Implementation of Pollard Rho Attack on Elliptic Curve Cryptography over Binary Fields

被引:1
|
作者
Wienardo [1 ]
Yuliawan, Fajar [2 ]
Muchtadi-Alamsyah, Intan [2 ]
Rahardjo, Budi [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung 40132, Indonesia
[2] Inst Teknol Bandung, Fac Math & Nat Sci, Algebra Res Grp, Jalan Ganesha 10, Bandung 40132, Indonesia
关键词
D O I
10.1063/1.4930641
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Elliptic Curve Cryptography (ECC) is a public key cryptosystem with a security level determined by discrete logarithm problem called Elliptic Curve Discrete Logarithm Problem (ECDLP). John M. Pollard proposed an algorithm for discrete logarithm problem based on Monte Carlo method and known as Pollard Rho algorithm. The best current brute-force attack for ECC is Pollard Rho algorithm. In this research we implement modified Pollard Rho algorithm on ECC over GF (2(41)). As the result, the runtime of Pollard Rho algorithm increases exponentially with the increase of the ECC key length. This work also presents the estimated runtime of Pollard Rho attack on ECC over longer bits.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Novel fault attack resistant architecture for elliptic curve cryptography
    Zode, Pravin
    Deshmukh, Raghavendra
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 84
  • [42] Improvement and Implementation of One Elliptic Curve Cryptography Algorithm
    Kong, Qingyan
    INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT (EBM2011), VOLS 1-6, 2011, : 2438 - 2440
  • [43] An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
    Pandey, Jai Gopal
    Mitharwal, Chhavi
    Karmakar, Abhijit
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 66 - 72
  • [44] EFFICIENT IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY IN WIRELESS SENSORS
    Aranha, Diego F.
    Dahab, Richardo
    Lopez, Julio
    Oliveira, Leonardo B.
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2010, 4 (02) : 169 - 187
  • [45] Implementation of Text Encryption using Elliptic Curve Cryptography
    Singh, Laiphrakpam Dolendro
    Singh, Khumanthem Manglem
    ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 73 - 82
  • [46] Algorithm and implementation of elliptic curve public key cryptography
    Gong, Shu
    Liu, Wenjiang
    Rong, Mengtian
    Gaojishu Tongxin/High Technology Letters, 2004, 14 (03):
  • [47] Demystifying elliptic curve cryptography : Curve selection, implementation and countermeasures to attacks
    Dhanda, Sumit Singh
    Singh, Brahmjit
    Jindal, Poonam
    JOURNAL OF INTERDISCIPLINARY MATHEMATICS, 2020, 23 (02) : 463 - 470
  • [48] Pollard Rho Algorithm for Elliptic Curves Over with Negation and Frobenius Map
    Muchtadi-Alamsyah, Intan
    Ardiansyah, Tomy
    Carita, Sa'aadah Sajjana
    ADVANCED SCIENCE LETTERS, 2014, 20 (01) : 340 - 343
  • [49] Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields
    Yang, Guoqiang
    Kong, Fanyu
    Xu, Qiuliang
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 243 - 249
  • [50] Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields
    Li, Xingran
    Yu, Wei
    Li, Bao
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)