Implementation of Pollard Rho Attack on Elliptic Curve Cryptography over Binary Fields

被引:1
|
作者
Wienardo [1 ]
Yuliawan, Fajar [2 ]
Muchtadi-Alamsyah, Intan [2 ]
Rahardjo, Budi [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung 40132, Indonesia
[2] Inst Teknol Bandung, Fac Math & Nat Sci, Algebra Res Grp, Jalan Ganesha 10, Bandung 40132, Indonesia
关键词
D O I
10.1063/1.4930641
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Elliptic Curve Cryptography (ECC) is a public key cryptosystem with a security level determined by discrete logarithm problem called Elliptic Curve Discrete Logarithm Problem (ECDLP). John M. Pollard proposed an algorithm for discrete logarithm problem based on Monte Carlo method and known as Pollard Rho algorithm. The best current brute-force attack for ECC is Pollard Rho algorithm. In this research we implement modified Pollard Rho algorithm on ECC over GF (2(41)). As the result, the runtime of Pollard Rho algorithm increases exponentially with the increase of the ECC key length. This work also presents the estimated runtime of Pollard Rho attack on ECC over longer bits.
引用
下载
收藏
页数:4
相关论文
共 50 条
  • [31] Parallel architectures for elliptic curve cryptoprocessors over binary extension fields
    Antola, A
    Bertoni, G
    Breveglieri, L
    Maistri, P
    PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 802 - 805
  • [32] High-performance elliptic curve cryptography processor over NIST prime fields
    Hossain, Md Selim
    Kong, Yinan
    Saeedi, Ehsan
    Vayalil, Niras C.
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2017, 11 (01): : 33 - 42
  • [33] A compact FPGA-based architecture for elliptic curve cryptography over prime fields
    Vliegen, Jo
    Mentens, Nele
    Genoe, Jan
    Braeken, An
    Kubera, Serge
    Touhafi, Abdellah
    Verbauwhede, Ingrid
    21ST IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2010,
  • [34] A simple architectural enhancement for fast and flexible elliptic curve cryptography over binary finite fields GF(2m)
    Tillich, S
    Grossschädl, J
    ADVANCES IN COMPUTER SYSTEMS ARCHITECTURE, PROCEEDINGS, 2004, 3189 : 282 - 295
  • [35] Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET
    Shukla, Mukul
    Joshi, Brijendra Kumar
    Singh, Upendra
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 121 (01) : 503 - 526
  • [36] Side Channel Attack Resistant Architecture for Elliptic Curve Cryptography
    Zode, Pravin
    Deshmukh, Raghavendra B.
    2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
  • [37] REAL TIME IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY OVER A OPEN SOURCE VOIP SERVER
    Subashri, T.
    Arjun, A.
    Ashok, S.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [38] Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET
    Mukul Shukla
    Brijendra Kumar Joshi
    Upendra Singh
    Wireless Personal Communications, 2021, 121 : 503 - 526
  • [39] Elliptic Curve Cryptography:: Java']Java implementation issues
    Martínez, VG
    Sánchez-Avila, C
    García, JE
    Encinas, LH
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 238 - 241
  • [40] A Flexible and Scalable Implementation of Elliptic Curve Cryptography over GF(p) based on ASIP
    Qin, Yao
    Wang, Hua
    Jia, Zhiping
    Xia, Hui
    2016 IEEE 35TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2016,