS elliptic curve with Magma
    Computer Science Department, CINVESTAV-IPN, Mexico, Mexico
    Lect. Notes Comput. Sci., 1600, (308-326):
  • [2] Attacking Elliptic Curve Cryptosystems with Special-Purpose Hardware
    Gueneysu, Tim
    Paar, Christof
    Pelzl, Jan
    FPGA 2007: FIFTEENTH ACM/SIGDA INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE GATE ARRAYS, 2007, : 207 - 215
  • [3] Research on Attacking a Special Elliptic Curve Discrete Logarithm Problem
    Weng, Jiang
    Dou, Yunqi
    Ma, Chuangui
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [4] A family of elliptic curve pseudorandom binary sequences
    Huaning Liu
    Designs, Codes and Cryptography, 2014, 73 : 251 - 265
  • [5] A family of elliptic curve pseudorandom binary sequences
    Liu, Huaning
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (01) : 251 - 265
  • [6] Implementation of Elliptic Curve Cryptography in Binary Field
    Susantio, D. R.
    Muchtadi-Alamsyah, I.
    4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710
  • [7] Multi-Agent System Protecting from Attacking with Elliptic Curve Cryptography
    Huang, Xu
    Shah, Pritam Gajkumar
    Sharma, Dharmendra
    ADVANCES IN INTELLIGENT DECISION TECHNOLOGIES, 2010, 4 : 123 - 131
  • [8] 2DT-GLS: Faster and Exception-Free Scalar Multiplication in the GLS254 Binary Curve
    Aardal, Marius A.
    Aranha, Diego F.
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 53 - 74
  • [9] Multi-agent system protecting from attacking with elliptic curve cryptography
    Huang X.
    Shah P.G.
    Sharma D.
    Smart Innovation, Systems and Technologies, 2010, 4 : 123 - 131
  • [10] Fast software implementation of binary elliptic curve cryptography
    Bluhm, Manuel
    Gueron, Shay
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2015, 5 (03) : 215 - 226