The point decomposition problem in Jacobian varieties

Size: px
Start display at page:

Download "The point decomposition problem in Jacobian varieties"

Transcription

1 The point decomposition problem in Jacobian varieties Alexandre Wallet ENS Lyon, Laboratoire LIP, Equipe AriC 1 / 38

2 1 Generalities Discrete Logarithm Problem Short State-of-the-Art for curves About Index-Calculus 2 Harvesting and Decomposition attacks 3 Degree reduction and practical computations 4 Summation Ideals 5 A geometric recreation: harvesting by sieving 2 / 38

3 Discrete Logarithm Problem (DLP) Let g, h = [x] g (G, +), with x Z. Compute x. Is this a hard problem? Classic Generic group: yes For some groups: no Cryptography: yes Quantum NO Security basis for Diffie-Hellman, El-Gamal, Digital Signatures,... Today s groups: Elliptic curves E(F q ) Jacobian of algebraic curves J Fq (C) 3 / 38

4 Computing Discrete Logs exp. time Generic alg. lower bound: DLP ON CURVES : genus : #Field Index Calculus "Small genus" Decomposition Baby-steps Giant-steps -Pollard subexp. time ~ [G'00], [D'07] [GTTD'07] "Large genus" [G'09,D'11],[N'10] [GTTD'07] "Large degree" poly. time [ADH'99], [EGS'02] [EGTT'13] 4 / 38

5 Situation for elliptic curves For cryptography: mostly elliptic curves (g = 1) Elliptic curves over prime fields over extension fields Generic only Decomposition attacks Transfer attacks Higher genus Finite field 5 / 38

6 About Index-Calculus : algebraic curve : Jacobian variety of Inputs 1) Select Factor base too small: harvesting too hard trade-off [GTTD'07] too big: linear algebra too long Harvesting 2) Find relations: T sparse matrix + easy to enumerate + elements should be "small" Several techniques Today: over done by solving polynomial systems Linear Algebra 1) Compute s.t. (aka: Decomposition attacks) Complexity 2) Use to retrieve linalg ~ well-known Discrete Logarithm harvest. ~ x Find 1 relation What about this? 6 / 38

7 Today s target: harvesting in Index-Calculus for curves over F q n. Motivations: Algorithmic Number Theory Computational Algebraic Geometry Cryptography Compute discrete logs in abelian varieties. How efficient can we be? Transfer attacks! 7 / 38

8 1 Generalities 2 Harvesting and Decomposition attacks What is a relation? How to find a relation? Complexity and Polynomial System Solving 3 Degree reduction and practical computations 4 Summation Ideals 5 A geometric recreation: harvesting by sieving 8 / 38

9 Algebraic curves, Jacobian varieties, group law C : P(x, y) = 0, for some P F q [X, Y ], algebraic curve of genus g. g = 1: elliptic: y 2 = x 3 + Ax + B, A, B F q g = 2: hyperelliptic: y 2 + h 1 (x)y = x h 1 F q [x], deg h 1 2 g 3: hyperelliptic: y 2 + h 1 (x)y = x 2g h 1 F q [x], deg h 1 g Non-hyperelliptic (all the rest). 9 / 38

10 Algebraic curves, Jacobian varieties, group law C : P(x, y) = 0, for some P F q [X, Y ], algebraic curve of genus g. Fix a point O. J (C): Jacobian variety J (C) is a quotient group. Its elements are reduced divisors. In practice, a reduced divisor is D = k P i ko. i=1 for some P 1,..., P k C, k g Ex: g = 1, E elliptic, point at infinity O P 3 Line through P 1, P 2 : f (x, y) = 0. In J (E) : P 1 + P 2 +P 3 3O = 0, so that (P 1 O) + (P 2 O) = ([ P 3 ] O). P 1 P 2 P 3 9 / 38

11 Algebraic curves, Jacobian varieties, group law C : P(x, y) = 0, for some P F q [X, Y ], algebraic curve of genus g. Fix a point O. J (C): Jacobian variety J (C) is a quotient group. Its elements are reduced divisors. In practice, a reduced divisor is D = k P i ko. i=1 for some P 1,..., P k C, k g Ex: g = 2, H hyperelliptic, point at infinity O Cubic through P 1,..., P 4 : f (x, y) = 0 In J (H) : P 1 + +P 6 6O = 0 P 5 P 6 P 4 so that: (P 1 + P 2 2O) }{{} + (P 3 + P 4 2O) }{{} D 1 + D 2 = [ P 5 ] + [ P 6 ] 2O }{{} D 3 P 2 P 1 P 6 P 3 P 5 9 / 38

12 Geometry of relations Point m-decomposition Problem (PDP m ) Let H be a curve of genus g, R J (H) and F J (H). Find, if possible, D 1,..., D m F s.t. R = D D m. Harvesting = solving multiple PDP m instances, for some fixed m. 10 / 38

13 Geometry of relations Point m-decomposition Problem (PDP m ) Let H be a curve of genus g, R J (H) and F J (H). Find, if possible, D 1,..., D m F s.t. R = D D m. Harvesting = solving multiple PDP m instances, for some fixed m. Let R = i (x R i, y Ri ) go J (H). R = i,j (x D ij, y Dij ) mgo f (x, y) s.t.: f (x Ri, y Ri ) = f (x Dij, y Dij ) = 0. Such f s form a linear space of finite dim: f Span(f 1,..., f d ) f = d a i f i i=1 Goal: find (a i ) i d. 10 / 38

14 Geometry of relations Point m-decomposition Problem (PDP m ) Let H be a curve of genus g, R J (H) and F J (H). Find, if possible, D 1,..., D m F s.t. R = D D m. Harvesting = solving multiple PDP m instances, for some fixed m. Let R = i (x R i, y Ri ) go J (H). R = i,j (x D ij, y Dij ) mgo f (x, y) s.t.: Ex: g = 2 and m = 2 D i = D i1 + D i2 2O. f (x Ri, y Ri ) = f (x Dij, y Dij ) = 0. Such f s form a linear space of finite dim: f Span(f 1,..., f d ) f = d a i f i i=1 Goal: find (a i ) i d. R 1 R 2 10 / 38

15 Geometry of relations Point m-decomposition Problem (PDP m ) Let H be a curve of genus g, R J (H) and F J (H). Find, if possible, D 1,..., D m F s.t. R = D D m. Harvesting = solving multiple PDP m instances, for some fixed m. Let R = i (x R i, y Ri ) go J (H). R = i,j (x D ij, y Dij ) mgo f (x, y) s.t.: Ex: g = 2 and m = 2 D i = D i1 + D i2 2O. f (x Ri, y Ri ) = f (x Dij, y Dij ) = 0. Such f s form a linear space of finite dim: f Span(f 1,..., f d ) f = d a i f i i=1 Goal: find (a i ) i d. D 12 R 1 D 11 D 21 D 22 R 2 10 / 38

16 Solving PDP m [G 09], [N 10], [D 11] Goal: Find (a i ) i d in a smart way Assume base field is F q n = Span Fq (1, t,..., t n 1 ) 11 / 38

17 Solving PDP m [G 09], [N 10], [D 11] Goal: Find (a i ) i d in a smart way Assume base field is F q n = Span Fq (1, t,..., t n 1 ) Restriction of scalars Write x = j x j t j, x j F q, x = (x 1,..., x n): (x, y) H ( x, ȳ) W where W: Weil Restriction of H over F q Factor base: F = {P O : P H, x(p) F q} = W {x j = 0} j>0 11 / 38

18 Solving PDP m [G 09], [N 10], [D 11] Goal: Find (a i ) i d in a smart way Assume base field is F q n = Span Fq (1, t,..., t n 1 ) Restriction of scalars Write x = j x j t j, x j F q, x = (x 1,..., x n): (x, y) H ( x, ȳ) W where W: Weil Restriction of H over F q Factor base: F = {P O : P H, x(p) F q} = W {x j = 0} j>0 Decomposition Polynomial DP R Resy (H, f ) DP R (x) = (x xri ) = xm + m 1 N i ((a i ))x i i=0 If f describes R = i,j (x ij, y ij ) mo: DP R (x ij ) = 0, i m, j n 1 Write N i ((a i )) = j 0 N ij ((ā i ))t j : D 1,..., D m F DP R (x) F q[x] N ij ((ā i )) = 0, i, j > 0 11 / 38

19 Solving PDP m [G 09], [N 10], [D 11] Goal: Find (a i ) i d in a smart way Assume base field is F q n = Span Fq (1, t,..., t n 1 ) Restriction of scalars Write x = j x j t j, x j F q, x = (x 1,..., x n): (x, y) H ( x, ȳ) W where W: Weil Restriction of H over F q Factor base: F = {P O : P H, x(p) F q} = W {x j = 0} j>0 Decomposition Polynomial DP R Resy (H, f ) DP R (x) = (x xri ) = xm + m 1 N i ((a i ))x i i=0 If f describes R = i,j (x ij, y ij ) mo: DP R (x ij ) = 0, i m, j n 1 Write N i ((a i )) = j 0 N ij ((ā i ))t j : D 1,..., D m F DP R (x) F q[x] N ij ((ā i )) = 0, i, j > 0 Finding relations solving Polynomial systems. For m = ng, {N ij (ā i ) = 0} i m,j>0 is generally 0-dimensional. 11 / 38

20 Solving 0-dimensional systems with Gröbner Bases tools Original System DRL Basis F4, F5 Change order FGLM Univariate Solving n variables s equations : degree of regularity D: #solutions O(s ( ) n+ ω) O(nD ω ) ω: lin. alg. exponent 12 / 38

21 Solving 0-dimensional systems with Gröbner Bases tools Original System DRL Basis F4, F5 Change order FGLM Univariate Solving n variables s equations : degree of regularity D: #solutions O(s ( ) n+ ω) O(nD ω ) In PDP ng setting F q n, genus g = Õ(D1/n ) D = 2 n(n 1)g 1 relation costs O((ng)!D ω ) + Proba that all roots of DP R in F q 1/(ng)! D is the main complexity parameter. Can we reduce it? 12 / 38

22 Situation Known reductions: [FGHR 14], [FHJRV 14], [GG 14] Uses Summation polynomials and symmetries (invariant theory) Higher genus: No reduction known before only for g = 1 (elliptic curves). Ex: g = 2, n = 3, log q = 15 Find 1 relation 12 days. Contributions 1 : Reduction of D for hyperelliptic curves of all genus, if q = 2 n. Practical harvesting on a meaningul curve (#J (H) 184 bits prime). 1 J-C. Faugère, A.W., The Point Decomposition Problem in Hyperelliptic Curves. Designs, Codes and Cryptography [In revision] 13 / 38

23 1 Generalities 2 Harvesting and Decomposition attacks 3 Degree reduction and practical computations Structure of DP R Degree reduction Impact, comparisons 4 Summation Ideals 5 A geometric recreation: harvesting by sieving 14 / 38

24 Structure of DP R in even characteristic, part 1 H : y 2 + h 1 (x)y = h 0 (x) hyperelliptic of genus g over F 2 kn, fix R J (H). m 1 DP R (x) = x m + N i (a)x i & i, deg N i (a) = 2. i=0 With F 2 kn = Span F2 k (tj ) j n 1, N i (a) = j N ij(ā)t j. Reminder: solving PDP ng = solving {N ij (ā) = 0} j>0,i ng over F 2 k. 15 / 38

25 Structure of DP R in even characteristic, part 1 H : y 2 + h 1 (x)y = h 0 (x) hyperelliptic of genus g over F 2 kn, fix R J (H). m 1 DP R (x) = x m + N i (a)x i & i, deg N i (a) = 2. i=0 With F 2 kn = Span F2 k (tj ) j n 1, N i (a) = j N ij(ā)t j. Reminder: solving PDP ng = solving {N ij (ā) = 0} j>0,i ng over F 2 k. N i (a) square j, N ij (ā) squares replace quadratic eqs by linear eqs Proposition: Number of squares Let h 1 (x) = s i=t α ix i, and let L = s t + 1 be the length of h 1 (x). There are exactly g L 1 squares among the N i (a). Consequence: (n 1)(g L 1) replacements in {N ij (ā) = 0} j>0,i ng. Find n 1 more if α s F 2 k. 15 / 38

26 Structure of DP R in even characteristic, part 2 In H : y 2 + h 1 (x)y = h 0 (x), we usually have h 1 (x) monic. Proposition: N m 1 is univariate Let a = (a 1,..., a d ). Then N m 1 (a d ) = a d 2 + a d + λ for some λ F 2 kn. Rewrite: N m 1 (a d ) = a 2 d,0 + a d,0 + λ 0 + j 1 a2 d,j t2j + j 1 (a d,j + λ j )t j = N m 1,0 (ā d ) + j 1 N m 1,j(a d,1,..., a d,n 1 )t j. Proposition: presolving {N m 1,j (a d,1,..., a d,n 1 )} j 1 is 0-dimensional and has a solution in F 2 k whp. Consequence: determines n 1 vars in the full system, removes n 1 eqs. 16 / 38

27 Analysis of degree reduction Base field F 2 kn, m = ng. Implies d = (n 1)g. Let L be the length of h 1. Genericity assumption: PDP ng systems behave like regular systems of dimension 0. Before reduction: #ā = n(n 1)g #eqs = n(n 1)g Eqs have deg = 2 d old = 2 n(n 1)g After reduction: n 1 determined vars (n 1)(g L 1) linear eqs remaining have deg = 2 d new = 2 (n 1)((n 1)g+L 2) 2 (n 1)((n 1)g 1) d new 2 (n 1)(ng 1) factor 2 (n 1)(g+1) d old d new 2 n 1 17 / 38

28 Impact of the reduction For g = 2, n = 3, d old = 2 12 = 4096, d new = 2 6 = 64. Toy-example for one PDP 6 instance: fields tool time for d old time for d new ratio F 2 45 F 2 15 Magma s 0.029s H with L h1 = 1, over F 2 93 = F and #J (H) = 2 3 p, with log p = 184. #cores tool old this work C 30 years 7 days 8000 (optimized 2 ) unfeasible practical comparison with recent DL over 768 bits finite field: #rels harvesting time matrix size matrix density log p #linalg. [KDL+ 17] months our work days F5 with code gen., Sparse-FGLM [FM 11], NTL lib. 18 / 38

29 Situation Target: harvesting in Index-Calculus for hyperelliptic curves over F q n. Results: degree reduction if q = 2 k for hyperelliptics practical, meaningful computations in genus 2 Questions: What about q odd? What about non-hyperelliptics? Reduction of F s size? 19 / 38

30 Situation Target: harvesting in Index-Calculus for hyperelliptic curves over F q n. Results: degree reduction if q = 2 k for hyperelliptics practical, meaningful computations in genus 2 Questions: What about q odd? What about non-hyperelliptics? Reduction of F s size? For elliptic curves, reduction achieved using Summation polynomials. Works for even and odd characteristic. Enables factor basis reduction faster linear algebra Let s see how it is done. 19 / 38

31 1 Generalities 2 Harvesting and Decomposition attacks 3 Degree reduction and practical computations 4 Summation Ideals Summation polynomials? Generalization, Analysis for Index Calculus Degree Reduction in even characteristic 5 A geometric recreation: harvesting by sieving 20 / 38

32 Summation polynomials for elliptic curves Let E be an elliptic curve over F with point at infinity O, and m 3. Definition The m th summation polynomial for E is S m F[X 1,..., X m ] generating the projection of the group law ideal over a set of coordinates: S m (x 1,..., x m ) = 0 y 1,..., y m F s.t. P i = (x i, y i ) E and P P m = O. Projection of the group law on the x-line P 3 P 1 + P 2 + P 3 = O P 1 P 2 algebra geometry S 3 (x 1, x 2, x 3 ) = 0 x 1 x 2 x 3 21 / 38

33 Solving PDP m for elliptic curves, [G 09], [D 11] Goal: Find decomposition P P m of R E(F q n) geometry algebra R = P P m S m+1 (x R, x 1,..., x m ) = 0 New goal: Find x 1,..., x m i.e. solve S m+1 (x R, X 1,..., X m ) 22 / 38

34 Solving PDP m for elliptic curves, [G 09], [D 11] Goal: Find decomposition P P m of R E(F q n) geometry algebra R = P P m S m+1 (x R, x 1,..., x m ) = 0 New goal: Find x 1,..., x m i.e. solve S m+1 (x R, X 1,..., X m ) Restriction of scalar: x i = j x ijt j, x ij F q. Set factor base: F = {P E(F q n) : x(p) F q }. Then we can write: S n+1 (x R, X 1,..., X n ) = We want P i F: S n+1 (x R, X 1,..., X n ) = 0 W = n 1 i=0 s i(x 1,0,..., X n,n 1 )t j s 1 (X 1,..., X n ) = 0.. s n (X 1,..., X n ) = 0 22 / 38

35 Known results Heuristic: W is 0-dimensional. In practice: never failed. D treshold for m As presented n! 2 n(n 1) =4 S m is symmetric 2 n(n 1) < 6 immediate 23 / 38

36 Known results Heuristic: W is 0-dimensional. In practice: never failed. D treshold for m As presented n! 2 n(n 1) =4 S m is symmetric 2 n(n 1) < 6 immediate 1 rational 2-torsion point 2 (n 1)2 < 8 [FGHR 14], some models all 2-torsion is rational 2 (n 1)(n 2) = 8 [FHJRV 14], any model Now what about other curves? : size of factor base is also reduced. : close to threaten Brainpool Curve! (over F 31 5 ). 23 / 38

37 Summation Variety J-C. Faugère, A. Wallet, The Point Decomposition Problem on Hyperelliptic curves, DCC Journal [In revision] H hyperelliptic curve over F. R J (H). Goal: Describe V m,r = { (P 1,..., P m ) : m i=1 (P i) = R} Summation Variety 24 / 38

38 Summation Variety J-C. Faugère, A. Wallet, The Point Decomposition Problem on Hyperelliptic curves, DCC Journal [In revision] H hyperelliptic curve over F. R J (H). Goal: Describe V m,r = { (P 1,..., P m ) : m i=1 (P i) = R} Summation Variety Definition of Decomposition polynomial: With e i = Sym i (x 1,..., x m ): R = (P 1 ) + + (P m ) i, DP R (x i ) = 0 m 1 m 1 DP R (x) = x m + N i (a)x i = x m + ( 1) m i e m i x i i=0 i=0 24 / 38

39 Summation Variety J-C. Faugère, A. Wallet, The Point Decomposition Problem on Hyperelliptic curves, DCC Journal [In revision] H hyperelliptic curve over F. R J (H). Goal: Describe V m,r = { (P 1,..., P m ) : m i=1 (P i) = R} Summation Variety Definition of Decomposition polynomial: With e i = Sym i (x 1,..., x m ): R = (P 1 ) + + (P m ) i, DP R (x i ) = 0 m 1 m 1 DP R (x) = x m + N i (a)x i = x m + ( 1) m i e m i x i i=0 i=0 This gives a polynomial ideal: I m,r = N m 1 (a) = e 1,.. N 0 (a) = ( 1) m+1 e m. 24 / 38

40 Summation ideals Theorem The ideal I m,r F[a, e] is a polynomial parametrization of V m,r S m. Conditions in e = Sym(x i ) : eliminate a Geometry projection onto e Algebra Gröbner basis of I m,r F[e]. m th Summation Ideals For m g + 1, the m th summation ideal for H is I m,r F[e]. If S m,r = I m,r F[e], then S m,r is called a set of m-summation polynomials, or a m th summation set. 25 / 38

41 Properties of Summation Ideals S m,r (x) : evaluation of all S S m,r at x. H hyperelliptic curve over F. Summation property S m,r (x) = 0 y 1,..., y m F s.t. P i = (x i, y i ) H and (P 1 ) + + (P m ) = R. Invariance by permutations S m,r Sm = S m,r, and the modelling computes a symmetrized summation set. Let V = V (I m,r F[e]): Codim V = g #S m,r g in practice, #S m,r g Heuristic: deg V = 2 m g [D 11]: proven for g = 1 26 / 38

42 New PDP m solving for hyperelliptic curve Let H defined over F q n = Span Fq (1, t,..., t n 1 ), fix R J (H) 0) Factor base: F = {(P) J (H) : x(p) F q }. 1) Compute ng th Summation Set S ng,r = {S 1,..., S r }. 2) Restriction of scalars F q n F q on each S i = j s 11 (e 1,..., e ng ) = 0. 3) Solve the system W =. s rn (e 1,..., e ng ) = 0 s ij (e 1,..., e ng )t j 27 / 38

43 New PDP m solving for hyperelliptic curve Let H defined over F q n = Span Fq (1, t,..., t n 1 ), fix R J (H) 0) Factor base: F = {(P) J (H) : x(p) F q }. 1) Compute ng th Summation Set S ng,r = {S 1,..., S r }. 2) Restriction of scalars F q n F q on each S i = j s 11 (e 1,..., e ng ) = 0. 3) Solve the system W =. s rn (e 1,..., e ng ) = 0 s ij (e 1,..., e ng )t j r g = CodimV deg V = 2 (n 1)g W W n(v) deg W = (deg V) n = 2 n(n 1)g Same degree as Nagao s approach 27 / 38

44 Structure of DP R in even characteristic, the return H : y 2 + h 1 (x)y = h 0 (x) hyperelliptic of genus g over F 2 kn, R J (H). m 1 m 1 DP R (x) = x m + N i (a)x i = x m + ( 1) m i e m i x i i=0 i=0 Recall: there are squares among the N i (a)! In Nagao s approach: N i (a) square N ij (ā) = 0 Replaced by linear equations First part of the talk In Summation approach: Induces weight system on the e i s. Weighted degree is smaller. What does this mean? 28 / 38

45 Square equations and weighted structure Let Ñi be the squares among the N i (a) s. Ñ 2 i (a) = e i Ñ i (a) = e i I m,r : J m,r : N i (a) = e i N i (a) = e i I e = I m,r F[e] J e = J m,r F[e] 29 / 38

46 Square equations and weighted structure Let Ñi be the squares among the N i (a) s. Ñ 2 i (a) = e i Ñ i (a) = e i I m,r : J m,r : N i (a) = e i N i (a) = e i I e = I m,r F[e] ϕ(e i )=e w i i w i =2,w i =1 J e = J m,r F[e] Theorem With ϕ(e i ) = e w i i, I e is the radical of ϕ(j e ). Applications: Find points in V (J e ) instead of V (I e ). Weighted degree of J e is smaller than deg I e 29 / 38

47 Degree reduction in summation approach over F 2 kn Proposition: With ϕ(e i ) = e w i i, deg w J e = deg ϕ(j e) n i=1 w. i Let V J = V (J e ), V I = V (I e ). Corollary There is a constant C depending on h 1 s.t. deg w (V J ) = C deg V I 2 m g+l / 38

48 Degree reduction in summation approach over F 2 kn Proposition: With ϕ(e i ) = e w i i, deg w J e = deg ϕ(j e) n i=1 w. i Let V J = V (J e ), V I = V (I e ). Corollary There is a constant C depending on h 1 s.t. deg w (V J ) = C Let W = W n (V J ) i,j 1 V (e ij ). Experimentally, C = 2 L 1. Corollary: In PDP ng instances (m = ng), with L =length of h 1 : deg W = C n deg V I 2 m g+l 1. d old 2 (n 1)(g L+1)+n(L 1) = d old 2 (n 1)(g L+1). 30 / 38

49 Comparison of approaches after reduction With additional reductions, same reduction as in the first part of the talk. Best reduction Implementation Best running time Nagao immediate when L = 0 Easy 0.029s. Summation needs L = 0 and Tricky 0.34s. additional work In practice: better use approach of the first part. : on toy examples ( F 2 45 ) 31 / 38

50 Perspectives Limits: if g 2, can t reduce degree in odd char. Why? Degree of equations too small to exploit Frobeniuses Summation Variety not invariant under Jacobian 2-torsion Summation framework for Abelian varieties Generalization with Kummer varieties Arithmetic in g = 2 well-understood (theta functions) Explicit Jacobian summation polynomials Exploitation of more symmetries for decomposition attacks ex: set of 2-torsion points is larger in g = 2, action expresses linearly Factor base invariant under 2-torsion can be built. 32 / 38

51 1 Generalities 2 Harvesting and Decomposition attacks 3 Degree reduction and practical computations 4 Summation Ideals 5 A geometric recreation: harvesting by sieving Old-school smooth harvesting New approach: harvesting by sieving Timings 33 / 38

52 Old-school harvesting for smooth divisors non-hyperelliptic case C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = { P C(F q ) } (rational points). To find one relation: Non-hyperelliptic case [D 08] 1 Select P 1, P 2 F. 2 Compute F F q [x] describing C the line (P 1 P 2 ), with P 1, P 2 removed. 3 If F splits over F q ( div(p 1 P 2 ) is smooth ) Then relation. Else Try new P 1, P 2. 1 deg F = g 1 so probability : (g 1)! 34 / 38

53 Old-school harvesting for smooth divisors non-hyperelliptic case C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = { P C(F q ) } (rational points). To find one relation: Non-hyperelliptic case [D 08] 1 Select P 1, P 2 F. 2 Compute F F q [x] describing C the line (P 1 P 2 ), with P 1, P 2 removed. 3 If F splits over F q ( div(p 1 P 2 ) is smooth ) Then relation. Else Try new P 1, P 2. 1 deg F = g 1 so probability : (g 1)! 1 Free 2 Cheap 3 Costs g 2 log q 95% of time: checking if smooth or not and duplicate relations #F q (g 1)! tries for a relation harvesting in (g 1)!q(g 2 log q) 34 / 38

54 New approach: Harvesting by Sieving V.Vitse, A.Wallet, Improved Sieving on Algebraic curves, LatinCrypt 2015 Sieving = time-memory trade-off. Theory: Add one degree of freedom in decompositions. Practice: Store results of cheap computations. Smoothness checks Existing: [SS 14]: hyperelliptic only Cons: sort, backtracking, hyperelliptic only Our contribution: Adapt sieve to all curve types Suitable for other Index-calculus variants Compared to [SS 14]: skip computations, better memory efficiency, no sorting. 35 / 38

55 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] P 4 P 3 P 2 36 / 38

56 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] P 4 P 3 P 1 P 2 36 / 38

57 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] P 4 P 3 P 1 P 2 36 / 38

58 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] P 4 P 3 P 1 P 2 36 / 38

59 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] λ P (P i ) = λ P (P j ) P, P i, P j lined up. P 4 P 3 P 1 P 2 36 / 38

60 Illustration for non-hyperelliptic curves C : C(x, y) = 0 non-hyperelliptic of genus g 3. ([D 08] deg C g + 1) Factor base F = {P, P 1, P 2,... }. First round of sieving: fix P = (x P, y P ). Slope of a line through P: λ P (P i ) = y i y P x i x P Loop over F, compute λ P (P i ) s: (cheap!) λ P (P 1 ) λ P (P 2 ) λ P (P 3 )... P T = [ ] λ P (P i ) = λ P (P j ) P, P i, P j lined up. P 4 P 3 When T[λ i ] = g Relation! Next round: remove P from F, start again with P 1. P 1 P 2 36 / 38

61 Analysis in the non-hyperelliptic case For one loop: O(q) multiplications + O(q) storage. Harvesting in g!q. Expect q g! relations. Overall: Old-school: (g 1)!q(g 2 log q) Speed-up g log q. Relations management: Loop on P uses all lines through P: no duplicate relations. 37 / 38

62 Timings Genus 3, degree 4 Genus 4, degree 5 Genus 5, degree 6 Genus 7, degree 7 q Diem Sieving Ratio Diem Sieving Ratio Diem Sieving Ratio Diem Sieving Ratio Implementation in Magma; CPU Intel c Core i5@2.00ghz processor. Time to collect relations, expressed in seconds. 38 / 38

63 Timings [Diem-Kochinke]: > fix a singular point to start the sieving degree of polynomial by multiplicity > no more singular points? jump to another model Genus 5, degree 6 Genus 7, degree 7 q Diem & Kochinke Sieving Ratio Diem & Kochinke Sieving Ratio Implementation in Magma; CPU Intel c Core i5@2.00ghz processor. Time to collect relations, expressed in seconds. 38 / 38

The point decomposition problem in Jacobian varieties

The point decomposition problem in Jacobian varieties The point decomposition problem in Jacobian varieties Jean-Charles Faugère2, Alexandre Wallet1,2 1 2 ENS Lyon, Laboratoire LIP, Equipe AriC UPMC Univ Paris 96, CNRS, INRIA, LIP6, Equipe PolSys 1 / 19 1

More information

Calcul d indice et courbes algébriques : de meilleures récoltes

Calcul d indice et courbes algébriques : de meilleures récoltes Calcul d indice et courbes algébriques : de meilleures récoltes Alexandre Wallet ENS de Lyon, Laboratoire LIP, Equipe AriC Alexandre Wallet De meilleures récoltes dans le calcul d indice 1 / 35 Today:

More information

Cover and Decomposition Index Calculus on Elliptic Curves made practical

Cover and Decomposition Index Calculus on Elliptic Curves made practical Cover and Decomposition Index Calculus on Elliptic Curves made practical Application to a previously unreachable curve over F p 6 Vanessa VITSE Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire

More information

Problème du logarithme discret sur courbes elliptiques

Problème du logarithme discret sur courbes elliptiques Problème du logarithme discret sur courbes elliptiques Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM Groupe de travail équipe ARITH LIRMM Vanessa VITSE (UVSQ) DLP over elliptic

More information

Elliptic Curve Discrete Logarithm Problem

Elliptic Curve Discrete Logarithm Problem Elliptic Curve Discrete Logarithm Problem Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM October 19, 2009 Vanessa VITSE (UVSQ) Elliptic Curve Discrete Logarithm Problem October

More information

A variant of the F4 algorithm

A variant of the F4 algorithm A variant of the F4 algorithm Vanessa VITSE - Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire PRISM CT-RSA, February 18, 2011 Motivation Motivation An example of algebraic cryptanalysis

More information

Hyperelliptic curves

Hyperelliptic curves 1/40 Hyperelliptic curves Pierrick Gaudry Caramel LORIA CNRS, Université de Lorraine, Inria ECC Summer School 2013, Leuven 2/40 Plan What? Why? Group law: the Jacobian Cardinalities, torsion Hyperelliptic

More information

Discrete Logarithm Computation in Hyperelliptic Function Fields

Discrete Logarithm Computation in Hyperelliptic Function Fields Discrete Logarithm Computation in Hyperelliptic Function Fields Michael J. Jacobson, Jr. jacobs@cpsc.ucalgary.ca UNCG Summer School in Computational Number Theory 2016: Function Fields Mike Jacobson (University

More information

Non-generic attacks on elliptic curve DLPs

Non-generic attacks on elliptic curve DLPs Non-generic attacks on elliptic curve DLPs Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC Summer School Leuven, September 13 2013 Smith

More information

Explicit isogenies and the Discrete Logarithm Problem in genus three

Explicit isogenies and the Discrete Logarithm Problem in genus three Explicit isogenies and the Discrete Logarithm Problem in genus three Benjamin Smith INRIA Saclay Île-de-France Laboratoire d informatique de l école polytechnique (LIX) EUROCRYPT 2008 : Istanbul, April

More information

CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S. Ant nine J aux

CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S. Ant nine J aux CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S Ant nine J aux (g) CRC Press Taylor 8* Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor &

More information

Scalar multiplication in compressed coordinates in the trace-zero subgroup

Scalar multiplication in compressed coordinates in the trace-zero subgroup Scalar multiplication in compressed coordinates in the trace-zero subgroup Giulia Bianco and Elisa Gorla Institut de Mathématiques, Université de Neuchâtel Rue Emile-Argand 11, CH-2000 Neuchâtel, Switzerland

More information

Fast arithmetic and pairing evaluation on genus 2 curves

Fast arithmetic and pairing evaluation on genus 2 curves Fast arithmetic and pairing evaluation on genus 2 curves David Freeman University of California, Berkeley dfreeman@math.berkeley.edu November 6, 2005 Abstract We present two algorithms for fast arithmetic

More information

On the complexity of computing discrete logarithms in the field F

On the complexity of computing discrete logarithms in the field F On the complexity of computing discrete logarithms in the field F 3 6 509 Francisco Rodríguez-Henríquez CINVESTAV-IPN Joint work with: Gora Adj Alfred Menezes Thomaz Oliveira CINVESTAV-IPN University of

More information

A quasi polynomial algorithm for discrete logarithm in small characteristic

A quasi polynomial algorithm for discrete logarithm in small characteristic CCA seminary January 10, 2014 A quasi polynomial algorithm for discrete logarithm in small characteristic Razvan Barbulescu 1 Pierrick Gaudry 2 Antoine Joux 3 Emmanuel Thomé 2 LIX, École Polytechnique

More information

SM9 identity-based cryptographic algorithms Part 1: General

SM9 identity-based cryptographic algorithms Part 1: General SM9 identity-based cryptographic algorithms Part 1: General Contents 1 Scope... 1 2 Terms and definitions... 1 2.1 identity... 1 2.2 master key... 1 2.3 key generation center (KGC)... 1 3 Symbols and abbreviations...

More information

Discrete logarithms: Recent progress (and open problems)

Discrete logarithms: Recent progress (and open problems) Discrete logarithms: Recent progress (and open problems) CryptoExperts Chaire de Cryptologie de la Fondation de l UPMC LIP6 February 25 th, 2014 Discrete logarithms Given a multiplicative group G with

More information

Hyperelliptic Curve Cryptography

Hyperelliptic Curve Cryptography Hyperelliptic Curve Cryptography A SHORT INTRODUCTION Definition (HEC over K): Curve with equation y 2 + h x y = f x with h, f K X Genus g deg h(x) g, deg f x = 2g + 1 f monic Nonsingular 2 Nonsingularity

More information

Alternative Models: Infrastructure

Alternative Models: Infrastructure Alternative Models: Infrastructure Michael J. Jacobson, Jr. jacobs@cpsc.ucalgary.ca UNCG Summer School in Computational Number Theory 2016: Function Fields Mike Jacobson (University of Calgary) Alternative

More information

Summation polynomial algorithms for elliptic curves in characteristic two

Summation polynomial algorithms for elliptic curves in characteristic two Summation polynomial algorithms for elliptic curves in characteristic two Steven D. Galbraith and Shishay W. Gebregiyorgis Mathematics Department, University of Auckland, New Zealand. S.Galbraith@math.auckland.ac.nz,sgeb522@aucklanduni.ac.nz

More information

Elliptic and Hyperelliptic Curve Cryptography

Elliptic and Hyperelliptic Curve Cryptography Elliptic and Hyperelliptic Curve Cryptography Renate Scheidler Research supported in part by NSERC of Canada Comprehensive Source Handbook of Elliptic and Hyperelliptic Curve Cryptography Overview Motivation

More information

Definition of a finite group

Definition of a finite group Elliptic curves Definition of a finite group (G, * ) is a finite group if: 1. G is a finite set. 2. For each a and b in G, also a * b is in G. 3. There is an e in G such that for all a in G, a * e= e *

More information

Constructing genus 2 curves over finite fields

Constructing genus 2 curves over finite fields Constructing genus 2 curves over finite fields Kirsten Eisenträger The Pennsylvania State University Fq12, Saratoga Springs July 15, 2015 1 / 34 Curves and cryptography RSA: most widely used public key

More information

Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field

Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field Koh-ichi Nagao nagao@kanto-gakuin.ac.jp Dept. of Engineering, Kanto Gakuin Univ., 1-50-1 Mutsuura Higashi Kanazawa-ku

More information

Discrete Logarithm Problem

Discrete Logarithm Problem Discrete Logarithm Problem Çetin Kaya Koç koc@cs.ucsb.edu (http://cs.ucsb.edu/~koc/ecc) Elliptic Curve Cryptography lect08 discrete log 1 / 46 Exponentiation and Logarithms in a General Group In a multiplicative

More information

Elliptic Curve Cryptography with Derive

Elliptic Curve Cryptography with Derive Elliptic Curve Cryptography with Derive Johann Wiesenbauer Vienna University of Technology DES-TIME-2006, Dresden General remarks on Elliptic curves Elliptic curces can be described as nonsingular algebraic

More information

Ate Pairing on Hyperelliptic Curves

Ate Pairing on Hyperelliptic Curves Ate Pairing on Hyperelliptic Curves R. Granger, F. Hess, R. Oyono, N. Thériault F. Vercauteren EUROCRYPT 2007 - Barcelona Pairings Pairings Let G 1, G 2, G T be groups of prime order l. A pairing is a

More information

A heuristic quasi-polynomial algorithm for discrete logarithm in small characteristic

A heuristic quasi-polynomial algorithm for discrete logarithm in small characteristic ECC, Chennai October 8, 2014 A heuristic quasi-polynomial algorithm for discrete logarithm in small characteristic Razvan Barbulescu 1 Pierrick Gaudry 2 Antoine Joux 3 Emmanuel Thomé 2 IMJ-PRG, Paris Loria,

More information

Rational Points on Curves in Practice. Michael Stoll Universität Bayreuth Journées Algophantiennes Bordelaises Université de Bordeaux June 8, 2017

Rational Points on Curves in Practice. Michael Stoll Universität Bayreuth Journées Algophantiennes Bordelaises Université de Bordeaux June 8, 2017 Rational Points on Curves in Practice Michael Stoll Universität Bayreuth Journées Algophantiennes Bordelaises Université de Bordeaux June 8, 2017 The Problem Let C be a smooth projective and geometrically

More information

Outline of the Seminar Topics on elliptic curves Saarbrücken,

Outline of the Seminar Topics on elliptic curves Saarbrücken, Outline of the Seminar Topics on elliptic curves Saarbrücken, 11.09.2017 Contents A Number theory and algebraic geometry 2 B Elliptic curves 2 1 Rational points on elliptic curves (Mordell s Theorem) 5

More information

Computing L-series of geometrically hyperelliptic curves of genus three. David Harvey, Maike Massierer, Andrew V. Sutherland

Computing L-series of geometrically hyperelliptic curves of genus three. David Harvey, Maike Massierer, Andrew V. Sutherland Computing L-series of geometrically hyperelliptic curves of genus three David Harvey, Maike Massierer, Andrew V. Sutherland The zeta function Let C/Q be a smooth projective curve of genus 3 p be a prime

More information

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Jonah Brown-Cohen 1 Introduction The Diffie-Hellman protocol was one of the first methods discovered for two people, say Alice

More information

Invariants and hyperelliptic curves: geometric, arithmetic and algorithmic aspects

Invariants and hyperelliptic curves: geometric, arithmetic and algorithmic aspects Invariants and hyperelliptic curves: geometric, arithmetic and algorithmic aspects R. Lercier, C. Ritzenthaler IML - CNRS (Marseille) Luminy, October 2011 Ritzenthaler (IML) Invariants Luminy, October

More information

CORRESPONDENCE BETWEEN ELLIPTIC CURVES IN EDWARDS-BERNSTEIN AND WEIERSTRASS FORMS

CORRESPONDENCE BETWEEN ELLIPTIC CURVES IN EDWARDS-BERNSTEIN AND WEIERSTRASS FORMS CORRESPONDENCE BETWEEN ELLIPTIC CURVES IN EDWARDS-BERNSTEIN AND WEIERSTRASS FORMS DEPARTMENT OF MATHEMATICS AND STATISTICS UNIVERSITY OF OTTAWA SUPERVISOR: PROFESSOR MONICA NEVINS STUDENT: DANG NGUYEN

More information

Decomposition formula of the Jacobian group of plane curve (Draft)

Decomposition formula of the Jacobian group of plane curve (Draft) Decomposition formula of the Jacobian group of plane curve (Draft) Koh-ichi Nagao (nagao@kanto-gakuin.ac.jp) Fac. of Engineering, Kanto Gakuin Univ., Joint-work with Kazuto Matsuo(Kanagawa Univ.,) and

More information

Elliptic Curves and Public Key Cryptography

Elliptic Curves and Public Key Cryptography Elliptic Curves and Public Key Cryptography Jeff Achter January 7, 2011 1 Introduction to Elliptic Curves 1.1 Diophantine equations Many classical problems in number theory have the following form: Let

More information

Class numbers of algebraic function fields, or Jacobians of curves over finite fields

Class numbers of algebraic function fields, or Jacobians of curves over finite fields Class numbers of algebraic function fields, or Jacobians of curves over finite fields Anastassia Etropolski February 17, 2016 0 / 8 The Number Field Case The Function Field Case Class Numbers of Number

More information

Arithmétique et Cryptographie Asymétrique

Arithmétique et Cryptographie Asymétrique Arithmétique et Cryptographie Asymétrique Laurent Imbert CNRS, LIRMM, Université Montpellier 2 Journée d inauguration groupe Sécurité 23 mars 2010 This talk is about public-key cryptography Why did mathematicians

More information

Hybrid Approach : a Tool for Multivariate Cryptography

Hybrid Approach : a Tool for Multivariate Cryptography Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6

More information

Arithmetic of split Kummer surfaces: Montgomery endomorphism of Edwards products

Arithmetic of split Kummer surfaces: Montgomery endomorphism of Edwards products 1 Arithmetic of split Kummer surfaces: Montgomery endomorphism of Edwards products David Kohel Institut de Mathématiques de Luminy International Workshop on Codes and Cryptography 2011 Qingdao, 2 June

More information

The point decomposition problem in Jacobian varieties

The point decomposition problem in Jacobian varieties The point decomposition problem in Jacobian varieties Alexandre Wallet To cite this version: Alexandre Wallet. The point decomposition problem in Jacobian varieties. Data Structures and Algorithms [cs.ds].

More information

Aspects of Pairing Inversion

Aspects of Pairing Inversion Applications of Aspects of ECC 2007 - Dublin Aspects of Applications of Applications of Aspects of Applications of Pairings Let G 1, G 2, G T be groups of prime order r. A pairing is a non-degenerate bilinear

More information

COMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162

COMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162 COMPUTER ARITHMETIC 13/05/2010 cryptography - math background pp. 1 / 162 RECALL OF COMPUTER ARITHMETIC computers implement some types of arithmetic for instance, addition, subtratction, multiplication

More information

Hyperelliptic-curve cryptography. D. J. Bernstein University of Illinois at Chicago

Hyperelliptic-curve cryptography. D. J. Bernstein University of Illinois at Chicago Hyperelliptic-curve cryptography D. J. Bernstein University of Illinois at Chicago Thanks to: NSF DMS 0140542 NSF ITR 0716498 Alfred P. Sloan Foundation Two parts to this talk: 1. Elliptic curves; modern

More information

Algebraic Geometry: Elliptic Curves and 2 Theorems

Algebraic Geometry: Elliptic Curves and 2 Theorems Algebraic Geometry: Elliptic Curves and 2 Theorems Chris Zhu Mentor: Chun Hong Lo MIT PRIMES December 7, 2018 Chris Zhu Elliptic Curves and 2 Theorems December 7, 2018 1 / 16 Rational Parametrization Plane

More information

Integer factorization, part 1: the Q sieve. D. J. Bernstein

Integer factorization, part 1: the Q sieve. D. J. Bernstein Integer factorization, part 1: the Q sieve D. J. Bernstein Sieving small integers 0 using primes 3 5 7: 1 3 3 4 5 5 6 3 7 7 8 9 3 3 10 5 11 1 3 13 14 7 15 3 5 16 17 18 3 3 19 0 5 etc. Sieving and 611 +

More information

Introduction to Arithmetic Geometry Fall 2013 Lecture #24 12/03/2013

Introduction to Arithmetic Geometry Fall 2013 Lecture #24 12/03/2013 18.78 Introduction to Arithmetic Geometry Fall 013 Lecture #4 1/03/013 4.1 Isogenies of elliptic curves Definition 4.1. Let E 1 /k and E /k be elliptic curves with distinguished rational points O 1 and

More information

Chapter 8. Exploring Polynomial Functions. Jennifer Huss

Chapter 8. Exploring Polynomial Functions. Jennifer Huss Chapter 8 Exploring Polynomial Functions Jennifer Huss 8-1 Polynomial Functions The degree of a polynomial is determined by the greatest exponent when there is only one variable (x) in the polynomial Polynomial

More information

ADVANCED TOPICS IN ALGEBRAIC GEOMETRY

ADVANCED TOPICS IN ALGEBRAIC GEOMETRY ADVANCED TOPICS IN ALGEBRAIC GEOMETRY DAVID WHITE Outline of talk: My goal is to introduce a few more advanced topics in algebraic geometry but not to go into too much detail. This will be a survey of

More information

Solving a 6120-bit DLP on a Desktop Computer

Solving a 6120-bit DLP on a Desktop Computer Solving a 6120-bit DLP on a Desktop Computer Faruk Göloğlu, Robert Granger, Gary McGuire, and Jens Zumbrägel Claude Shannon Institute Complex & Adaptive Systems Laboratory School of Mathematical Sciences

More information

Computing Discrete Logarithms. Many cryptosystems could be broken if we could compute discrete logarithms quickly.

Computing Discrete Logarithms. Many cryptosystems could be broken if we could compute discrete logarithms quickly. Computing Discrete Logarithms Many cryptosystems could be broken if we could compute discrete logarithms quickly. The first discrete logarithm algorithms below apply in any group. They are about the best

More information

Distinguishing prime numbers from composite numbers: the state of the art. D. J. Bernstein University of Illinois at Chicago

Distinguishing prime numbers from composite numbers: the state of the art. D. J. Bernstein University of Illinois at Chicago Distinguishing prime numbers from composite numbers: the state of the art D. J. Bernstein University of Illinois at Chicago Is it easy to determine whether a given integer is prime? If easy means computable

More information

Fast Cryptography in Genus 2

Fast Cryptography in Genus 2 Fast Cryptography in Genus 2 Joppe W. Bos, Craig Costello, Huseyin Hisil and Kristin Lauter EUROCRYPT 2013 Athens, Greece May 27, 2013 Fast Cryptography in Genus 2 Recall that curves are much better than

More information

Counting points on curves: the general case

Counting points on curves: the general case Counting points on curves: the general case Jan Tuitman, KU Leuven October 14, 2015 Jan Tuitman, KU Leuven Counting points on curves: the general case October 14, 2015 1 / 26 Introduction Algebraic curves

More information

GENERATION OF RANDOM PICARD CURVES FOR CRYPTOGRAPHY. 1. Introduction

GENERATION OF RANDOM PICARD CURVES FOR CRYPTOGRAPHY. 1. Introduction GENERATION OF RANDOM PICARD CURVES FOR CRYPTOGRAPHY ANNEGRET WENG Abstract. Combining the ideas in [BTW] [GS], we give a efficient, low memory algorithm for computing the number of points on the Jacobian

More information

Computing discrete logarithms with pencils

Computing discrete logarithms with pencils Computing discrete logarithms with pencils Claus Diem and Sebastian Kochinke Augst 25, 2017 1 Introduction Let us consider the discrete logarithm problem for curves of a fixed genus g at least 3. In [7]

More information

Points of Finite Order

Points of Finite Order Points of Finite Order Alex Tao 23 June 2008 1 Points of Order Two and Three If G is a group with respect to multiplication and g is an element of G then the order of g is the minimum positive integer

More information

REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2

REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2 REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2 CHRISTOPHE DOCHE Abstract. In this paper we introduce so-called redundant trinomials to represent elements of nite elds of characteristic 2. The

More information

Distinguishing prime numbers from composite numbers: the state of the art. D. J. Bernstein University of Illinois at Chicago

Distinguishing prime numbers from composite numbers: the state of the art. D. J. Bernstein University of Illinois at Chicago Distinguishing prime numbers from composite numbers: the state of the art D. J. Bernstein University of Illinois at Chicago Is it easy to determine whether a given integer is prime? If easy means computable

More information

One can use elliptic curves to factor integers, although probably not RSA moduli.

One can use elliptic curves to factor integers, although probably not RSA moduli. Elliptic Curves Elliptic curves are groups created by defining a binary operation (addition) on the points of the graph of certain polynomial equations in two variables. These groups have several properties

More information

COMPRESSION FOR TRACE ZERO SUBGROUPS OF ELLIPTIC CURVES

COMPRESSION FOR TRACE ZERO SUBGROUPS OF ELLIPTIC CURVES COMPRESSION FOR TRACE ZERO SUBGROUPS OF ELLIPTIC CURVES A. SILVERBERG Abstract. We give details of a compression/decompression algorithm for points in trace zero subgroups of elliptic curves over F q r,

More information

Igusa Class Polynomials

Igusa Class Polynomials Genus 2 day, Intercity Number Theory Seminar Utrecht, April 18th 2008 Overview Igusa class polynomials are the genus 2 analogue of the classical Hilbert class polynomial. For each notion, I will 1. tell

More information

Counting points on hyperelliptic curves

Counting points on hyperelliptic curves University of New South Wales 9th November 202, CARMA, University of Newcastle Elliptic curves Let p be a prime. Let X be an elliptic curve over F p. Want to compute #X (F p ), the number of F p -rational

More information

Optimal curves of genus 1, 2 and 3

Optimal curves of genus 1, 2 and 3 Optimal curves of genus 1, 2 and 3 Christophe Ritzenthaler Institut de Mathématiques de Luminy, CNRS Leuven, 17-21 May 2010 Christophe Ritzenthaler (IML) Optimal curves of genus 1, 2 and 3 Leuven, 17-21

More information

Number of points on a family of curves over a finite field

Number of points on a family of curves over a finite field arxiv:1610.02978v1 [math.nt] 10 Oct 2016 Number of points on a family of curves over a finite field Thiéyacine Top Abstract In this paper we study a family of curves obtained by fibre products of hyperelliptic

More information

A connection between number theory and linear algebra

A connection between number theory and linear algebra A connection between number theory and linear algebra Mark Steinberger Contents 1. Some basics 1 2. Rational canonical form 2 3. Prime factorization in F[x] 4 4. Units and order 5 5. Finite fields 7 6.

More information

Congruent number elliptic curves of high rank

Congruent number elliptic curves of high rank Michaela Klopf, BSc Congruent number elliptic curves of high rank MASTER S THESIS to achieve the university degree of Diplom-Ingenieurin Master s degree programme: Mathematical Computer Science submitted

More information

Complex Algebraic Geometry: Smooth Curves Aaron Bertram, First Steps Towards Classifying Curves. The Riemann-Roch Theorem is a powerful tool

Complex Algebraic Geometry: Smooth Curves Aaron Bertram, First Steps Towards Classifying Curves. The Riemann-Roch Theorem is a powerful tool Complex Algebraic Geometry: Smooth Curves Aaron Bertram, 2010 12. First Steps Towards Classifying Curves. The Riemann-Roch Theorem is a powerful tool for classifying smooth projective curves, i.e. giving

More information

Elliptic Curves Cryptography and factorization. Part VIII. Elliptic curves cryptography and factorization. Historical Remarks.

Elliptic Curves Cryptography and factorization. Part VIII. Elliptic curves cryptography and factorization. Historical Remarks. Elliptic Curves Cryptography and factorization Part VIII Elliptic curves cryptography and factorization Cryptography based on manipulation of points of so called elliptic curves is getting momentum and

More information

FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 45

FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 45 FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 45 RAVI VAKIL CONTENTS 1. Hyperelliptic curves 1 2. Curves of genus 3 3 1. HYPERELLIPTIC CURVES A curve C of genus at least 2 is hyperelliptic if it admits a degree

More information

Superspecial curves of genus 4 in small charactersitic 8/5/2016 1

Superspecial curves of genus 4 in small charactersitic 8/5/2016 1 Superspecial curves of genus 4 in small charactersitic Mom onar i Kudo Graduate S chool of Mathemati c s, Ky ushu University, JAPAN 5 th August, @The University of Kaiserslautern, GERMANY This is a joint

More information

Fast, twist-secure elliptic curve cryptography from Q-curves

Fast, twist-secure elliptic curve cryptography from Q-curves Fast, twist-secure elliptic curve cryptography from Q-curves Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC #17, Leuven September 16,

More information

Polynomial Interpolation in the Elliptic Curve Cryptosystem

Polynomial Interpolation in the Elliptic Curve Cryptosystem Journal of Mathematics and Statistics 7 (4): 326-331, 2011 ISSN 1549-3644 2011 Science Publications Polynomial Interpolation in the Elliptic Curve Cryptosystem Liew Khang Jie and Hailiza Kamarulhaili School

More information

1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation

1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation 1 The Fundamental Theorem of Arithmetic A positive integer N has a unique prime power decomposition 2 Primality Testing Integer Factorisation (Gauss 1801, but probably known to Euclid) The Computational

More information

Finite Fields and Elliptic Curves in Cryptography

Finite Fields and Elliptic Curves in Cryptography Finite Fields and Elliptic Curves in Cryptography Frederik Vercauteren - Katholieke Universiteit Leuven - COmputer Security and Industrial Cryptography 1 Overview Public-key vs. symmetric cryptosystem

More information

Exercises for algebraic curves

Exercises for algebraic curves Exercises for algebraic curves Christophe Ritzenthaler February 18, 2019 1 Exercise Lecture 1 1.1 Exercise Show that V = {(x, y) C 2 s.t. y = sin x} is not an algebraic set. Solutions. Let us assume that

More information

LECTURE 2 FRANZ LEMMERMEYER

LECTURE 2 FRANZ LEMMERMEYER LECTURE 2 FRANZ LEMMERMEYER Last time we have seen that the proof of Fermat s Last Theorem for the exponent 4 provides us with two elliptic curves (y 2 = x 3 + x and y 2 = x 3 4x) in the guise of the quartic

More information

Algebra Homework, Edition 2 9 September 2010

Algebra Homework, Edition 2 9 September 2010 Algebra Homework, Edition 2 9 September 2010 Problem 6. (1) Let I and J be ideals of a commutative ring R with I + J = R. Prove that IJ = I J. (2) Let I, J, and K be ideals of a principal ideal domain.

More information

Elliptic Curves, Factorization, and Cryptography

Elliptic Curves, Factorization, and Cryptography Elliptic Curves, Factorization, and Cryptography Brian Rhee MIT PRIMES May 19, 2017 RATIONAL POINTS ON CONICS The following procedure yields the set of rational points on a conic C given an initial rational

More information

An introduction to supersingular isogeny-based cryptography

An introduction to supersingular isogeny-based cryptography An introduction to supersingular isogeny-based cryptography Craig Costello Summer School on Real-World Crypto and Privacy June 8, 2017 Šibenik, Croatia Towards quantum-resistant cryptosystems from supersingular

More information

Part 2 - Beginning Algebra Summary

Part 2 - Beginning Algebra Summary Part - Beginning Algebra Summary Page 1 of 4 1/1/01 1. Numbers... 1.1. Number Lines... 1.. Interval Notation.... Inequalities... 4.1. Linear with 1 Variable... 4. Linear Equations... 5.1. The Cartesian

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 2: Mathematical Concepts Divisibility Congruence Quadratic Residues

More information

MA094 Part 2 - Beginning Algebra Summary

MA094 Part 2 - Beginning Algebra Summary MA094 Part - Beginning Algebra Summary Page of 8/8/0 Big Picture Algebra is Solving Equations with Variables* Variable Variables Linear Equations x 0 MA090 Solution: Point 0 Linear Inequalities x < 0 page

More information

Introduction to Elliptic Curve Cryptography. Anupam Datta

Introduction to Elliptic Curve Cryptography. Anupam Datta Introduction to Elliptic Curve Cryptography Anupam Datta 18-733 Elliptic Curve Cryptography Public Key Cryptosystem Duality between Elliptic Curve Cryptography and Discrete Log Based Cryptography Groups

More information

A brief overwiev of pairings

A brief overwiev of pairings Bordeaux November 22, 2016 A brief overwiev of pairings Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Overview pairings 0 / 37 Plan of the lecture Pairings Pairing-friendly curves Progress of NFS attacks

More information

Elliptic curves: Theory and Applications. Day 4: The discrete logarithm problem.

Elliptic curves: Theory and Applications. Day 4: The discrete logarithm problem. Elliptic curves: Theory and Applications. Day 4: The discrete logarithm problem. Elisa Lorenzo García Université de Rennes 1 14-09-2017 Elisa Lorenzo García (Rennes 1) Elliptic Curves 4 14-09-2017 1 /

More information

Tampering attacks in pairing-based cryptography. Johannes Blömer University of Paderborn September 22, 2014

Tampering attacks in pairing-based cryptography. Johannes Blömer University of Paderborn September 22, 2014 Tampering attacks in pairing-based cryptography Johannes Blömer University of Paderborn September 22, 2014 1 / 16 Pairings Definition 1 A pairing is a bilinear, non-degenerate, and efficiently computable

More information

Elliptic Curves Spring 2013 Lecture #12 03/19/2013

Elliptic Curves Spring 2013 Lecture #12 03/19/2013 18.783 Elliptic Curves Spring 2013 Lecture #12 03/19/2013 We now consider our first practical application of elliptic curves: factoring integers. Before presenting the elliptic curve method (ECM) for factoring

More information

ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS

ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS by Balasingham Balamohan A thesis submitted to the Faculty of Graduate and Postdoctoral Studies in partial fulfillment

More information

Igusa Class Polynomials

Igusa Class Polynomials , supported by the Leiden University Fund (LUF) Joint Mathematics Meetings, San Diego, January 2008 Overview Igusa class polynomials are the genus 2 analogue of the classical Hilbert class polynomials.

More information

No.6 Selection of Secure HC of g = divisors D 1, D 2 defined on J(C; F q n) over F q n, to determine the integer m such that D 2 = md 1 (if such

No.6 Selection of Secure HC of g = divisors D 1, D 2 defined on J(C; F q n) over F q n, to determine the integer m such that D 2 = md 1 (if such Vol.17 No.6 J. Comput. Sci. & Technol. Nov. 2002 Selection of Secure Hyperelliptic Curves of g = 2 Based on a Subfield ZHANG Fangguo ( ) 1, ZHANG Futai ( Ξ) 1;2 and WANG Yumin(Π±Λ) 1 1 P.O.Box 119 Key

More information

Functional equations for Feynman integrals

Functional equations for Feynman integrals Functional equations for Feynman integrals O.V. Tarasov JINR, Dubna, Russia October 9, 016, Hayama, Japan O.V. Tarasov (JINR) Functional equations for Feynman integrals 1 / 34 Contents 1 Functional equations

More information

Curves, Cryptography, and Primes of the Form x 2 + y 2 D

Curves, Cryptography, and Primes of the Form x 2 + y 2 D Curves, Cryptography, and Primes of the Form x + y D Juliana V. Belding Abstract An ongoing challenge in cryptography is to find groups in which the discrete log problem hard, or computationally infeasible.

More information

Number Theory in Cryptology

Number Theory in Cryptology Number Theory in Cryptology Abhijit Das Department of Computer Science and Engineering Indian Institute of Technology Kharagpur October 15, 2011 What is Number Theory? Theory of natural numbers N = {1,

More information

8 Elliptic Curve Cryptography

8 Elliptic Curve Cryptography 8 Elliptic Curve Cryptography 8.1 Elliptic Curves over a Finite Field For the purposes of cryptography, we want to consider an elliptic curve defined over a finite field F p = Z/pZ for p a prime. Given

More information

On the Discrete Logarithm Problem on Algebraic Tori

On the Discrete Logarithm Problem on Algebraic Tori On the Discrete Logarithm Problem on Algebraic Tori R. Granger 1 and F. Vercauteren 2 1 University of Bristol, Department of Computer Science, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

More information

arxiv: v1 [math.nt] 31 Dec 2011

arxiv: v1 [math.nt] 31 Dec 2011 arxiv:1201.0266v1 [math.nt] 31 Dec 2011 Elliptic curves with large torsion and positive rank over number fields of small degree and ECM factorization Andrej Dujella and Filip Najman Abstract In this paper,

More information

Models of Elliptic Curves

Models of Elliptic Curves Models of Elliptic Curves Daniel J. Bernstein Tanja Lange University of Illinois at Chicago and Technische Universiteit Eindhoven djb@cr.yp.to tanja@hyperelliptic.org 26.03.2009 D. J. Bernstein & T. Lange

More information

Counting Points on Curves using Monsky-Washnitzer Cohomology

Counting Points on Curves using Monsky-Washnitzer Cohomology Counting Points on Curves using Monsky-Washnitzer Cohomology Frederik Vercauteren frederik@cs.bris.ac.uk Jan Denef jan.denef@wis.kuleuven.ac.be University of Leuven http://www.arehcc.com University of

More information

Isogeny graphs of abelian varieties and applications to the Discrete Logarithm Problem

Isogeny graphs of abelian varieties and applications to the Discrete Logarithm Problem Isogeny graphs of abelian varieties and applications to the Discrete Logarithm Problem Chloe Martindale 26th January, 2018 These notes are from a talk given in the Séminaire Géométrie et algèbre effectives

More information