Analysis of the Xedni calculus attack

被引:21
|
作者
Jacobson, MJ [1 ]
Koblitz, N [1 ]
Silverman, JH [1 ]
Stein, A [1 ]
Teske, E [1 ]
机构
[1] Univ Waterloo, Ctr Appl Cryptog Res, Waterloo, ON N2L 3G1, Canada
关键词
elliptic curve; discrete logarithm; Xedni calculus;
D O I
10.1023/A:1008312401197
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The xedni calculus attack on the elliptic curve discrete logarithm problem (ECDLP) involves lifting points from the finite field F-p to the rational numbers Q and then constructing an elliptic curve over Q that passes through them. If the lifted points are linearly dependent, then the ECDLP is solved. Our purpose is to analyze the practicality of this algorithm. We find that asymptotically the algorithm is virtually certain to fail, because of an absolute bound on the size of the coefficients of a relation satisfied by the lifted points. Moreover, even for smaller values of p experiments show that the odds against finding a suitable lifting are prohibitively high.
引用
收藏
页码:41 / 64
页数:24
相关论文
共 50 条
  • [1] Analysis of the Xedni Calculus Attack
    Michael J. Jacobson
    Neal Koblitz
    Joseph H. Silverman
    Andreas Stein
    Edlyn Teske
    Designs, Codes and Cryptography, 2000, 20 : 41 - 64
  • [2] The Xedni Calculus and the Elliptic Curve Discrete Logarithm Problem
    Joseph H. Silverman
    Designs, Codes and Cryptography, 2000, 20 : 5 - 40
  • [3] The Xedni calculus and the elliptic curve discrete logarithm problem
    Silverman, JH
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 20 (01) : 5 - 40
  • [4] Computing prime factorization and discrete logarithms: From index calculus to xedni calculus
    Yan, SY
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2003, 80 (05) : 573 - 590
  • [5] A fast calculus for the linearizing attack and its application to an attack on KASUMI
    Sugio, N
    Nambu, S
    Kaneko, T
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2006, 3857 : 163 - 172
  • [6] A Proof Calculus for Attack Trees in Isabelle
    Kammueller, Florian
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 3 - 18
  • [7] Index calculus attack for hyperelliptic curves of small genus
    Thériault, N
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 75 - 92
  • [8] ANALYSIS OF CALCULUS
    DAUDON, M
    REVEILLAUD, RJ
    GAZETTE MEDICALE, 1985, 92 (02): : 31 - 34
  • [9] A cost estimation calculus for analyzing the resistance to denial-of-service attack
    Tomioka, D
    Nishizaki, S
    Ikeda, R
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 25 - 44
  • [10] ANALYSIS OF URINARY CALCULUS
    ASPER, R
    SCHMUCKI, O
    THERAPEUTISCHE UMSCHAU, 1980, 37 (05) : 342 - 347