Faster pairing computation in Edwards coordinates
|
|
- Cassandra Johns
- 5 years ago
- Views:
Transcription
1 Faster pairing computation in Edwards coordinates PRISM, Université de Versailles (joint work with Antoine Joux) Journées de Codage et Cryptographie 2008
2 Edwards coordinates Á Thm: (Bernstein and Lange, 2007) Let E be an elliptic curve on F q. If E F q µ has a unique element of order 2 then there is a nonsquare d ¾ F q such that E is birationally equivalent over F q to the Edwards curve x 2 y 2 1 dx 2 y 2 Á On the Edwards curve the addition law is x 1 y 1 µ x 2 y 2 µ x1y 2 y 1 x 2 y 1 y 2 x 1 x 2 µ 1 dx 1 x 2 y 1 y 2 1 dx 1 x 2 y 1 y 2
3 Homogeneous Edwards coordinates Á In cryptographic applications one should use homogeneous Edwards coordinates, i.e. X Y Z µ corresponding to X Z Y Z µ on the Edwards curve. Á Addition becomes: X 3 Z 1 Z 2 X 0 Y 1 Y 0 X 1 µ Z 2 1 Z 2 2 dx 0X 1 Y 0 Y 1 µ Y 3 Z 1 Z 2 Y 0 Y 1 X 0 X 1 µ Z 2 1 Z 2 2 dx 0X 1 Y 0 Y 1 µ Z 3 Z 2 1 Z 2 2 dx 0X 1 Y 0 Y 1 µ Z 2 1 Z 2 2 dx 0X 1 Y 0 Y 1 µ
4 Edwards versus Jacobian Let E be an elliptic curve over F q, i.e. E y 2 x 3 ax b Á Jacobian coordinates : X Y Z µ such that X Z 2 Y Z 3 µ is a point on the elliptic curve E. Á Computations in Edwards coordinates are significantly faster than in Jacobian coordinates!
5 Edwards versus Jacobian Table: Performance evaluation: Edwards versus Jacobian Edwards coordinates Jacobian coordinates addition 10M+1S 11M+5S (plus S-M tradeoff) doubling 3M+4S 1M+8S or 4M+4S for a 3 mixed addition 9M+1S 8M+3S (Z 2 1) (plus 2 M-S tradeoffs)
6 What is a pairing? A pairing is a map e G 1 G ¼ 1 G 2 where G 1 G ¼ 1 G 2 are groups of order r such that the following hold: Á bilinear: e ap Qµ e P aqµ e P Qµ a Á non-degenerate: for every P ¾ G 1 different from 0 there is Q ¾ G ¼ 1 such that e P Qµ 1.
7 The Tate pairing. Notations. Let E be an elliptic curve over F q, i.e. E y 2 x 3 ax b Á Let r E F q µ and E r the subgroup of points of order r, i.e. E r P ¾ E F q µ rp O Á Embedding degree: k minimal with r q k 1µ. Á Note r-roots of unity r ¾ F q k. Á If k 1 then E F q k µ r E r.
8 The Tate pairing Á Choose P ¾ E r and Q ¾ E F q k µ Á Take f r P r Pµ r Oµ and D Q T µ T µ, with T such as the support of D is different from the support of f r P. Á The Tate pairing is given by T r P Qµ f r P Dµ qk 1µ r Á Domain and image are T r µ E r E F q k µ re F q k µ r
9 Miller s algorithm Á Introduce for i 1 functions f i P such as div f i P µ i Pµ ipµ i 1µ Oµ Á Note div f r P r Pµ r Oµ. Á Establish the Miller equation where l and v are such that f i j P f i P f j P l v div lµ ipµ jpµ i jµpµ 3 Oµ and div vµ i jµpµ i jµpµ 2 Oµ
10 Miller s algorithm Á Use the double and add method to compute f r P Dµ. Á Exploit the Miller equation Á l: the line through ip and jp f i j P f i P f j P l v Á v: the vertical line through i jµp. Á Evaluate at D ¼ at every step.
11 Miller s algorithm Á Count number of operations in the doubling step in the double and add method to evaluate performance of the algorithm independently from Á any faster exponentiation techniques Á the Hamming weight of r. Á Up to now best performance in Jacobian coordinates.
12 Back to Edwards curves Á Note a 4-torsion subgroup defined over F q : O 0 1µ T 4 1 0µ T 2 0 1µ T 4 1 0µ Á Take at look at the action of this subgroup on a fixed point P x yµ: P P P T 4 y xµ P T 2 x yµ P T 4 y xµ
13 Back to Edwards curves Á If xy 0 note p xyµ 2 and s x y y x to characterize the point P up to the action of the 4-torsion subgroup. Á Take E s p s 2 p 1 dpµ 2 4p and define E E s p x yµ xyµ 2 x y y x µ Á is separable of degree 4.
14 And back to an elliptic curve... Á E s p is elliptic as : s 2 p 1 dpµ 2 4p P S Z µ S 2 P Z dpµ 2 Z 4PZ 2 P 1µ s 2 z 3 2d 4µz 2 dz Á Consider the standard addition law: O s p 0 1 0µ neutral element and T 2 s p 1 0 0µ point of order 2.
15 Arithmetic of E s p Á Take P 1 and P 2 two points on E s p Á Take l s p the line passing through P 1 and P 2. Take R its third point of intersection with the curve E s p. Á Take v s p the vertical line through R. Á Define P 1 P 2 as the second point of intersection of v s p with E s p. Á Note that div l s p µ P 1 µ P 2 µ P 1 P 2 µµ 2 T 2 s p µ O s p µ and div v s p µ P 1 P 2 µ P 1 P 2 µµ 2 T 2 s p µ
16 Miller s algorithm on Edwards curves Á Consider slightly modified functions f 4µ i P : f 4µ i P i Pµ P T 4 µ P T 2 µ P T 4 µµ ipµ ip T 4 µ ip T 2 µ ip T 4 µµ i 1µ Oµ T 4 µ T 2 µ T 4 µµ Á Then f 4µ r P r Pµ P T 4µ P T 2 µ P T 4 µµ r Oµ T 4 µ T 2 µ T 4 µµ. Á Compute the 4-th power of the Tate pairing: T r P Qµ 4 f 4µ r P Dµ q k r 1
17 Miller s algorithm on the Edwards curve Establish the Miller equation: f 4µ i j P f 4µ i P f 4µ j P where l v is the function of divisor l div v µ ipµ ip T 4µ ip T 2 µ ip T 4 µµ jpµ jp T 4 µ jp T 2 µ jp T 4 µµ l v i jµpµ i jµp T 4 µ i jµp T 2 µ i jµp 0µ T 4 µ T 2 µ T 4 µµ
18 Miller s algorithm on the Edwards curve Á Let P ¼ Pµ and l s p and v s p such as div l s p µ ip ¼ µ jp ¼ µ i jµp ¼ µ 2 T 2 s p µ O s p µ and div v s p µ i jµp ¼ µ i jµp ¼ µ 2 T 2 s p µ Á Get l v l s p v s p µ.
19 Computations Á doubling for K X 1 Y 1 Z 1 µ: X 3 2X 1 Y 1 2Z1 2 X 1 2 Y 1 2 µµ Y 3 X1 2 Y 1 2 µ Y 1 2 X 1 2 µ Z 3 X1 2 Y 1 2 µ 2Z 1 2 X 1 2 Y 1 2 µµ Á computing l and v: l x yµ l 1 x yµ l 2 X1 2 Y 1 2 Z 1 2 µ X 1 2 Y 1 2 µ 2X 1 Y 1 x y y xµ 2 X1 2 Y 1 2 µµ Z 3 dz1 2 xyµ2 X1 2 Y 1 2 Z 1 2 µµµ Z 1 6 v x yµ v 1 x yµ v 2 dz3 2 xyµ2 X3 2 Y 3 2 Z 3 2 µµ Z 3 2
20 Operation count and conclusions Table: Comparison of costs Jacobian coordinates Edwards coordinates k 1 8s 12m 6s 12m Á similar analysis for k odd (although such curves are less used in practice)
21 Even embedding degree k Á Choose P such that P E F q µ Á Choose Q such as elements of Q have one coordinate defined over F q k 2 Á Compute T r P Qµ f r P Qµ qk 1µ r.
22 Operation count and conclusions Table: Comparison of costs in the case of k 2 Jacobian coordinates Jacobian coordinates for a 3 Edwards coordinates k 2 6s 7m S M 4s 8m S M 3s 10m S M Á s m costs of operations in F q and S M costs of operations in F q k
23 Operation count and conclusions Table: Comparison of costs in the case of k 4 even Jacobian coordinates Jacobian coordinates for a 3 Edwards coordinates k 4 even 6s k 6µm S M 4s k 7µm S M 3s k 9µm S M Á s m costs of operations in F q and S M costs of operations in F q k
24 Questions...?
Faster F p -arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves
Faster F p -arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves Junfeng Fan, Frederik Vercauteren and Ingrid Verbauwhede Katholieke Universiteit Leuven, COSIC May 18, 2009 1 Outline What is
More informationBackground of Pairings
Background of Pairings Tanja Lange Department of Mathematics and Computer Science Technische Universiteit Eindhoven The Netherlands tanja@hyperelliptic.org 04.09.2007 Tanja Lange Background of Pairings
More informationTampering attacks in pairing-based cryptography. Johannes Blömer University of Paderborn September 22, 2014
Tampering attacks in pairing-based cryptography Johannes Blömer University of Paderborn September 22, 2014 1 / 16 Pairings Definition 1 A pairing is a bilinear, non-degenerate, and efficiently computable
More informationEdwards Curves and the ECM Factorisation Method
Edwards Curves and the ECM Factorisation Method Peter Birkner Eindhoven University of Technology CADO Workshop on Integer Factorization 7 October 2008 Joint work with Daniel J. Bernstein, Tanja Lange and
More informationAnother approach to pairing computation in Edwards coordinates
Another approach to pairing computation in Edwards coordinates Sorina Ionica 2 and Antoine Joux 1,2 1 Université de Versailles Saint-Quentin-en-Yvelines, 45 avenue des États-Unis, 78035 Versailles CEDEX,
More informationPairings for Cryptography
Pairings for Cryptography Michael Naehrig Technische Universiteit Eindhoven Ñ ÐÖÝÔØÓ ºÓÖ Nijmegen, 11 December 2009 Pairings A pairing is a bilinear, non-degenerate map e : G 1 G 2 G 3, where (G 1, +),
More informationKatherine Stange. ECC 2007, Dublin, Ireland
in in Department of Brown University http://www.math.brown.edu/~stange/ in ECC Computation of ECC 2007, Dublin, Ireland Outline in in ECC Computation of in ECC Computation of in Definition A integer sequence
More informationAte Pairing on Hyperelliptic Curves
Ate Pairing on Hyperelliptic Curves R. Granger, F. Hess, R. Oyono, N. Thériault F. Vercauteren EUROCRYPT 2007 - Barcelona Pairings Pairings Let G 1, G 2, G T be groups of prime order l. A pairing is a
More informationParameterization of Edwards curves on the rational field Q with given torsion subgroups. Linh Tung Vo
Parameterization of Edwards curves on the rational field Q with given torsion subgroups Linh Tung Vo Email: vtlinh@bcy.gov.vn Abstract. This paper presents the basic concepts of the Edwards curves, twisted
More informationModels of Elliptic Curves
Models of Elliptic Curves Daniel J. Bernstein Tanja Lange University of Illinois at Chicago and Technische Universiteit Eindhoven djb@cr.yp.to tanja@hyperelliptic.org 26.03.2009 D. J. Bernstein & T. Lange
More informationParshuram Budhathoki FAU October 25, Ph.D. Preliminary Exam, Department of Mathematics, FAU
Parshuram Budhathoki FAU October 25, 2012 Motivation Diffie-Hellman Key exchange What is pairing? Divisors Tate pairings Miller s algorithm for Tate pairing Optimization Alice, Bob and Charlie want to
More informationAspects of Pairing Inversion
Applications of Aspects of ECC 2007 - Dublin Aspects of Applications of Applications of Aspects of Applications of Pairings Let G 1, G 2, G T be groups of prime order r. A pairing is a non-degenerate bilinear
More informationImplementing Pairing-Based Cryptosystems
Implementing Pairing-Based Cryptosystems Zhaohui Cheng and Manos Nistazakis School of Computing Science, Middlesex University White Hart Lane, London N17 8HR, UK. {m.z.cheng, e.nistazakis}@mdx.ac.uk Abstract:
More informationCyclic Groups in Cryptography
Cyclic Groups in Cryptography p. 1/6 Cyclic Groups in Cryptography Palash Sarkar Indian Statistical Institute Cyclic Groups in Cryptography p. 2/6 Structure of Presentation Exponentiation in General Cyclic
More informationA normal form for elliptic curves in characteristic 2
A normal form for elliptic curves in characteristic 2 David R. Kohel Institut de Mathématiques de Luminy Arithmetic, Geometry, Cryptography et Coding Theory 2011 CIRM, Luminy, 15 March 2011 Edwards model
More informationPairing computation on Edwards curves with high-degree twists
Pairing computation on Edwards curves with high-degree twists Liangze Li 1, Hongfeng Wu 2, Fan Zhang 1 1 LMAM, School of Mathematical Sciences, Peking University, Beijing 100871, China 2 College of Sciences,
More informationCORRESPONDENCE BETWEEN ELLIPTIC CURVES IN EDWARDS-BERNSTEIN AND WEIERSTRASS FORMS
CORRESPONDENCE BETWEEN ELLIPTIC CURVES IN EDWARDS-BERNSTEIN AND WEIERSTRASS FORMS DEPARTMENT OF MATHEMATICS AND STATISTICS UNIVERSITY OF OTTAWA SUPERVISOR: PROFESSOR MONICA NEVINS STUDENT: DANG NGUYEN
More informationarxiv:math/ v1 [math.nt] 21 Nov 2003
arxiv:math/0311391v1 [math.nt] 21 Nov 2003 IMPROVED WEIL AND TATE PAIRINGS FOR ELLIPTIC AND HYPERELLIPTIC CURVES KIRSTEN EISENTRÄGER, KRISTIN LAUTER, AND PETER L. MONTGOMERY Abstract. We present algorithms
More informationImplementing the Weil, Tate and Ate pairings using Sage software
Sage days 10, Nancy, France Implementing the Weil, Tate and Ate pairings using Sage software Nadia EL MRABET LIRMM, I3M, Université Montpellier 2 Saturday 11 th October 2008 Outline of the presentation
More informationOptimal TNFS-secure pairings on elliptic curves with even embedding degree
Optimal TNFS-secure pairings on elliptic curves with even embedding degree Georgios Fotiadis 1 and Chloe Martindale 2 1 University of the Aegean, Greece gfotiadis@aegean.gr 2 Technische Universiteit Eindhoven,
More informationArithmetic of split Kummer surfaces: Montgomery endomorphism of Edwards products
1 Arithmetic of split Kummer surfaces: Montgomery endomorphism of Edwards products David Kohel Institut de Mathématiques de Luminy International Workshop on Codes and Cryptography 2011 Qingdao, 2 June
More informationA Dierential Power Analysis attack against the Miller's Algorithm
A Dierential Power Analysis attack against the Miller's Algorithm Nadia El Mrabet (1), G. Di Natale (2) and M.L. Flottes (2) (1) Team Arith, (2) Team CCSI/LIRMM, Université Montpellier 2 Prime 2009, UCC,
More informationA Variant of Miller s Formula and Algorithm
A Variant of Miller s Formula and Algorithm John Boxall 1, Nadia El Mrabet 2, Fabien Laguillaumie 3, and Duc-Phong Le 4 1 LMNO Université de Caen Basse-Normandie, France john.boxall@unicaen.fr 2 LIASD
More informationStructure of elliptic curves and addition laws
Structure of elliptic curves and addition laws David R. Kohel Institut de Mathématiques de Luminy Barcelona 9 September 2010 Elliptic curve models We are interested in explicit projective models of elliptic
More informationOptimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
CT-RSA 2012 February 29th, 2012 Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves Joint work with: Nicolas Estibals CARAMEL project-team, LORIA, Université de Lorraine / CNRS / INRIA,
More informationFour-Dimensional GLV Scalar Multiplication
Four-Dimensional GLV Scalar Multiplication ASIACRYPT 2012 Beijing, China Patrick Longa Microsoft Research Francesco Sica Nazarbayev University Elliptic Curve Scalar Multiplication A (Weierstrass) elliptic
More informationInverted Edwards coordinates
Inverted Edwards coordinates Daniel J. Bernstein 1 and Tanja Lange 2 1 Department of Mathematics, Statistics, and Computer Science (M/C 249) University of Illinois at Chicago, Chicago, IL 60607 7045, USA
More informationPairing Computation on Elliptic Curves of Jacobi Quartic Form
Pairing Computation on Elliptic Curves of Jacobi Quartic Form Hong Wang, Kunpeng Wang, Lijun Zhang, and Bao Li {hwang,kpwang,ljzhang,lb}@is.ac.cn State Key Laboratory of Information Security Graduate University
More informationA p-adic Birch and Swinnerton-Dyer conjecture for modular abelian varieties
A p-adic Birch and Swinnerton-Dyer conjecture for modular abelian varieties Steffen Müller Universität Hamburg joint with Jennifer Balakrishnan and William Stein Rational points on curves: A p-adic and
More informationElliptic and Hyperelliptic Curve Cryptography
Elliptic and Hyperelliptic Curve Cryptography Renate Scheidler Research supported in part by NSERC of Canada Comprehensive Source Handbook of Elliptic and Hyperelliptic Curve Cryptography Overview Motivation
More informationEfficient Pairings Computation on Jacobi Quartic Elliptic Curves
Efficient Pairings Computation on Jacobi Quartic Elliptic Curves Sylvain Duquesne 1, Nadia El Mrabet 2, and Emmanuel Fouotsa 3 1 IRMAR, UMR CNRS 6625, Université Rennes 1, Campus de Beaulieu 35042 Rennes
More informationComparison of Elliptic Curve and Edwards Curve
CS90G - PROJECT REPORT Comparison of Elliptic Curve and Edwards Curve Shivapriya Hiremath, Stephanie Smith June 14, 013 1 INTRODUCTION In this project we have implemented the Elliptic Curve and Edwards
More informationFast arithmetic and pairing evaluation on genus 2 curves
Fast arithmetic and pairing evaluation on genus 2 curves David Freeman University of California, Berkeley dfreeman@math.berkeley.edu November 6, 2005 Abstract We present two algorithms for fast arithmetic
More informationSM9 identity-based cryptographic algorithms Part 1: General
SM9 identity-based cryptographic algorithms Part 1: General Contents 1 Scope... 1 2 Terms and definitions... 1 2.1 identity... 1 2.2 master key... 1 2.3 key generation center (KGC)... 1 3 Symbols and abbreviations...
More informationSpeeding up the Scalar Multiplication on Binary Huff Curves Using the Frobenius Map
International Journal of Algebra, Vol. 8, 2014, no. 1, 9-16 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2014.311117 Speeding up the Scalar Multiplication on Binary Huff Curves Using the
More informationEfficient Computation of Tate Pairing in Projective Coordinate Over General Characteristic Fields
Efficient Computation of Tate Pairing in Projective Coordinate Over General Characteristic Fields Sanjit Chatterjee, Palash Sarkar and Rana Barua Cryptology Research Group Applied Statistics Unit Indian
More informationConnecting Legendre with Kummer and Edwards
Connecting Legendre with Kummer and Edwards Sabyasachi Karati icis Lab Department of Computer Science University of Calgary Canada e-mail: sabyasachi.karati@ucalgary.ca Palash Sarkar Applied Statistics
More informationScalar multiplication in compressed coordinates in the trace-zero subgroup
Scalar multiplication in compressed coordinates in the trace-zero subgroup Giulia Bianco and Elisa Gorla Institut de Mathématiques, Université de Neuchâtel Rue Emile-Argand 11, CH-2000 Neuchâtel, Switzerland
More informationOptimised versions of the Ate and Twisted Ate Pairings
Optimised versions of the Ate and Twisted Ate Pairings Seiichi Matsuda 1, Naoki Kanayama 1, Florian Hess 2, and Eiji Okamoto 1 1 University of Tsukuba, Japan 2 Technische Universität Berlin, Germany Abstract.
More informationIntroduction to Elliptic Curve Cryptography. Anupam Datta
Introduction to Elliptic Curve Cryptography Anupam Datta 18-733 Elliptic Curve Cryptography Public Key Cryptosystem Duality between Elliptic Curve Cryptography and Discrete Log Based Cryptography Groups
More informationHyperelliptic-curve cryptography. D. J. Bernstein University of Illinois at Chicago
Hyperelliptic-curve cryptography D. J. Bernstein University of Illinois at Chicago Thanks to: NSF DMS 0140542 NSF ITR 0716498 Alfred P. Sloan Foundation Two parts to this talk: 1. Elliptic curves; modern
More informationFaster Pairings on Special Weierstrass Curves
craig.costello@qut.edu.au Queensland University of Technology Pairing 2009 Joint work with Huseyin Hisil, Colin Boyd, Juanma Gonzalez-Nieto, Kenneth Koon-Ho Wong Table of contents 1 Introduction The evolution
More informationArithmetic operators for pairing-based cryptography
7. Kryptotag November 9 th, 2007 Arithmetic operators for pairing-based cryptography Jérémie Detrey Cosec, B-IT, Bonn, Germany jdetrey@bit.uni-bonn.de Joint work with: Jean-Luc Beuchat Nicolas Brisebarre
More informationElliptic curves - Edwards curves
Elliptic curves - Edwards curves Robert Rolland May 9, 2011 ACrypTA - eriscs - IML web: http://www.acrypta.fr/ This presentation uses the Beamer L A TEXclass Robert Rolland () Elliptic curves - Edwards
More informationElliptic curves in Huff s model
Elliptic curves in Huff s model Hongfeng Wu 1, Rongquan Feng 1 College of Sciences, North China University of Technology, Beijing 1001, China whfmath@gmailcom LMAM, School of Mathematical Sciences, Peking
More informationA gentle introduction to elliptic curve cryptography
A gentle introduction to elliptic curve cryptography Craig Costello Summer School on Real-World Crypto and Privacy June 5, 2017 Šibenik, Croatia Part 1: Motivation Part 2: Elliptic Curves Part 3: Elliptic
More informationFaster Computation of the Tate Pairing
Faster Computation of the Tate Pairing Christophe Arène a, Tanja Lange,b, Michael Naehrig b,c, Christophe Ritzenthaler a a Institut de Mathématiques de Luminy 163, avenue de Luminy, Case 907 13288 Marseille
More informationNon-generic attacks on elliptic curve DLPs
Non-generic attacks on elliptic curve DLPs Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC Summer School Leuven, September 13 2013 Smith
More informationA New Model of Binary Elliptic Curves with Fast Arithmetic
A New Model of Binary Elliptic Curves with Fast Arithmetic Hongfeng Wu 1 Chunming Tang 2 and Rongquan Feng 2 1 College of Science North China University of technology Beijing 100144 PR China whfmath@gmailcom
More informationEdwards coordinates for elliptic curves, part 1
Edwards coordinates for elliptic curves, part 1 Tanja Lange Technische Universiteit Eindhoven tanja@hyperelliptic.org joint work with Daniel J. Bernstein 19.10.2007 Tanja Lange http://www.hyperelliptic.org/tanja/newelliptic/
More information2.2. The Weil Pairing on Elliptic Curves If A and B are r-torsion points on some elliptic curve E(F q d ), let us denote the r-weil pairing of A and B
Weil Pairing vs. Tate Pairing in IBE systems Ezra Brown, Eric Errthum, David Fu October 10, 2003 1. Introduction Although Boneh and Franklin use the Weil pairing on elliptic curves to create Identity-
More informationReprésentation RNS des nombres et calcul de couplages
Représentation RNS des nombres et calcul de couplages Sylvain Duquesne Université Rennes 1 Séminaire CCIS Grenoble, 7 Février 2013 Sylvain Duquesne (Rennes 1) RNS et couplages Grenoble, 07/02/13 1 / 29
More informationarxiv: v3 [cs.cr] 5 Aug 2014
Further Refinements of Miller Algorithm on Edwards curves Duc-Phong Le, Chik How Tan Temasek Laboratories, National University of Singapore 5A Engineering Drive 1, #09-02, Singapore 117411. arxiv:1305.2694v3
More informationSelecting Elliptic Curves for Cryptography Real World Issues
Selecting Elliptic Curves for Cryptography Real World Issues Michael Naehrig Cryptography Research Group Microsoft Research UW Number Theory Seminar Seattle, 28 April 2015 Elliptic Curve Cryptography 1985:
More informationChapter 10 Elliptic Curves in Cryptography
Chapter 10 Elliptic Curves in Cryptography February 15, 2010 10 Elliptic Curves (ECs) can be used as an alternative to modular arithmetic in all applications based on the Discrete Logarithm (DL) problem.
More informationElliptic Nets With Applications to Cryptography
Elliptic Nets With Applications to Cryptography Katherine Stange Brown University http://www.math.brown.edu/~stange/ Elliptic Divisibility Sequences: Seen In Their Natural Habitat Example Elliptic Divisibility
More informationHyperelliptic Curve Cryptography
Hyperelliptic Curve Cryptography A SHORT INTRODUCTION Definition (HEC over K): Curve with equation y 2 + h x y = f x with h, f K X Genus g deg h(x) g, deg f x = 2g + 1 f monic Nonsingular 2 Nonsingularity
More informationRational Points on Curves
Rational Points on Curves 1 Q algebraic closure of Q. k a number field. Ambient variety: Elliptic curve E an elliptic curve defined over Q. E N = E E. In general A an abelian variety defined over Q. For
More informationConstructing genus 2 curves over finite fields
Constructing genus 2 curves over finite fields Kirsten Eisenträger The Pennsylvania State University Fq12, Saratoga Springs July 15, 2015 1 / 34 Curves and cryptography RSA: most widely used public key
More informationOn a new generalization of Huff curves
On a new generalization of Huff curves Abdoul Aziz Ciss and Djiby Sow École doctorale de Mathématiques et d Informatique, Université Cheikh Anta Diop de Dakar, Sénégal BP: 5005, Dakar Fann abdoul.ciss@ucad.edu.sn,sowdjibab@ucad.sn
More informationGENERATORS OF JACOBIANS OF GENUS TWO CURVES
GENERATORS OF JACOBIANS OF GENUS TWO CURVES CHRISTIAN ROBENHAGEN RAVNSHØJ Abstract. We prove that in most cases relevant to cryptography, the Frobenius endomorphism on the Jacobian of a genus two curve
More informationECM at Work. Joppe W. Bos 1 and Thorsten Kleinjung 2. 1 Microsoft Research, Redmond, USA
ECM at Work Joppe W. Bos 1 and Thorsten Kleinjung 2 1 Microsoft Research, Redmond, USA 2 Laboratory for Cryptologic Algorithms, EPFL, Lausanne, Switzerland 1 / 18 Security assessment of public-key cryptography
More informationTwisted Jacobi Intersections Curves
Twisted Jacobi Intersections Curves Rongquan Feng 1, Menglong Nie 1, Hongfeng Wu 2 1 LMAM, School of Mathematical Sciences, Peking University, Beijing 100871, P.R. China 2 Academy of Mathematics and Systems
More informationWeil pairing. Algant: Regensburg and Leiden Elliptic curves and Weil conjectures seminar, Regensburg. Wednesday 22 nd June, 2016.
Weil pairing Jana Sotáková Algant: Regensburg and Leiden Elliptic curves and Weil conjectures seminar, Regensburg Wednesday 22 nd June, 2016 Abstract In this talk we are mainly invested in constructing
More informationEfficient Tate Pairing Computation Using Double-Base Chains
Efficient Tate Pairing Computation Using Double-Base Chains Chang an Zhao, Fangguo Zhang and Jiwu Huang 1 Department of Electronics and Communication Engineering, Sun Yat-Sen University, Guangzhou 510275,
More informationPairings on Generalized Huff Curves
Pairings on Generalized Huff Curves Abdoul Aziz Ciss and Djiby Sow Laboratoire d Algèbre, Codage, Cryptologie, Algèbre et Applications Université Cheikh Anta Diop de Dakar, Sénégal BP: 5005, Dakar Fann
More informationSome Efficient Algorithms for the Final Exponentiation of η T Pairing
Some Efficient Algorithms for the Final Exponentiation of η T Pairing Masaaki Shirase 1, Tsuyoshi Takagi 1, and Eiji Okamoto 2 1 Future University-Hakodate, Japan 2 University of Tsukuba, Japan Abstract.
More informationDefinition of a finite group
Elliptic curves Definition of a finite group (G, * ) is a finite group if: 1. G is a finite set. 2. For each a and b in G, also a * b is in G. 3. There is an e in G such that for all a in G, a * e= e *
More informationEfficient computation of pairings on Jacobi quartic elliptic curves
J. Math. Cryptol., Ahead of Print DOI 10.1515/jmc-2013-0033 de Gruyter 2014 Efficient computation of pairings on Jacobi quartic elliptic curves Sylvain Duquesne, Nadia El Mrabet and Emmanuel Fouotsa Communicated
More informationWhat About Vulnerability to a Fault Attack of the Miller s Algorithm during an Identity Based Protocol?
What About Vulnerability to a Fault Attack of the Miller s Algorithm during an Identity Based Protocol? Nadia EL MRABET LIRMM Laboratory, I3M, CNRS, University Montpellier 2, 161, rue Ada, 34 392 Montpellier,
More informationCover and Decomposition Index Calculus on Elliptic Curves made practical
Cover and Decomposition Index Calculus on Elliptic Curves made practical Application to a previously unreachable curve over F p 6 Vanessa VITSE Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire
More informationMath 246, Spring 2011, Professor David Levermore
Math 246, Spring 2011, Professor David Levermore 7. Exact Differential Forms and Integrating Factors Let us ask the following question. Given a first-order ordinary equation in the form 7.1 = fx, y, dx
More informationConstructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography
Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography Naomi Benger and Michael Scott, 1 School of Computing, Dublin City University, Ireland nbenger@computing.dcu.ie
More informationPairings at High Security Levels
Pairings at High Security Levels Michael Naehrig Eindhoven University of Technology michael@cryptojedi.org DoE CRYPTODOC Darmstadt, 21 November 2011 Pairings are efficient!... even at high security levels.
More informationAnalysis of Optimum Pairing Products at High Security Levels
Analysis of Optimum Pairing Products at High Security Levels Xusheng Zhang and Dongdai Lin Institute of Software, Chinese Academy of Sciences Institute of Information Engineering, Chinese Academy of Sciences
More informationPARAMETRIZATIONS FOR FAMILIES OF ECM-FRIENDLY CURVES
PARAMETRIZATIONS FOR FAMILIES OF ECM-FRIENDLY CURVES ALEXANDRE GÉLIN, THORSTEN KLEINJUNG, AND ARJEN K. LENSTRA Abstract. We provide a new family of elliptic curves that results in a one to two percent
More informationFaster Group Operations on Elliptic Curves
Faster Group Operations on Elliptic Curves Huseyin Hisil 1 Kenneth Koon-Ho Wong 1 Gary Carter 1 Ed Dawson 1 1 Information Security Institute, Queensland University of Technology, Brisbane, QLD, Australia,
More informationDiscrete Logarithm Computation in Hyperelliptic Function Fields
Discrete Logarithm Computation in Hyperelliptic Function Fields Michael J. Jacobson, Jr. jacobs@cpsc.ucalgary.ca UNCG Summer School in Computational Number Theory 2016: Function Fields Mike Jacobson (University
More informationAn Introduction to Pairings in Cryptography
An Introduction to Pairings in Cryptography Craig Costello Information Security Institute Queensland University of Technology INN652 - Advanced Cryptology, October 2009 Outline 1 Introduction to Pairings
More informationThe Weil Pairing on Elliptic Curves and Its Cryptographic Applications
UNF Digital Commons UNF Theses and Dissertations Student Scholarship 2011 The Weil Pairing on Elliptic Curves and Its Cryptographic Applications Alex Edward Aftuck University of North Florida Suggested
More informationECM at Work. Joppe W. Bos and Thorsten Kleinjung. Laboratory for Cryptologic Algorithms EPFL, Station 14, CH-1015 Lausanne, Switzerland 1 / 14
ECM at Work Joppe W. Bos and Thorsten Kleinjung Laboratory for Cryptologic Algorithms EPFL, Station 14, CH-1015 Lausanne, Switzerland 1 / 14 Motivation The elliptic curve method for integer factorization
More informationAn Analysis of Affine Coordinates for Pairing Computation
An Analysis of Affine Coordinates for Pairing Computation Kristin Lauter, Peter L. Montgomery, and Michael Naehrig Microsoft Research, One Microsoft Way, Redmond, WA 98052, USA {klauter, petmon, mnaehrig}@microsoft.com
More informationSide-channel attacks and countermeasures for curve based cryptography
Side-channel attacks and countermeasures for curve based cryptography Tanja Lange Technische Universiteit Eindhoven tanja@hyperelliptic.org 28.05.2007 Tanja Lange SCA on curves p. 1 Overview Elliptic curves
More informationThe Eta Pairing Revisited
1 The Eta Pairing Revisited F. Hess, N.P. Smart and F. Vercauteren Abstract In this paper we simplify and extend the Eta pairing, originally discovered in the setting of supersingular curves by Baretto
More informationEfficient Application of Countermeasures for Elliptic Curve Cryptography
Efficient Application of Countermeasures for Elliptic Curve Cryptography Vladimir Soukharev, Ph.D. Basil Hess, Ph.D. InfoSec Global Inc. May 19, 2017 Outline Introduction Brief Summary of ECC Arithmetic
More informationIntroduction to Arithmetic Geometry
Introduction to Arithmetic Geometry 18.782 Andrew V. Sutherland September 5, 2013 What is arithmetic geometry? Arithmetic geometry applies the techniques of algebraic geometry to problems in number theory
More informationElliptic Curves I. The first three sections introduce and explain the properties of elliptic curves.
Elliptic Curves I 1.0 Introduction The first three sections introduce and explain the properties of elliptic curves. A background understanding of abstract algebra is required, much of which can be found
More informationPerformance evaluation of a new coordinate system for elliptic curves
Performance evaluation of a new coordinate system for elliptic curves Daniel J. Bernstein 1 and Tanja Lange 2 1 Department of Mathematics, Statistics, and Computer Science (M/C 249) University of Illinois
More informationHidden pairings and trapdoor DDH groups. Alexander W. Dent Joint work with Steven D. Galbraith
Hidden pairings and trapdoor DDH groups Alexander W. Dent Joint work with Steven D. Galbraith 2 Pairings in cryptography Elliptic curves have become an important tool in cryptography and pairings have
More informationEfficient Computation for Pairing Based
Provisional chapter Chapter 3 Efficient Computation for Pairing Based Cryptography: Efficient Computation A Statefor ofpairing the Art Based Cryptography: A State of the Art Nadia El Mrabet Nadia El Mrabet
More informationConstructing Abelian Varieties for Pairing-Based Cryptography
for Pairing-Based CWI and Universiteit Leiden, Netherlands Workshop on Pairings in Arithmetic Geometry and 4 May 2009 s MNT MNT Type s What is pairing-based cryptography? Pairing-based cryptography refers
More informationABHELSINKI UNIVERSITY OF TECHNOLOGY
Identity-Based Cryptography T-79.5502 Advanced Course in Cryptology Billy Brumley billy.brumley at hut.fi Helsinki University of Technology Identity-Based Cryptography 1/24 Outline Classical ID-Based Crypto;
More informationA p-adic Birch and Swinnerton-Dyer conjecture for modular abelian varieties
A p-adic Birch and Swinnerton-Dyer conjecture for modular abelian varieties Steffen Müller Universität Hamburg joint with Jennifer Balakrishnan (Harvard) and William Stein (U Washington) Forschungsseminar
More informationElliptic Curves Spring 2013 Lecture #12 03/19/2013
18.783 Elliptic Curves Spring 2013 Lecture #12 03/19/2013 We now consider our first practical application of elliptic curves: factoring integers. Before presenting the elliptic curve method (ECM) for factoring
More informationGenerating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves
Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves Ezekiel J Kachisa School of Computing Dublin City University Ireland ekachisa@computing.dcu.ie Abstract. Constructing pairing-friendly
More informationConstructing Pairing-Friendly Elliptic Curves for Cryptography
Constructing Pairing-Friendly Elliptic Curves for Cryptography University of California, Berkeley, USA 2nd KIAS-KMS Summer Workshop on Cryptography Seoul, Korea 30 June 2007 Outline 1 Pairings in Cryptography
More informationOne can use elliptic curves to factor integers, although probably not RSA moduli.
Elliptic Curves Elliptic curves are groups created by defining a binary operation (addition) on the points of the graph of certain polynomial equations in two variables. These groups have several properties
More informationDistinguishing prime numbers from composite numbers: the state of the art. D. J. Bernstein University of Illinois at Chicago
Distinguishing prime numbers from composite numbers: the state of the art D. J. Bernstein University of Illinois at Chicago Is it easy to determine whether a given integer is prime? If easy means computable
More informationEfficient Implementation of Cryptographic pairings. Mike Scott Dublin City University
Efficient Implementation of Cryptographic pairings Mike Scott Dublin City University First Steps To do Pairing based Crypto we need two things l Efficient algorithms l Suitable elliptic curves We have
More informationABEL S THEOREM BEN DRIBUS
ABEL S THEOREM BEN DRIBUS Abstract. Abel s Theorem is a classical result in the theory of Riemann surfaces. Important in its own right, Abel s Theorem and related ideas generalize to shed light on subjects
More information