Implementation of Pollard Rho Attack on Elliptic Curve Cryptography over Binary Fields

被引:1
|
作者
Wienardo [1 ]
Yuliawan, Fajar [2 ]
Muchtadi-Alamsyah, Intan [2 ]
Rahardjo, Budi [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung 40132, Indonesia
[2] Inst Teknol Bandung, Fac Math & Nat Sci, Algebra Res Grp, Jalan Ganesha 10, Bandung 40132, Indonesia
关键词
D O I
10.1063/1.4930641
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Elliptic Curve Cryptography (ECC) is a public key cryptosystem with a security level determined by discrete logarithm problem called Elliptic Curve Discrete Logarithm Problem (ECDLP). John M. Pollard proposed an algorithm for discrete logarithm problem based on Monte Carlo method and known as Pollard Rho algorithm. The best current brute-force attack for ECC is Pollard Rho algorithm. In this research we implement modified Pollard Rho algorithm on ECC over GF (2(41)). As the result, the runtime of Pollard Rho algorithm increases exponentially with the increase of the ECC key length. This work also presents the estimated runtime of Pollard Rho attack on ECC over longer bits.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Software implementation of elliptic curve cryptography over binary fields
    Hankerson, D
    Hernandez, JL
    Menezes, A
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS-CHES 2000, PROCEEDINGS, 2001, 1965 : 1 - 24
  • [2] High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields
    Liu, Shuai
    Ju, Lei
    Cai, Xiaojun
    Jia, Zhiping
    Zhang, Zhiyong
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 148 - 155
  • [3] Improving Pollard's Rho Attack on Elliptic Curve Cryptosystems
    Ezzouak, Siham
    Elamrani, Mohammed
    Azizi, Abdelmalek
    [J]. 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 924 - 928
  • [4] Implementation of Elliptic Curve Cryptography in Binary Field
    Susantio, D. R.
    Muchtadi-Alamsyah, I.
    [J]. 4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710
  • [5] Implementation of Pollard Rho over binary fields using Brent Cycle Detection Algorithm
    Muchtadi-Alamsyah, Intan
    Utomo, Taufiq Akbari
    [J]. ASIAN MATHEMATICAL CONFERENCE 2016 (AMC 2016), 2017, 893
  • [6] Fast software implementation of binary elliptic curve cryptography
    Bluhm, Manuel
    Gueron, Shay
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2015, 5 (03) : 215 - 226
  • [7] Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields
    Seo, Hwajeong
    Liu, Zhe
    Choi, Jongseok
    Kim, Howon
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3121 - 3130
  • [8] Optimized quantum implementation of elliptic curve arithmetic over binary fields
    Kaye, PR
    [J]. QUANTUM INFORMATION & COMPUTATION, 2005, 5 (06) : 474 - 491
  • [9] Low latency elliptic curve cryptography accelerators for NIST curves over binary fields
    Shu, C
    Gaj, K
    Ei-Ghazawi, T
    [J]. FPT 05: 2005 IEEE INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2005, : 309 - 310
  • [10] A performance evaluation of ARM ISA extension for elliptic curve cryptography over binary finite fields
    Bartolini, S
    Branovic, I
    Giorgi, R
    Martinelli, E
    [J]. 16TH SYMPOSIUM ON COMPUTER ARCHITECTURE AND HIGH PERFORMANCE COMPUTING, PROCEEDINGS, 2004, : 238 - 245