On the bits of elliptic curve Diffie-Hellman keys

被引:0
|
作者
Jao, David [1 ]
Jetchev, Dimitar [2 ]
Venkatesan, Ramarathnam [3 ,4 ]
机构
[1] Univ Waterloo, Waterloo, ON N2L 3G1, Canada
[2] Univ Calif Berkeley, Dept Math, Berkeley, CA 94720 USA
[3] Microsoft Res India Pvt Ltd, Bangalore 560080, Karnataka, India
[4] Microsoft Res, Redmond, WA 98052 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the security of elliptic curve Diffie-Hellman secret keys in the presence of oracles that provide partial information on the value of the key. Unlike the corresponding problem for finite fields, little is known about this problem, and in the case of elliptic curves the difficulty of representing large point multiplications in an algebraic manner leads to new obstacles that are not present in the case of finite fields. To circumvent this obstruction, we introduce a small multiplier version of the hidden number problem, and we use its properties to analyze the security of certain Diffie-Hellman bits. We suggest new character sum conjectures that guarantee the uniqueness of solutions to the hidden number problem, and provide some evidence in support of the conjectures by showing that they hold on average in certain cases. We also present a Grobner basis algorithm for solving the hidden number problem and recovering the Diffie-Hellman secret key when the elliptic curve is defined over a constant degree extension field and the oracle is a coordinate function in the polynomial basis.
引用
收藏
页码:33 / +
页数:3
相关论文
共 50 条
  • [1] Bits security of the elliptic curve Diffie-Hellman secret keys
    Jetchev, Dimitar
    Venkatesan, Ramarathnam
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 75 - +
  • [2] Interpolation of the elliptic curve Diffie-Hellman mapping
    Lange, T
    Winterhof, A
    [J]. APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 51 - 60
  • [3] On the Bit Security of Elliptic Curve Diffie-Hellman
    Shani, Barak
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT I, 2017, 10174 : 361 - 387
  • [4] On the security of Diffie-Hellman bits
    Vasco, MIG
    Shparlinski, IE
    [J]. CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 257 - 268
  • [5] Research on the Bit Security of Elliptic Curve Diffie-Hellman
    Wei, Wei
    Chen, Jiazhe
    Li, Dan
    Zhang, Baofeng
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1820 - 1827
  • [6] Research on the Bit Security of Elliptic Curve Diffie-Hellman
    Wei Wei
    Chen Jiazhe
    Li Dan
    Zhang Baofeng
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (08) : 1820 - 1827
  • [7] Secure bilinear Diffie-Hellman bits
    Galbraith, SD
    Hopkins, HJ
    Shparlinski, IE
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 370 - 378
  • [8] Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
    Senekane, Makhamisa
    Qhobosheane, Sehlabaka
    Taele, B. M.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 30 - 34
  • [9] A New Approach of Elliptic Curve Diffie-Hellman Key Exchange
    Mehibel, Nissa
    Hamadouche, M'hamed
    [J]. 2017 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING - BOUMERDES (ICEE-B), 2017,
  • [10] Designing Efficient Elliptic Curve Diffie-Hellman Accelerators for Embedded Systems
    Fournaris, Apostolos P.
    Zafeirakis, Loannis
    Koulamas, Christos
    Sklavos, Nicolas
    Koufopavlou, Odysseas
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 2025 - 2028