Attacking a Binary GLS Elliptic Curve with Magma

被引:4
|
作者
Chi, Jesus-Javier [1 ]
Oliveira, Thomaz [1 ]
机构
[1] CINVESTAV IPN, Dept Comp Sci, Mexico City, DF, Mexico
来源
关键词
WEIL DESCENT;
D O I
10.1007/978-3-319-22174-8_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present a complete Magma implementation for solving the discrete logarithm problem (DLP) on a binary GLS curve defined over the field F-262. For this purpose, we constructed a curve vulnerable against the gGHS Weil descent attack and adapted the algorithm proposed by Enge and Gaudry to solve the DLP on the Jacobian of a genus-32 hyperelliptic curve. Furthermore, we describe a mechanism to check whether a randomly selected binary GLS curve is vulnerable against the gGHS attack. Such method works with all curves defined over binary fields and can be applied to each element of the isogeny class.
引用
收藏
页码:308 / 326
页数:19
相关论文
共 50 条
  • [31] An Optimized Flexible Accelerator for Elliptic Curve Point Multiplication over NIST Binary Fields
    Aljaedi, Amer
    Rashid, Muhammad
    Jamal, Sajjad Shaukat
    Alharbi, Adel R.
    Alotaibi, Mohammed
    APPLIED SCIENCES-BASEL, 2023, 13 (19):
  • [32] Innovative Dual-Binary-Field Architecture for Point Multiplication of Elliptic Curve Cryptography
    Li, Jiakun
    Wang, Weijiang
    Zhang, Jingqi
    Luo, Yixuan
    Ren, Shiwei
    IEEE ACCESS, 2021, 9 : 12405 - 12419
  • [33] Hybrid Binary-Ternary Joint Form and its Application in Elliptic Curve Cryptography
    Adikari, Jithra
    Dimitrov, Vassil
    Imbert, Laurent
    ARITH: 2009 19TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER ARITHMETIC, 2009, : 76 - +
  • [34] Low latency elliptic curve cryptography accelerators for NIST curves over binary fields
    Shu, C
    Gaj, K
    Ei-Ghazawi, T
    FPT 05: 2005 IEEE INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2005, : 309 - 310
  • [35] Elliptic curve cryptography over binary finite field GF(2m)
    Department of Physics, Eastern Mediterranean University, via Mersin 10, Gazimagusa, North Cyprus, Turkey
    Inf. Technol. J., 2006, 1 (204-229):
  • [36] High-speed hardware architecture of scalar multiplication for binary elliptic curve cryptosystems
    Rashidi, Bahram
    Sayedi, Sayed Masoud
    Farashahi, Reza Rezaeian
    MICROELECTRONICS JOURNAL, 2016, 52 : 49 - 65
  • [37] Elliptic Curve Pairings
    Fitzgerald, Joshua Brian
    COMPUTER, 2022, 55 (04) : 74 - 77
  • [38] A∞-structures on an elliptic curve
    Polishchuk, A
    COMMUNICATIONS IN MATHEMATICAL PHYSICS, 2004, 247 (03) : 527 - 551
  • [39] SYMBOLS ON AN ELLIPTIC CURVE
    ROBERTS, LG
    COMMUNICATIONS IN ALGEBRA, 1976, 4 (08) : 787 - 791
  • [40] Elliptic Curve Kleptography
    Mohamed, Elsayed
    Elkamchouchi, Hassan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (06): : 183 - 185