The point decomposition problem in Jacobian varieties
|
|
- Ashley Marsh
- 6 years ago
- Views:
Transcription
1 The point decomposition problem in Jacobian varieties Alexandre Wallet ENS Lyon, Laboratoire LIP, Equipe AriC 1 / 38
2 1 Generalities Discrete Logarithm Problem Short State-of-the-Art for curves About Index-Calculus 2 Harvesting and Decomposition attacks 3 Degree reduction and practical computations 4 Summation Ideals 5 A geometric recreation: harvesting by sieving 2 / 38
3 Discrete Logarithm Problem (DLP) Let g, h = [x] g (G, +), with x Z. Compute x. Is this a hard problem? Classic Generic group: yes For some groups: no Cryptography: yes Quantum NO Security basis for Diffie-Hellman, El-Gamal, Digital Signatures,... Today s groups: Elliptic curves E(F q ) Jacobian of algebraic curves J Fq (C) 3 / 38
4 Computing Discrete Logs exp. time Generic alg. lower bound: DLP ON CURVES : genus : #Field Index Calculus "Small genus" Decomposition Baby-steps Giant-steps -Pollard subexp. time ~ [G'00], [D'07] [GTTD'07] "Large genus" [G'09,D'11],[N'10] [GTTD'07] "Large degree" poly. time [ADH'99], [EGS'02] [EGTT'13] 4 / 38
5 Situation for elliptic curves For cryptography: mostly elliptic curves (g = 1) Elliptic curves over prime fields over extension fields Generic only Decomposition attacks Transfer attacks Higher genus Finite field 5 / 38
6 About Index-Calculus : algebraic curve : Jacobian variety of Inputs 1) Select Factor base too small: harvesting too hard trade-off [GTTD'07] too big: linear algebra too long Harvesting 2) Find relations: T sparse matrix + easy to enumerate + elements should be "small" Several techniques Today: over done by solving polynomial systems Linear Algebra 1) Compute s.t. (aka: Decomposition attacks) Complexity 2) Use to retrieve linalg ~ well-known Discrete Logarithm harvest. ~ x Find 1 relation What about this? 6 / 38
7 Today s target: harvesting in Index-Calculus for curves over F q n. Motivations: Algorithmic Number Theory Computational Algebraic Geometry Cryptography Compute discrete logs in abelian varieties. How efficient can we be? Transfer attacks! 7 / 38
8 1 Generalities 2 Harvesting and Decomposition attacks What is a relation? How to find a relation? Complexity and Polynomial System Solving 3 Degree reduction and practical computations 4 Summation Ideals 5 A geometric recreation: harvesting by sieving 8 / 38
9 Algebraic curves, Jacobian varieties, group law C : P(x, y) = 0, for some P F q [X, Y ], algebraic curve of genus g. g = 1: elliptic: y 2 = x 3 + Ax + B, A, B F q g = 2: hyperelliptic: y 2 + h 1 (x)y = x h 1 F q [x], deg h 1 2 g 3: hyperelliptic: y 2 + h 1 (x)y = x 2g h 1 F q [x], deg h 1 g Non-hyperelliptic (all the rest). 9 / 38
10 Algebraic curves, Jacobian varieties, group law C : P(x, y) = 0, for some P F q [X, Y ], algebraic curve of genus g. Fix a point O. J (C): Jacobian variety J (C) is a quotient group. Its elements are reduced divisors. In practice, a reduced divisor is D = k P i ko. i=1 for some P 1,..., P k C, k g Ex: g = 1, E elliptic, point at infinity O P 3 Line through P 1, P 2 : f (x, y) = 0. In J (E) : P 1 + P 2 +P 3 3O = 0, so that (P 1 O) + (P 2 O) = ([ P 3 ] O). P 1 P 2 P 3 9 / 38
11 Algebraic curves, Jacobian varieties, group law C : P(x, y) = 0, for some P F q [X, Y ], algebraic curve of genus g. Fix a point O. J (C): Jacobian variety J (C) is a quotient group. Its elements are reduced divisors. In practice, a reduced divisor is D = k P i ko. i=1 for some P 1,..., P k C, k g Ex: g = 2, H hyperelliptic, point at infinity O Cubic through P 1,..., P 4 : f (x, y) = 0 In J (H) : P 1 + +P 6 6O = 0 P 5 P 6 P 4 so that: (P 1 + P 2 2O) }{{} + (P 3 + P 4 2O) }{{} D 1 + D 2 = [ P 5 ] + [ P 6 ] 2O }{{} D 3 P 2 P 1 P 6 P 3 P 5 9 / 38
12 Geometry of relations Point m-decomposition Problem (PDP m ) Let H be a curve of genus g, R J (H) and F J (H). Find, if possible, D 1,..., D m F s.t. R = D D m. Harvesting = solving multiple PDP m instances, for some fixed m. 10 / 38
13 Geometry of relations Point m-decomposition Problem (PDP m ) Let H be a curve of genus g, R J (H) and F J (H). Find, if possible, D 1,..., D m F s.t. R = D D m. Harvesting = solving multiple PDP m instances, for some fixed m. Let R = i (x R i, y Ri ) go J (H). R = i,j (x D ij, y Dij ) mgo f (x, y) s.t.: f (x Ri, y Ri ) = f (x Dij, y Dij ) = 0. Such f s form a linear space of finite dim: f Span(f 1,..., f d ) f = d a i f i i=1 Goal: find (a i ) i d. 10 / 38
14 Geometry of relations Point m-decomposition Problem (PDP m ) Let H be a curve of genus g, R J (H) and F J (H). Find, if possible, D 1,..., D m F s.t. R = D D m. Harvesting = solving multiple PDP m instances, for some fixed m. Let R = i (x R i, y Ri ) go J (H). R = i,j (x D ij, y Dij ) mgo f (x, y) s.t.: Ex: g = 2 and m = 2 D i = D i1 + D i2 2O. f (x Ri, y Ri ) = f (x Dij, y Dij ) = 0. Such f s form a linear space of finite dim: f Span(f 1,..., f d ) f = d a i f i i=1 Goal: find (a i ) i d. R 1 R 2 10 / 38
15 Geometry of relations Point m-decomposition Problem (PDP m ) Let H be a curve of genus g, R J (H) and F J (H). Find, if possible, D 1,..., D m F s.t. R = D D m. Harvesting = solving multiple PDP m instances, for some fixed m. Let R = i (x R i, y Ri ) go J (H). R = i,j (x D ij, y Dij ) mgo f (x, y) s.t.: Ex: g = 2 and m = 2 D i = D i1 + D i2 2O. f (x Ri, y Ri ) = f (x Dij, y Dij ) = 0. Such f s form a linear space of finite dim: f Span(f 1,..., f d ) f = d a i f i i=1 Goal: find (a i ) i d. D 12 R 1 D 11 D 21 D 22 R 2 10 / 38
16 Solving PDP m [G 09], [N 10], [D 11] Goal: Find (a i ) i d in a smart way Assume base field is F q n = Span Fq (1, t,..., t n 1 ) 11 / 38
17 Solving PDP m [G 09], [N 10], [D 11] Goal: Find (a i ) i d in a smart way Assume base field is F q n = Span Fq (1, t,..., t n 1 ) Restriction of scalars Write x = j x j t j, x j F q, x = (x 1,..., x n): (x, y) H ( x, ȳ) W where W: Weil Restriction of H over F q Factor base: F = {P O : P H, x(p) F q} = W {x j = 0} j>0 11 / 38
18 Solving PDP m [G 09], [N 10], [D 11] Goal: Find (a i ) i d in a smart way Assume base field is F q n = Span Fq (1, t,..., t n 1 ) Restriction of scalars Write x = j x j t j, x j F q, x = (x 1,..., x n): (x, y) H ( x, ȳ) W where W: Weil Restriction of H over F q Factor base: F = {P O : P H, x(p) F q} = W {x j = 0} j>0 Decomposition Polynomial DP R Resy (H, f ) DP R (x) = (x xri ) = xm + m 1 N i ((a i ))x i i=0 If f describes R = i,j (x ij, y ij ) mo: DP R (x ij ) = 0, i m, j n 1 Write N i ((a i )) = j 0 N ij ((ā i ))t j : D 1,..., D m F DP R (x) F q[x] N ij ((ā i )) = 0, i, j > 0 11 / 38
19 Solving PDP m [G 09], [N 10], [D 11] Goal: Find (a i ) i d in a smart way Assume base field is F q n = Span Fq (1, t,..., t n 1 ) Restriction of scalars Write x = j x j t j, x j F q, x = (x 1,..., x n): (x, y) H ( x, ȳ) W where W: Weil Restriction of H over F q Factor base: F = {P O : P H, x(p) F q} = W {x j = 0} j>0 Decomposition Polynomial DP R Resy (H, f ) DP R (x) = (x xri ) = xm + m 1 N i ((a i ))x i i=0 If f describes R = i,j (x ij, y ij ) mo: DP R (x ij ) = 0, i m, j n 1 Write N i ((a i )) = j 0 N ij ((ā i ))t j : D 1,..., D m F DP R (x) F q[x] N ij ((ā i )) = 0, i, j > 0 Finding relations solving Polynomial systems. For m = ng, {N ij (ā i ) = 0} i m,j>0 is generally 0-dimensional. 11 / 38
20 Solving 0-dimensional systems with Gröbner Bases tools Original System DRL Basis F4, F5 Change order FGLM Univariate Solving n variables s equations : degree of regularity D: #solutions O(s ( ) n+ ω) O(nD ω ) ω: lin. alg. exponent 12 / 38
21 Solving 0-dimensional systems with Gröbner Bases tools Original System DRL Basis F4, F5 Change order FGLM Univariate Solving n variables s equations : degree of regularity D: #solutions O(s ( ) n+ ω) O(nD ω ) In PDP ng setting F q n, genus g = Õ(D1/n ) D = 2 n(n 1)g 1 relation costs O((ng)!D ω ) + Proba that all roots of DP R in F q 1/(ng)! D is the main complexity parameter. Can we reduce it? 12 / 38
22 Situation Known reductions: [FGHR 14], [FHJRV 14], [GG 14] Uses Summation polynomials and symmetries (invariant theory) Higher genus: No reduction known before only for g = 1 (elliptic curves). Ex: g = 2, n = 3, log q = 15 Find 1 relation 12 days. Contributions 1 : Reduction of D for hyperelliptic curves of all genus, if q = 2 n. Practical harvesting on a meaningul curve (#J (H) 184 bits prime). 1 J-C. Faugère, A.W., The Point Decomposition Problem in Hyperelliptic Curves. Designs, Codes and Cryptography [In revision] 13 / 38
23 1 Generalities 2 Harvesting and Decomposition attacks 3 Degree reduction and practical computations Structure of DP R Degree reduction Impact, comparisons 4 Summation Ideals 5 A geometric recreation: harvesting by sieving 14 / 38
24 Structure of DP R in even characteristic, part 1 H : y 2 + h 1 (x)y = h 0 (x) hyperelliptic of genus g over F 2 kn, fix R J (H). m 1 DP R (x) = x m + N i (a)x i & i, deg N i (a) = 2. i=0 With F 2 kn = Span F2 k (tj ) j n 1, N i (a) = j N ij(ā)t j. Reminder: solving PDP ng = solving {N ij (ā) = 0} j>0,i ng over F 2 k. 15 / 38
25 Structure of DP R in even characteristic, part 1 H : y 2 + h 1 (x)y = h 0 (x) hyperelliptic of genus g over F 2 kn, fix R J (H). m 1 DP R (x) = x m + N i (a)x i & i, deg N i (a) = 2. i=0 With F 2 kn = Span F2 k (tj ) j n 1, N i (a) = j N ij(ā)t j. Reminder: solving PDP ng = solving {N ij (ā) = 0} j>0,i ng over F 2 k. N i (a) square j, N ij (ā) squares replace quadratic eqs by linear eqs Proposition: Number of squares Let h 1 (x) = s i=t α ix i, and let L = s t + 1 be the length of h 1 (x). There are exactly g L 1 squares among the N i (a). Consequence: (n 1)(g L 1) replacements in {N ij (ā) = 0} j>0,i ng. Find n 1 more if α s F 2 k. 15 / 38
26 Structure of DP R in even characteristic, part 2 In H : y 2 + h 1 (x)y = h 0 (x), we usually have h 1 (x) monic. Proposition: N m 1 is univariate Let a = (a 1,..., a d ). Then N m 1 (a d ) = a d 2 + a d + λ for some λ F 2 kn. Rewrite: N m 1 (a d ) = a 2 d,0 + a d,0 + λ 0 + j 1 a2 d,j t2j + j 1 (a d,j + λ j )t j = N m 1,0 (ā d ) + j 1 N m 1,j(a d,1,..., a d,n 1 )t j. Proposition: presolving {N m 1,j (a d,1,..., a d,n 1 )} j 1 is 0-dimensional and has a solution in F 2 k whp. Consequence: determines n 1 vars in the full system, removes n 1 eqs. 16 / 38
27 Analysis of degree reduction Base field F 2 kn, m = ng. Implies d = (n 1)g. Let L be the length of h 1. Genericity assumption: PDP ng systems behave like regular systems of dimension 0. Before reduction: #ā = n(n 1)g #eqs = n(n 1)g Eqs have deg = 2 d old = 2 n(n 1)g After reduction: n 1 determined vars (n 1)(g L 1) linear eqs remaining have deg = 2 d new = 2 (n 1)((n 1)g+L 2) 2 (n 1)((n 1)g 1) d new 2 (n 1)(ng 1) factor 2 (n 1)(g+1) d old d new 2 n 1 17 / 38
28 Impact of the reduction For g = 2, n = 3, d old = 2 12 = 4096, d new = 2 6 = 64. Toy-example for one PDP 6 instance: fields tool time for d old time for d new ratio F 2 45 F 2 15 Magma s 0.029s H with L h1 = 1, over F 2 93 = F and #J (H) = 2 3 p, with log p = 184. #cores tool old this work C 30 years 7 days 8000 (optimized 2 ) unfeasible practical comparison with recent DL over 768 bits finite field: #rels harvesting time matrix size matrix density log p #linalg. [KDL+ 17] months our work days F5 with code gen., Sparse-FGLM [FM 11], NTL lib. 18 / 38
29 Situation Target: harvesting in Index-Calculus for hyperelliptic curves over F q n. Results: degree reduction if q = 2 k for hyperelliptics practical, meaningful computations in genus 2 Questions: What about q odd? What about non-hyperelliptics? Reduction of F s size? 19 / 38
30 Situation Target: harvesting in Index-Calculus for hyperelliptic curves over F q n. Results: degree reduction if q = 2 k for hyperelliptics practical, meaningful computations in genus 2 Questions: What about q odd? What about non-hyperelliptics? Reduction of F s size? For elliptic curves, reduction achieved using Summation polynomials. Works for even and odd characteristic. Enables factor basis reduction faster linear algebra Let s see how it is done. 19 / 38
31 1 Generalities 2 Harvesting and Decomposition attacks 3 Degree reduction and practical computations 4 Summation Ideals Summation polynomials? Generalization, Analysis for Index Calculus Degree Reduction in even characteristic 5 A geometric recreation: harvesting by sieving 20 / 38
32 Summation polynomials for elliptic curves Let E be an elliptic curve over F with point at infinity O, and m 3. Definition The m th summation polynomial for E is S m F[X 1,..., X m ] generating the projection of the group law ideal over a set of coordinates: S m (x 1,..., x m ) = 0 y 1,..., y m F s.t. P i = (x i, y i ) E and P P m = O. Projection of the group law on the x-line P 3 P 1 + P 2 + P 3 = O P 1 P 2 algebra geometry S 3 (x 1, x 2, x 3 ) = 0 x 1 x 2 x 3 21 / 38
33 Solving PDP m for elliptic curves, [G 09], [D 11] Goal: Find decomposition P P m of R E(F q n) geometry algebra R = P P m S m+1 (x R, x 1,..., x m ) = 0 New goal: Find x 1,..., x m i.e. solve S m+1 (x R, X 1,..., X m ) 22 / 38
34 Solving PDP m for elliptic curves, [G 09], [D 11] Goal: Find decomposition P P m of R E(F q n) geometry algebra R = P P m S m+1 (x R, x 1,..., x m ) = 0 New goal: Find x 1,..., x m i.e. solve S m+1 (x R, X 1,..., X m ) Restriction of scalar: x i = j x ijt j, x ij F q. Set factor base: F = {P E(F q n) : x(p) F q }. Then we can write: S n+1 (x R, X 1,..., X n ) = We want P i F: S n+1 (x R, X 1,..., X n ) = 0 W = n 1 i=0 s i(x 1,0,..., X n,n 1 )t j s 1 (X 1,..., X n ) = 0.. s n (X 1,..., X n ) = 0 22 / 38
35 Known results Heuristic: W is 0-dimensional. In practice: never failed. D treshold for m As presented n! 2 n(n 1) =4 S m is symmetric 2 n(n 1) < 6 immediate 23 / 38
36 Known results Heuristic: W is 0-dimensional. In practice: never failed. D treshold for m As presented n! 2 n(n 1) =4 S m is symmetric 2 n(n 1) < 6 immediate 1 rational 2-torsion point 2 (n 1)2 < 8 [FGHR 14], some models all 2-torsion is rational 2 (n 1)(n 2) = 8 [FHJRV 14], any model Now what about other curves? : size of factor base is also reduced. : close to threaten Brainpool Curve! (over F 31 5 ). 23 / 38
37 Summation Variety J-C. Faugère, A. Wallet, The Point Decomposition Problem on Hyperelliptic curves, DCC Journal [In revision] H hyperelliptic curve over F. R J (H). Goal: Describe V m,r = { (P 1,..., P m ) : m i=1 (P i) = R} Summation Variety 24 / 38
38 Summation Variety J-C. Faugère, A. Wallet, The Point Decomposition Problem on Hyperelliptic curves, DCC Journal [In revision] H hyperelliptic curve over F. R J (H). Goal: Describe V m,r = { (P 1,..., P m ) : m i=1 (P i) = R} Summation Variety Definition of Decomposition polynomial: With e i = Sym i (x 1,..., x m ): R = (P 1 ) + + (P m ) i, DP R (x i ) = 0 m 1 m 1 DP R (x) = x m + N i (a)x i = x m + ( 1) m i e m i x i i=0 i=0 24 / 38
39 Summation Variety J-C. Faugère, A. Wallet, The Point Decomposition Problem on Hyperelliptic curves, DCC Journal [In revision] H hyperelliptic curve over F. R J (H). Goal: Describe V m,r = { (P 1,..., P m ) : m i=1 (P i) = R} Summation Variety Definition of Decomposition polynomial: With e i = Sym i (x 1,..., x m ): R = (P 1 ) + + (P m ) i, DP R (x i ) = 0 m 1 m 1 DP R (x) = x m + N i (a)x i = x m + ( 1) m i e m i x i i=0 i=0 This gives a polynomial ideal: I m,r = N m 1 (a) = e 1,.. N 0 (a) = ( 1) m+1 e m. 24 / 38
40 Summation ideals Theorem The ideal I m,r F[a, e] is a polynomial parametrization of V m,r S m. Conditions in e = Sym(x i ) : eliminate a Geometry projection onto e Algebra Gröbner basis of I m,r F[e]. m th Summation Ideals For m g + 1, the m th summation ideal for H is I m,r F[e]. If S m,r = I m,r F[e], then S m,r is called a set of m-summation polynomials, or a m th summation set. 25 / 38
41 Properties of Summation Ideals S m,r (x) : evaluation of all S S m,r at x. H hyperelliptic curve over F. Summation property S m,r (x) = 0 y 1,..., y m F s.t. P i = (x i, y i ) H and (P 1 ) + + (P m ) = R. Invariance by permutations S m,r Sm = S m,r, and the modelling computes a symmetrized summation set. Let V = V (I m,r F[e]): Codim V = g #S m,r g in practice, #S m,r g Heuristic: deg V = 2 m g [D 11]: proven for g = 1 26 / 38
42 New PDP m solving for hyperelliptic curve Let H defined over F q n = Span Fq (1, t,..., t n 1 ), fix R J (H) 0) Factor base: F = {(P) J (H) : x(p) F q }. 1) Compute ng th Summation Set S ng,r = {S 1,..., S r }. 2) Restriction of scalars F q n F q on each S i = j s 11 (e 1,..., e ng ) = 0. 3) Solve the system W =. s rn (e 1,..., e ng ) = 0 s ij (e 1,..., e ng )t j 27 / 38
43 New PDP m solving for hyperelliptic curve Let H defined over F q n = Span Fq (1, t,..., t n 1 ), fix R J (H) 0) Factor base: F = {(P) J (H) : x(p) F q }. 1) Compute ng th Summation Set S ng,r = {S 1,..., S r }. 2) Restriction of scalars F q n F q on each S i = j s 11 (e 1,..., e ng ) = 0. 3) Solve the system W =. s rn (e 1,..., e ng ) = 0 s ij (e 1,..., e ng )t j r g = CodimV deg V = 2 (n 1)g W W n(v) deg W = (deg V) n = 2 n(n 1)g Same degree as Nagao s approach 27 / 38
44 Structure of DP R in even characteristic, the return H : y 2 + h 1 (x)y = h 0 (x) hyperelliptic of genus g over F 2 kn, R J (H). m 1 m 1 DP R (x) = x m + N i (a)x i = x m + ( 1) m i e m i x i i=0 i=0 Recall: there are squares among the N i (a)! In Nagao s approach: N i (a) square N ij (ā) = 0 Replaced by linear equations First part of the talk In Summation approach: Induces weight system on the e i s. Weighted degree is smaller. What does this mean? 28 / 38
45 Square equations and weighted structure Let Ñi be the squares among the N i (a) s. Ñ 2 i (a) = e i Ñ i (a) = e i I m,r : J m,r : N i (a) = e i N i (a) = e i I e = I m,r F[e] J e = J m,r F[e] 29 / 38
46 Square equations and weighted structure Let Ñi be the squares among the N i (a) s. Ñ 2 i (a) = e i Ñ i (a) = e i I m,r : J m,r : N i (a) = e i N i (a) = e i I e = I m,r F[e] ϕ(e i )=e w i i w i =2,w i =1 J e = J m,r F[e] Theorem With ϕ(e i ) = e w i i, I e is the radical of ϕ(j e ). Applications: Find points in V (J e ) instead of V (I e ). Weighted degree of J e is smaller than deg I e 29 / 38
47 Degree reduction in summation approach over F 2 kn Proposition: With ϕ(e i ) = e w i i, deg w J e = deg ϕ(j e) n i=1 w. i Let V J = V (J e ), V I = V (I e ). Corollary There is a constant C depending on h 1 s.t. deg w (V J ) = C deg V I 2 m g+l / 38
48 Degree reduction in summation approach over F 2 kn Proposition: With ϕ(e i ) = e w i i, deg w J e = deg ϕ(j e) n i=1 w. i Let V J = V (J e ), V I = V (I e ). Corollary There is a constant C depending on h 1 s.t. deg w (V J ) = C Let W = W n (V J ) i,j 1 V (e ij ). Experimentally, C = 2 L 1. Corollary: In PDP ng instances (m = ng), with L =length of h 1 : deg W = C n deg V I 2 m g+l 1. d old 2 (n 1)(g L+1)+n(L 1) = d old 2 (n 1)(g L+1). 30 / 38
49 Comparison of approaches after reduction With additional reductions, same reduction as in the first part of the talk. Best reduction Implementation Best running time Nagao immediate when L = 0 Easy 0.029s. Summation needs L = 0 and Tricky 0.34s. additional work In practice: better use approach of the first part. : on toy examples ( F 2 45 ) 31 / 38
50 Perspectives Limits: if g 2, can t reduce degree in odd char. Why? Degree of equations too small to exploit Frobeniuses Summation Variety not invariant under Jacobian 2-torsion Summation framework for Abelian varieties Generalization with Kummer varieties Arithmetic in g = 2 well-understood (theta functions) Explicit Jacobian summation polynomials Exploitation of more symmetries for decomposition attacks ex: set of 2-torsion points is larger in g = 2, action expresses linearly Factor base invariant under 2-torsion can be built. 32 / 38
51 1 Generalities 2 Harvesting and Decomposition attacks 3 Degree reduction and practical computations 4 Summation Ideals 5 A geometric recreation: harvesting by sieving Old-school smooth harvesting New approach: harvesting by sieving Timings 33 / 38
52 Old-school harvesting for smooth divisors non-hyperelliptic case C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = { P C(F q ) } (rational points). To find one relation: Non-hyperelliptic case [D 08] 1 Select P 1, P 2 F. 2 Compute F F q [x] describing C the line (P 1 P 2 ), with P 1, P 2 removed. 3 If F splits over F q ( div(p 1 P 2 ) is smooth ) Then relation. Else Try new P 1, P 2. 1 deg F = g 1 so probability : (g 1)! 34 / 38
53 Old-school harvesting for smooth divisors non-hyperelliptic case C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = { P C(F q ) } (rational points). To find one relation: Non-hyperelliptic case [D 08] 1 Select P 1, P 2 F. 2 Compute F F q [x] describing C the line (P 1 P 2 ), with P 1, P 2 removed. 3 If F splits over F q ( div(p 1 P 2 ) is smooth ) Then relation. Else Try new P 1, P 2. 1 deg F = g 1 so probability : (g 1)! 1 Free 2 Cheap 3 Costs g 2 log q 95% of time: checking if smooth or not and duplicate relations #F q (g 1)! tries for a relation harvesting in (g 1)!q(g 2 log q) 34 / 38
54 New approach: Harvesting by Sieving V.Vitse, A.Wallet, Improved Sieving on Algebraic curves, LatinCrypt 2015 Sieving = time-memory trade-off. Theory: Add one degree of freedom in decompositions. Practice: Store results of cheap computations. Smoothness checks Existing: [SS 14]: hyperelliptic only Cons: sort, backtracking, hyperelliptic only Our contribution: Adapt sieve to all curve types Suitable for other Index-calculus variants Compared to [SS 14]: skip computations, better memory efficiency, no sorting. 35 / 38
55 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] P 4 P 3 P 2 36 / 38
56 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] P 4 P 3 P 1 P 2 36 / 38
57 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] P 4 P 3 P 1 P 2 36 / 38
58 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] P 4 P 3 P 1 P 2 36 / 38
59 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] λ P (P i ) = λ P (P j ) P, P i, P j lined up. P 4 P 3 P 1 P 2 36 / 38
60 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] λ P (P i ) = λ P (P j ) P, P i, P j lined up. P 4 P 3 When T[λ i ] = g Relation! Next round: remove P from F, start again with P 1. P 1 P 2 36 / 38
61 Analysis in the non-hyperelliptic case For one loop: O(q) multiplications + O(q) storage. Harvesting in g!q. Expect q g! relations. Overall: Old-school: (g 1)!q(g 2 log q) Speed-up g log q. Relations management: Loop on P uses all lines through P: no duplicate relations. 37 / 38
62 Timings Genus 3, degree 4 Genus 4, degree 5 Genus 5, degree 6 Genus 7, degree 7 q Diem Sieving Ratio Diem Sieving Ratio Diem Sieving Ratio Diem Sieving Ratio Implementation in Magma; CPU Intel c Core i5@2.00ghz processor. Time to collect relations, expressed in seconds. 38 / 38
63 Timings [Diem-Kochinke]: > fix a singular point to start the sieving degree of polynomial by multiplicity > no more singular points? jump to another model Genus 5, degree 6 Genus 7, degree 7 q Diem & Kochinke Sieving Ratio Diem & Kochinke Sieving Ratio Implementation in Magma; CPU Intel c Core i5@2.00ghz processor. Time to collect relations, expressed in seconds. 38 / 38
The point decomposition problem in Jacobian varieties
The point decomposition problem in Jacobian varieties Jean-Charles Faugère2, Alexandre Wallet1,2 1 2 ENS Lyon, Laboratoire LIP, Equipe AriC UPMC Univ Paris 96, CNRS, INRIA, LIP6, Equipe PolSys 1 / 19 1
More informationCalcul d indice et courbes algébriques : de meilleures récoltes
Calcul d indice et courbes algébriques : de meilleures récoltes Alexandre Wallet ENS de Lyon, Laboratoire LIP, Equipe AriC Alexandre Wallet De meilleures récoltes dans le calcul d indice 1 / 35 Today:
More informationCover and Decomposition Index Calculus on Elliptic Curves made practical
Cover and Decomposition Index Calculus on Elliptic Curves made practical Application to a previously unreachable curve over F p 6 Vanessa VITSE Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire
More informationProblème du logarithme discret sur courbes elliptiques
Problème du logarithme discret sur courbes elliptiques Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM Groupe de travail équipe ARITH LIRMM Vanessa VITSE (UVSQ) DLP over elliptic
More informationElliptic Curve Discrete Logarithm Problem
Elliptic Curve Discrete Logarithm Problem Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM October 19, 2009 Vanessa VITSE (UVSQ) Elliptic Curve Discrete Logarithm Problem October
More informationA variant of the F4 algorithm
A variant of the F4 algorithm Vanessa VITSE - Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire PRISM CT-RSA, February 18, 2011 Motivation Motivation An example of algebraic cryptanalysis
More informationHyperelliptic curves
1/40 Hyperelliptic curves Pierrick Gaudry Caramel LORIA CNRS, Université de Lorraine, Inria ECC Summer School 2013, Leuven 2/40 Plan What? Why? Group law: the Jacobian Cardinalities, torsion Hyperelliptic
More informationDiscrete Logarithm Computation in Hyperelliptic Function Fields
Discrete Logarithm Computation in Hyperelliptic Function Fields Michael J. Jacobson, Jr. jacobs@cpsc.ucalgary.ca UNCG Summer School in Computational Number Theory 2016: Function Fields Mike Jacobson (University
More informationNon-generic attacks on elliptic curve DLPs
Non-generic attacks on elliptic curve DLPs Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC Summer School Leuven, September 13 2013 Smith
More informationExplicit isogenies and the Discrete Logarithm Problem in genus three
Explicit isogenies and the Discrete Logarithm Problem in genus three Benjamin Smith INRIA Saclay Île-de-France Laboratoire d informatique de l école polytechnique (LIX) EUROCRYPT 2008 : Istanbul, April
More informationCHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S. Ant nine J aux
CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S Ant nine J aux (g) CRC Press Taylor 8* Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor &
More informationScalar multiplication in compressed coordinates in the trace-zero subgroup
Scalar multiplication in compressed coordinates in the trace-zero subgroup Giulia Bianco and Elisa Gorla Institut de Mathématiques, Université de Neuchâtel Rue Emile-Argand 11, CH-2000 Neuchâtel, Switzerland
More informationFast arithmetic and pairing evaluation on genus 2 curves
Fast arithmetic and pairing evaluation on genus 2 curves David Freeman University of California, Berkeley dfreeman@math.berkeley.edu November 6, 2005 Abstract We present two algorithms for fast arithmetic
More informationOn the complexity of computing discrete logarithms in the field F
On the complexity of computing discrete logarithms in the field F 3 6 509 Francisco Rodríguez-Henríquez CINVESTAV-IPN Joint work with: Gora Adj Alfred Menezes Thomaz Oliveira CINVESTAV-IPN University of
More informationA quasi polynomial algorithm for discrete logarithm in small characteristic
CCA seminary January 10, 2014 A quasi polynomial algorithm for discrete logarithm in small characteristic Razvan Barbulescu 1 Pierrick Gaudry 2 Antoine Joux 3 Emmanuel Thomé 2 LIX, École Polytechnique
More informationSM9 identity-based cryptographic algorithms Part 1: General
SM9 identity-based cryptographic algorithms Part 1: General Contents 1 Scope... 1 2 Terms and definitions... 1 2.1 identity... 1 2.2 master key... 1 2.3 key generation center (KGC)... 1 3 Symbols and abbreviations...
More informationDiscrete logarithms: Recent progress (and open problems)
Discrete logarithms: Recent progress (and open problems) CryptoExperts Chaire de Cryptologie de la Fondation de l UPMC LIP6 February 25 th, 2014 Discrete logarithms Given a multiplicative group G with
More informationHyperelliptic Curve Cryptography
Hyperelliptic Curve Cryptography A SHORT INTRODUCTION Definition (HEC over K): Curve with equation y 2 + h x y = f x with h, f K X Genus g deg h(x) g, deg f x = 2g + 1 f monic Nonsingular 2 Nonsingularity
More informationAlternative Models: Infrastructure
Alternative Models: Infrastructure Michael J. Jacobson, Jr. jacobs@cpsc.ucalgary.ca UNCG Summer School in Computational Number Theory 2016: Function Fields Mike Jacobson (University of Calgary) Alternative
More informationSummation polynomial algorithms for elliptic curves in characteristic two
Summation polynomial algorithms for elliptic curves in characteristic two Steven D. Galbraith and Shishay W. Gebregiyorgis Mathematics Department, University of Auckland, New Zealand. S.Galbraith@math.auckland.ac.nz,sgeb522@aucklanduni.ac.nz
More informationElliptic and Hyperelliptic Curve Cryptography
Elliptic and Hyperelliptic Curve Cryptography Renate Scheidler Research supported in part by NSERC of Canada Comprehensive Source Handbook of Elliptic and Hyperelliptic Curve Cryptography Overview Motivation
More informationDefinition of a finite group
Elliptic curves Definition of a finite group (G, * ) is a finite group if: 1. G is a finite set. 2. For each a and b in G, also a * b is in G. 3. There is an e in G such that for all a in G, a * e= e *
More informationConstructing genus 2 curves over finite fields
Constructing genus 2 curves over finite fields Kirsten Eisenträger The Pennsylvania State University Fq12, Saratoga Springs July 15, 2015 1 / 34 Curves and cryptography RSA: most widely used public key
More informationDecomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field
Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field Koh-ichi Nagao nagao@kanto-gakuin.ac.jp Dept. of Engineering, Kanto Gakuin Univ., 1-50-1 Mutsuura Higashi Kanazawa-ku
More informationDiscrete Logarithm Problem
Discrete Logarithm Problem Çetin Kaya Koç koc@cs.ucsb.edu (http://cs.ucsb.edu/~koc/ecc) Elliptic Curve Cryptography lect08 discrete log 1 / 46 Exponentiation and Logarithms in a General Group In a multiplicative
More informationElliptic Curve Cryptography with Derive
Elliptic Curve Cryptography with Derive Johann Wiesenbauer Vienna University of Technology DES-TIME-2006, Dresden General remarks on Elliptic curves Elliptic curces can be described as nonsingular algebraic
More informationAte Pairing on Hyperelliptic Curves
Ate Pairing on Hyperelliptic Curves R. Granger, F. Hess, R. Oyono, N. Thériault F. Vercauteren EUROCRYPT 2007 - Barcelona Pairings Pairings Let G 1, G 2, G T be groups of prime order l. A pairing is a
More informationA heuristic quasi-polynomial algorithm for discrete logarithm in small characteristic
ECC, Chennai October 8, 2014 A heuristic quasi-polynomial algorithm for discrete logarithm in small characteristic Razvan Barbulescu 1 Pierrick Gaudry 2 Antoine Joux 3 Emmanuel Thomé 2 IMJ-PRG, Paris Loria,
More informationRational Points on Curves in Practice. Michael Stoll Universität Bayreuth Journées Algophantiennes Bordelaises Université de Bordeaux June 8, 2017
Rational Points on Curves in Practice Michael Stoll Universität Bayreuth Journées Algophantiennes Bordelaises Université de Bordeaux June 8, 2017 The Problem Let C be a smooth projective and geometrically
More informationOutline of the Seminar Topics on elliptic curves Saarbrücken,
Outline of the Seminar Topics on elliptic curves Saarbrücken, 11.09.2017 Contents A Number theory and algebraic geometry 2 B Elliptic curves 2 1 Rational points on elliptic curves (Mordell s Theorem) 5
More informationComputing L-series of geometrically hyperelliptic curves of genus three. David Harvey, Maike Massierer, Andrew V. Sutherland
Computing L-series of geometrically hyperelliptic curves of genus three David Harvey, Maike Massierer, Andrew V. Sutherland The zeta function Let C/Q be a smooth projective curve of genus 3 p be a prime
More informationEvidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs
Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Jonah Brown-Cohen 1 Introduction The Diffie-Hellman protocol was one of the first methods discovered for two people, say Alice
More informationInvariants and hyperelliptic curves: geometric, arithmetic and algorithmic aspects
Invariants and hyperelliptic curves: geometric, arithmetic and algorithmic aspects R. Lercier, C. Ritzenthaler IML - CNRS (Marseille) Luminy, October 2011 Ritzenthaler (IML) Invariants Luminy, October
More informationCORRESPONDENCE BETWEEN ELLIPTIC CURVES IN EDWARDS-BERNSTEIN AND WEIERSTRASS FORMS
CORRESPONDENCE BETWEEN ELLIPTIC CURVES IN EDWARDS-BERNSTEIN AND WEIERSTRASS FORMS DEPARTMENT OF MATHEMATICS AND STATISTICS UNIVERSITY OF OTTAWA SUPERVISOR: PROFESSOR MONICA NEVINS STUDENT: DANG NGUYEN
More informationDecomposition formula of the Jacobian group of plane curve (Draft)
Decomposition formula of the Jacobian group of plane curve (Draft) Koh-ichi Nagao (nagao@kanto-gakuin.ac.jp) Fac. of Engineering, Kanto Gakuin Univ., Joint-work with Kazuto Matsuo(Kanagawa Univ.,) and
More informationElliptic Curves and Public Key Cryptography
Elliptic Curves and Public Key Cryptography Jeff Achter January 7, 2011 1 Introduction to Elliptic Curves 1.1 Diophantine equations Many classical problems in number theory have the following form: Let
More informationClass numbers of algebraic function fields, or Jacobians of curves over finite fields
Class numbers of algebraic function fields, or Jacobians of curves over finite fields Anastassia Etropolski February 17, 2016 0 / 8 The Number Field Case The Function Field Case Class Numbers of Number
More informationArithmétique et Cryptographie Asymétrique
Arithmétique et Cryptographie Asymétrique Laurent Imbert CNRS, LIRMM, Université Montpellier 2 Journée d inauguration groupe Sécurité 23 mars 2010 This talk is about public-key cryptography Why did mathematicians
More informationHybrid Approach : a Tool for Multivariate Cryptography
Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6
More informationArithmetic of split Kummer surfaces: Montgomery endomorphism of Edwards products
1 Arithmetic of split Kummer surfaces: Montgomery endomorphism of Edwards products David Kohel Institut de Mathématiques de Luminy International Workshop on Codes and Cryptography 2011 Qingdao, 2 June
More informationThe point decomposition problem in Jacobian varieties
The point decomposition problem in Jacobian varieties Alexandre Wallet To cite this version: Alexandre Wallet. The point decomposition problem in Jacobian varieties. Data Structures and Algorithms [cs.ds].
More informationAspects of Pairing Inversion
Applications of Aspects of ECC 2007 - Dublin Aspects of Applications of Applications of Aspects of Applications of Pairings Let G 1, G 2, G T be groups of prime order r. A pairing is a non-degenerate bilinear
More informationCOMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162
COMPUTER ARITHMETIC 13/05/2010 cryptography - math background pp. 1 / 162 RECALL OF COMPUTER ARITHMETIC computers implement some types of arithmetic for instance, addition, subtratction, multiplication
More informationHyperelliptic-curve cryptography. D. J. Bernstein University of Illinois at Chicago
Hyperelliptic-curve cryptography D. J. Bernstein University of Illinois at Chicago Thanks to: NSF DMS 0140542 NSF ITR 0716498 Alfred P. Sloan Foundation Two parts to this talk: 1. Elliptic curves; modern
More informationAlgebraic Geometry: Elliptic Curves and 2 Theorems
Algebraic Geometry: Elliptic Curves and 2 Theorems Chris Zhu Mentor: Chun Hong Lo MIT PRIMES December 7, 2018 Chris Zhu Elliptic Curves and 2 Theorems December 7, 2018 1 / 16 Rational Parametrization Plane
More informationInteger factorization, part 1: the Q sieve. D. J. Bernstein
Integer factorization, part 1: the Q sieve D. J. Bernstein Sieving small integers 0 using primes 3 5 7: 1 3 3 4 5 5 6 3 7 7 8 9 3 3 10 5 11 1 3 13 14 7 15 3 5 16 17 18 3 3 19 0 5 etc. Sieving and 611 +
More informationIntroduction to Arithmetic Geometry Fall 2013 Lecture #24 12/03/2013
18.78 Introduction to Arithmetic Geometry Fall 013 Lecture #4 1/03/013 4.1 Isogenies of elliptic curves Definition 4.1. Let E 1 /k and E /k be elliptic curves with distinguished rational points O 1 and
More informationChapter 8. Exploring Polynomial Functions. Jennifer Huss
Chapter 8 Exploring Polynomial Functions Jennifer Huss 8-1 Polynomial Functions The degree of a polynomial is determined by the greatest exponent when there is only one variable (x) in the polynomial Polynomial
More informationADVANCED TOPICS IN ALGEBRAIC GEOMETRY
ADVANCED TOPICS IN ALGEBRAIC GEOMETRY DAVID WHITE Outline of talk: My goal is to introduce a few more advanced topics in algebraic geometry but not to go into too much detail. This will be a survey of
More informationSolving a 6120-bit DLP on a Desktop Computer
Solving a 6120-bit DLP on a Desktop Computer Faruk Göloğlu, Robert Granger, Gary McGuire, and Jens Zumbrägel Claude Shannon Institute Complex & Adaptive Systems Laboratory School of Mathematical Sciences
More informationComputing Discrete Logarithms. Many cryptosystems could be broken if we could compute discrete logarithms quickly.
Computing Discrete Logarithms Many cryptosystems could be broken if we could compute discrete logarithms quickly. The first discrete logarithm algorithms below apply in any group. They are about the best
More informationDistinguishing prime numbers from composite numbers: the state of the art. D. J. Bernstein University of Illinois at Chicago
Distinguishing prime numbers from composite numbers: the state of the art D. J. Bernstein University of Illinois at Chicago Is it easy to determine whether a given integer is prime? If easy means computable
More informationFast Cryptography in Genus 2
Fast Cryptography in Genus 2 Joppe W. Bos, Craig Costello, Huseyin Hisil and Kristin Lauter EUROCRYPT 2013 Athens, Greece May 27, 2013 Fast Cryptography in Genus 2 Recall that curves are much better than
More informationCounting points on curves: the general case
Counting points on curves: the general case Jan Tuitman, KU Leuven October 14, 2015 Jan Tuitman, KU Leuven Counting points on curves: the general case October 14, 2015 1 / 26 Introduction Algebraic curves
More informationGENERATION OF RANDOM PICARD CURVES FOR CRYPTOGRAPHY. 1. Introduction
GENERATION OF RANDOM PICARD CURVES FOR CRYPTOGRAPHY ANNEGRET WENG Abstract. Combining the ideas in [BTW] [GS], we give a efficient, low memory algorithm for computing the number of points on the Jacobian
More informationComputing discrete logarithms with pencils
Computing discrete logarithms with pencils Claus Diem and Sebastian Kochinke Augst 25, 2017 1 Introduction Let us consider the discrete logarithm problem for curves of a fixed genus g at least 3. In [7]
More informationPoints of Finite Order
Points of Finite Order Alex Tao 23 June 2008 1 Points of Order Two and Three If G is a group with respect to multiplication and g is an element of G then the order of g is the minimum positive integer
More informationREDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2
REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2 CHRISTOPHE DOCHE Abstract. In this paper we introduce so-called redundant trinomials to represent elements of nite elds of characteristic 2. The
More informationDistinguishing prime numbers from composite numbers: the state of the art. D. J. Bernstein University of Illinois at Chicago
Distinguishing prime numbers from composite numbers: the state of the art D. J. Bernstein University of Illinois at Chicago Is it easy to determine whether a given integer is prime? If easy means computable
More informationOne can use elliptic curves to factor integers, although probably not RSA moduli.
Elliptic Curves Elliptic curves are groups created by defining a binary operation (addition) on the points of the graph of certain polynomial equations in two variables. These groups have several properties
More informationCOMPRESSION FOR TRACE ZERO SUBGROUPS OF ELLIPTIC CURVES
COMPRESSION FOR TRACE ZERO SUBGROUPS OF ELLIPTIC CURVES A. SILVERBERG Abstract. We give details of a compression/decompression algorithm for points in trace zero subgroups of elliptic curves over F q r,
More informationIgusa Class Polynomials
Genus 2 day, Intercity Number Theory Seminar Utrecht, April 18th 2008 Overview Igusa class polynomials are the genus 2 analogue of the classical Hilbert class polynomial. For each notion, I will 1. tell
More informationCounting points on hyperelliptic curves
University of New South Wales 9th November 202, CARMA, University of Newcastle Elliptic curves Let p be a prime. Let X be an elliptic curve over F p. Want to compute #X (F p ), the number of F p -rational
More informationOptimal curves of genus 1, 2 and 3
Optimal curves of genus 1, 2 and 3 Christophe Ritzenthaler Institut de Mathématiques de Luminy, CNRS Leuven, 17-21 May 2010 Christophe Ritzenthaler (IML) Optimal curves of genus 1, 2 and 3 Leuven, 17-21
More informationNumber of points on a family of curves over a finite field
arxiv:1610.02978v1 [math.nt] 10 Oct 2016 Number of points on a family of curves over a finite field Thiéyacine Top Abstract In this paper we study a family of curves obtained by fibre products of hyperelliptic
More informationA connection between number theory and linear algebra
A connection between number theory and linear algebra Mark Steinberger Contents 1. Some basics 1 2. Rational canonical form 2 3. Prime factorization in F[x] 4 4. Units and order 5 5. Finite fields 7 6.
More informationCongruent number elliptic curves of high rank
Michaela Klopf, BSc Congruent number elliptic curves of high rank MASTER S THESIS to achieve the university degree of Diplom-Ingenieurin Master s degree programme: Mathematical Computer Science submitted
More informationComplex Algebraic Geometry: Smooth Curves Aaron Bertram, First Steps Towards Classifying Curves. The Riemann-Roch Theorem is a powerful tool
Complex Algebraic Geometry: Smooth Curves Aaron Bertram, 2010 12. First Steps Towards Classifying Curves. The Riemann-Roch Theorem is a powerful tool for classifying smooth projective curves, i.e. giving
More informationElliptic Curves Cryptography and factorization. Part VIII. Elliptic curves cryptography and factorization. Historical Remarks.
Elliptic Curves Cryptography and factorization Part VIII Elliptic curves cryptography and factorization Cryptography based on manipulation of points of so called elliptic curves is getting momentum and
More informationFOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 45
FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 45 RAVI VAKIL CONTENTS 1. Hyperelliptic curves 1 2. Curves of genus 3 3 1. HYPERELLIPTIC CURVES A curve C of genus at least 2 is hyperelliptic if it admits a degree
More informationSuperspecial curves of genus 4 in small charactersitic 8/5/2016 1
Superspecial curves of genus 4 in small charactersitic Mom onar i Kudo Graduate S chool of Mathemati c s, Ky ushu University, JAPAN 5 th August, @The University of Kaiserslautern, GERMANY This is a joint
More informationFast, twist-secure elliptic curve cryptography from Q-curves
Fast, twist-secure elliptic curve cryptography from Q-curves Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC #17, Leuven September 16,
More informationPolynomial Interpolation in the Elliptic Curve Cryptosystem
Journal of Mathematics and Statistics 7 (4): 326-331, 2011 ISSN 1549-3644 2011 Science Publications Polynomial Interpolation in the Elliptic Curve Cryptosystem Liew Khang Jie and Hailiza Kamarulhaili School
More information1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation
1 The Fundamental Theorem of Arithmetic A positive integer N has a unique prime power decomposition 2 Primality Testing Integer Factorisation (Gauss 1801, but probably known to Euclid) The Computational
More informationFinite Fields and Elliptic Curves in Cryptography
Finite Fields and Elliptic Curves in Cryptography Frederik Vercauteren - Katholieke Universiteit Leuven - COmputer Security and Industrial Cryptography 1 Overview Public-key vs. symmetric cryptosystem
More informationExercises for algebraic curves
Exercises for algebraic curves Christophe Ritzenthaler February 18, 2019 1 Exercise Lecture 1 1.1 Exercise Show that V = {(x, y) C 2 s.t. y = sin x} is not an algebraic set. Solutions. Let us assume that
More informationLECTURE 2 FRANZ LEMMERMEYER
LECTURE 2 FRANZ LEMMERMEYER Last time we have seen that the proof of Fermat s Last Theorem for the exponent 4 provides us with two elliptic curves (y 2 = x 3 + x and y 2 = x 3 4x) in the guise of the quartic
More informationAlgebra Homework, Edition 2 9 September 2010
Algebra Homework, Edition 2 9 September 2010 Problem 6. (1) Let I and J be ideals of a commutative ring R with I + J = R. Prove that IJ = I J. (2) Let I, J, and K be ideals of a principal ideal domain.
More informationElliptic Curves, Factorization, and Cryptography
Elliptic Curves, Factorization, and Cryptography Brian Rhee MIT PRIMES May 19, 2017 RATIONAL POINTS ON CONICS The following procedure yields the set of rational points on a conic C given an initial rational
More informationAn introduction to supersingular isogeny-based cryptography
An introduction to supersingular isogeny-based cryptography Craig Costello Summer School on Real-World Crypto and Privacy June 8, 2017 Šibenik, Croatia Towards quantum-resistant cryptosystems from supersingular
More informationPart 2 - Beginning Algebra Summary
Part - Beginning Algebra Summary Page 1 of 4 1/1/01 1. Numbers... 1.1. Number Lines... 1.. Interval Notation.... Inequalities... 4.1. Linear with 1 Variable... 4. Linear Equations... 5.1. The Cartesian
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 2: Mathematical Concepts Divisibility Congruence Quadratic Residues
More informationMA094 Part 2 - Beginning Algebra Summary
MA094 Part - Beginning Algebra Summary Page of 8/8/0 Big Picture Algebra is Solving Equations with Variables* Variable Variables Linear Equations x 0 MA090 Solution: Point 0 Linear Inequalities x < 0 page
More informationIntroduction to Elliptic Curve Cryptography. Anupam Datta
Introduction to Elliptic Curve Cryptography Anupam Datta 18-733 Elliptic Curve Cryptography Public Key Cryptosystem Duality between Elliptic Curve Cryptography and Discrete Log Based Cryptography Groups
More informationA brief overwiev of pairings
Bordeaux November 22, 2016 A brief overwiev of pairings Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Overview pairings 0 / 37 Plan of the lecture Pairings Pairing-friendly curves Progress of NFS attacks
More informationElliptic curves: Theory and Applications. Day 4: The discrete logarithm problem.
Elliptic curves: Theory and Applications. Day 4: The discrete logarithm problem. Elisa Lorenzo García Université de Rennes 1 14-09-2017 Elisa Lorenzo García (Rennes 1) Elliptic Curves 4 14-09-2017 1 /
More informationTampering attacks in pairing-based cryptography. Johannes Blömer University of Paderborn September 22, 2014
Tampering attacks in pairing-based cryptography Johannes Blömer University of Paderborn September 22, 2014 1 / 16 Pairings Definition 1 A pairing is a bilinear, non-degenerate, and efficiently computable
More informationElliptic Curves Spring 2013 Lecture #12 03/19/2013
18.783 Elliptic Curves Spring 2013 Lecture #12 03/19/2013 We now consider our first practical application of elliptic curves: factoring integers. Before presenting the elliptic curve method (ECM) for factoring
More informationACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS
ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS by Balasingham Balamohan A thesis submitted to the Faculty of Graduate and Postdoctoral Studies in partial fulfillment
More informationIgusa Class Polynomials
, supported by the Leiden University Fund (LUF) Joint Mathematics Meetings, San Diego, January 2008 Overview Igusa class polynomials are the genus 2 analogue of the classical Hilbert class polynomials.
More informationNo.6 Selection of Secure HC of g = divisors D 1, D 2 defined on J(C; F q n) over F q n, to determine the integer m such that D 2 = md 1 (if such
Vol.17 No.6 J. Comput. Sci. & Technol. Nov. 2002 Selection of Secure Hyperelliptic Curves of g = 2 Based on a Subfield ZHANG Fangguo ( ) 1, ZHANG Futai ( Ξ) 1;2 and WANG Yumin(Π±Λ) 1 1 P.O.Box 119 Key
More informationFunctional equations for Feynman integrals
Functional equations for Feynman integrals O.V. Tarasov JINR, Dubna, Russia October 9, 016, Hayama, Japan O.V. Tarasov (JINR) Functional equations for Feynman integrals 1 / 34 Contents 1 Functional equations
More informationCurves, Cryptography, and Primes of the Form x 2 + y 2 D
Curves, Cryptography, and Primes of the Form x + y D Juliana V. Belding Abstract An ongoing challenge in cryptography is to find groups in which the discrete log problem hard, or computationally infeasible.
More informationNumber Theory in Cryptology
Number Theory in Cryptology Abhijit Das Department of Computer Science and Engineering Indian Institute of Technology Kharagpur October 15, 2011 What is Number Theory? Theory of natural numbers N = {1,
More information8 Elliptic Curve Cryptography
8 Elliptic Curve Cryptography 8.1 Elliptic Curves over a Finite Field For the purposes of cryptography, we want to consider an elliptic curve defined over a finite field F p = Z/pZ for p a prime. Given
More informationOn the Discrete Logarithm Problem on Algebraic Tori
On the Discrete Logarithm Problem on Algebraic Tori R. Granger 1 and F. Vercauteren 2 1 University of Bristol, Department of Computer Science, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,
More informationarxiv: v1 [math.nt] 31 Dec 2011
arxiv:1201.0266v1 [math.nt] 31 Dec 2011 Elliptic curves with large torsion and positive rank over number fields of small degree and ECM factorization Andrej Dujella and Filip Najman Abstract In this paper,
More informationModels of Elliptic Curves
Models of Elliptic Curves Daniel J. Bernstein Tanja Lange University of Illinois at Chicago and Technische Universiteit Eindhoven djb@cr.yp.to tanja@hyperelliptic.org 26.03.2009 D. J. Bernstein & T. Lange
More informationCounting Points on Curves using Monsky-Washnitzer Cohomology
Counting Points on Curves using Monsky-Washnitzer Cohomology Frederik Vercauteren frederik@cs.bris.ac.uk Jan Denef jan.denef@wis.kuleuven.ac.be University of Leuven http://www.arehcc.com University of
More informationIsogeny graphs of abelian varieties and applications to the Discrete Logarithm Problem
Isogeny graphs of abelian varieties and applications to the Discrete Logarithm Problem Chloe Martindale 26th January, 2018 These notes are from a talk given in the Séminaire Géométrie et algèbre effectives
More information