Revisiting Elliptic Curve Cryptography with Applications to Post-Quantum SIDH Ciphers

Total Page:16

File Type:pdf, Size:1020Kb

Revisiting Elliptic Curve Cryptography with Applications to Post-Quantum SIDH Ciphers Revisiting Elliptic Curve Cryptography with Applications to Post-quantum SIDH Ciphers by Wesam Nabil Eid Master of Science Electrical and Computer Engineering University of New Haven 2013 A dissertation submitted to the Department of Computer Engineering and Sciences of Florida Institute of Technology in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Engineering Melbourne, Florida May, 2020 ⃝c Copyright 2020 Wesam Nabil Eid All Rights Reserved The author grants permission to make single copies We the undersigned committee hereby recommend that the attached document be accepted as fulfilling in part the requirements for the degree of Ph.D. in Computer Engineering. \Revisiting Elliptic Curve Cryptography with Applications to Post-quantum SIDH Ciphers" a dissertation by Wesam Nabil Eid Marius C. Silaghi, Ph.D. Associate Professor, Department of Computer Engineering and Sciences Major Advisor Carlos Otero, Ph.D. Associate Professor, Department of Computer Engineering and Sciences Committee Member Susan Earles, Ph.D. Associate Professor, Department of Computer Engineering and Sciences Committee Member Eugene Dshalalow, Dr.rer.nat. Professor, Department of Mathematical Sciences Committee Member Philip Bernhard, Ph.D. Associate Professor and Department Head Department of Computer Engineering and Sciences ABSTRACT Revisiting Elliptic Curve Cryptography with Applications to Post-quantum SIDH Ciphers by Wesam Nabil Eid Thesis Advisor: Marius C. Silaghi, Ph.D. Elliptic Curve Cryptography (ECC) has positioned itself as one of the most promising candidates for various applications since its introduction by Miller and Kolbitz in 1985 [53, 44]. The core operation for ECC is the scalar multiplication [k]P where many efforts have addressed its computation speed. Here we introduce an efficient approach for calculating elliptic curve operations by a novel regrouping of terms and creating new projective representation operators and increasing paral- lelism. These operators and the corresponding projective coordinate representations are shown to lead to adjusted versions of scalar multiplication algorithms that are evaluated. These techniques enable more opportunities for optimizing computations, directing to an important speed-up for every application based on elliptic curves such as encryption, crypt-analysis, digital signatures, and pseudo-random generators. Also benefiting from our work is the post-quantum cryptosystem, Supersingular Isogeny iii Diffie-Helman (SIDH). Its main weakness is elliptic curve computation complexity, that we improve, while its main quantum attacks complexity is maintained. For other elliptic curve schemes, the computation speed-up also favors attacks, which can how- ever be compensated by increasing the size of the key. In addition, we simulate the modeled design as a hardware arithmetic circuit, to further quantify the improvements that can be obtained. iv Table of Contents Abstract iii List of Figures ix List of Tables xi List of Symbols xiii Acknowlegments xiv Dedication xviii Chapter 1 Introduction 1 1.1 Motivation . .2 1.2 Summary of Ideas and Contributions . .3 1.3 Results . .4 1.4 Structure of Dissertation . .5 Chapter 2 Background 7 v Chapter 3 Fast 2nP 40 3.1 Fast nP + mQ .............................. 40 3.1.1 Fast 22P .............................. 40 3.1.2 Fast 23P .............................. 52 3.1.3 Fast 24P .............................. 61 3.1.4 Fast 3P (Point Tripling) . 71 3.1.5 Fast 2nQ + P ........................... 80 3.1.6 Fast 2nP+2Q .......................... 86 3.1.7 2nP+mQ............................. 92 3.1.8 Generalizing 2nP + Q and 2nP + mQ Forms . 98 3.1.9 Another Implementation of 6Q . 100 3.1.10 Another Implementation of 10Q . 109 3.2 Results . 112 3.3 Further optimization . 113 Chapter 4 Direct Doubling 118 4.1 Direct Doubling with Labeling . 136 4.2 Comparing Fast 2nP algorithm vs Direct Doubling . 138 Chapter 5 Other Coordinate Systems 140 5.1 Projective Coordinates . 141 5.2 Jacobian Coordinates . 149 5.3 Montgomery Coordinates . 155 vi Chapter 6 EiSi Coordinates 158 Chapter 7 Sample Applications 174 7.1 Algorithms Overview . 175 7.2 Fast Multiplication with Mixed Base Multiplicands . 177 7.2.1 Right-to-left Extensions . 178 7.2.2 Double and Add Extensions . 181 7.2.3 NAF Extensions . 182 7.3 Fast Multiplication with Base 16 Multiplicands . 186 7.4 Fast Multiplication with Base 32 Multiplicands . 187 7.5 Fast Multiplication with Base 1024 Multiplicands . 188 7.6 Inverting Multiplications based on Curve Order . 189 Chapter 8 Supersingular Isogeny Diffie-Hellman SIDH 191 8.1 Supersingular Curve and Elliptic Curve . 192 8.2 Isogenies . 194 8.3 Isomorphisms . 195 8.4 J-Invariant . 196 8.5 Computing Isogenies over Finite Field . 197 8.5.1 Finite Fields and Frobenius Isogeny . 198 8.6 SIDH and Key Exchange . 200 8.7 SIDH and Post-Quantum Cryptosystem . 202 vii Chapter 9 Results and Experiments 205 9.1 Functions Description and Properties . 206 9.2 Double-and-Add vs NAF vs Right-to-left . 209 9.3 Base 16 vs 32 vs 1024 Multiplicands . 211 9.4 Our Work vs Original . 213 9.5 EiSi Coordinates vs Others . 215 9.6 Number of Multipliers Comparison . 220 Chapter 10 Conclusion 223 References 227 viii List of Figures 2.1 Elliptic curve arithmetic hierarchy [36]. 13 2.2 Cracking the secret key. (a) Standard cells and regular routing us- ing 15K measurementskeybyte found. (b) Standard cells and regular rouing using 15K measurementskeybyte found. (c) WDDL and differ- ential routing using 1.5 M measurementskeybyte found. (d WDDL and differential routing using 1.5 M measurementskeybyte not found [38]. 38 2.3 Generation of Signed Payment [31]. 39 2.4 Validation of Signed Purchase REQ and Signed Purchase Invoice [31]. 39 3.1 Cyclic group of the elliptic curve E [63]. 45 5.1 Montgomery Doubler Implementation Flowchart. 157 7.1 Three point ladder (left-to-right) [40, 29]. 176 7.2 Right-to-left algorithm [29]. 177 7.3 Data-dependency graph for calculating a single double merged with another one (Parallelization characteristic). 178 ix 7.4 First Proposed Algorithm. 179 7.5 Left-to-Right Proposed Algorithm. 183 7.6 Left-to-Right Double-Add-and-Subtract Algorithm. 185 8.1 j-invariants in F4312 [21]. 196 8.2 SIDH Key Exchange Protocol [26]. 201 9.1 Computing the point 24P by using remi func and remi point functions. 208 9.2 Computing the point 29P by using remi func and remi point functions. 209 9.3 DA vs NAF vs RL in terms of Number of Multiplications. 211 9.4 DA vs NAF vs RL in terms of Number of Maximum Levels. 211 9.5 Base 16 vs 32 vs 1024 Multiplicands in terms of Number of Multipli- cations. 213 9.6 Base 16 vs 32 vs 1024 Multiplicands in terms of Number of Maximum Levels. 213 9.7 Base 32 vs Original algorithms in terms of Number of Multiplications. 215 9.8 Our Work vs Other Coordinates Algorithms in terms of Number of Multiplications. 217 9.9 Our Work vs Other Coordinates Algorithms in terms of Number of Maximum Levels. 218 9.10 Maximum levels for different number of multipliers. 222 x List of Tables 3.1 Algorithms Preliminary Measurements. 113 3.2 List of Labels for equations 4P, 8P and 16P. 114 4.1 Number of Mult. in Fast 2n vs Direct Doubling. 139 5.1 List of Labels for Projective Algorithms. 144 5.2 List of Labels for Jacobian Algorithms. 152 8.1 Instantiations of Diffie-Hellman. 202 9.1 DA, NAF and RL Algorithms Measurements. 210 9.2 Base 16, 32 and 1024 Algorithms Measurements. 212 9.3 Base 32 vs Original Algorithms Measurements. 214 9.4 EiSi vs Other Coordinates Measurements. 216 9.5 List of Algorithms Linear Equations. 218 9.6 Expected number of Mults and MaxLs with key of sizes 751 and 1013. 219 9.7 ∆ Values for Base 32 vs Jacobian and Base 1024 vs Montgomery. 219 xi 9.8 The number of multipliers appropriate to achieve the highest level of parallelism. 220 9.9 MaxL at Different Number of Multipliers. 221 xii List of Symbols ECC Elliptic Curve Cryptography Nxn The abscissa in EiSi coordinate Nyn The ordinate in EiSi coordinate Un The scale in EiSi coordinate a mod n The remainder of dividing a by n a (mod n) The residue classes of a modulo n, cf. Gauss a ≡ b (mod n) The residue class of a and b modulo n are the same a−1 mod n The inverse of a modulo n, 0 ≤ a−1 < n s.t. a ∗ a−1 mod n = 1 a−1 (mod n) The residue class of integers a−1, s.t. a ∗ a−1 ≡ 1 (mod n) a −1 b (mod n) a ∗ b (mod n) xiii Acknowledgements The Prophet Muhammad, peace and blessings be upon him, said, He has not thanked Allah who has not thanked people.. Graduate studies at the Florida Institute of Technology have been both challeng- ing and fun. The classes have broadened my perspective as a computer engineering graduate and provided me with the knowledge and skills needed to become an ac- complished engineering instructor, and researcher. I also found the research weekly meetings with my advisor, Dr. Marius Silaghi, where we share updates, carried out new contributions, and learned from his experience, very beneficial. This interac- tion has yielded in many ways to the successful completion of this dissertation which presents the major milestones in my graduation journey. This work would not have been possible without the blessing of Allah, support of the family, patience and sup- port of my academic advisor and financial support that I received from the Saudi Arabian Cultural Mission Scholarship (SACM). I also want to express my gratitude to Umm Al-Qura University, Makkah, KSA, which has shown the confidence in me to grant this opportunity to finish my graduate studies.
Recommended publications
  • Enumerative Geometry of Rational Space Curves
    ENUMERATIVE GEOMETRY OF RATIONAL SPACE CURVES DANIEL F. CORAY [Received 5 November 1981] Contents 1. Introduction A. Rational space curves through a given set of points 263 B. Curves on quadrics 265 2. The two modes of degeneration A. Incidence correspondences 267 B. Preliminary study of the degenerations 270 3. Multiplicities A. Transversality of the fibres 273 B. A conjecture 278 4. Determination of A2,3 A. The Jacobian curve of the associated net 282 B. The curve of moduli 283 References 287 1. Introduction A. Rational space curves through a given set of points It is a classical result of enumerative geometry that there is precisely one twisted cubic through a set of six points in general position in P3. Several proofs are available in the literature; see, for example [15, §11, Exercise 4; or 12, p. 186, Example 11]. The present paper is devoted to the generalization of this result to rational curves of higher degrees. < Let m be a positive integer; we denote by €m the Chow variety of all curves with ( degree m in PQ. As is well-known (cf. Lemma 2.4), €m has an irreducible component 0im, of dimension Am, whose general element is the Chow point of a smooth rational curve. Moreover, the Chow point of any irreducible space curve with degree m and geometric genus zero belongs to 0tm. Except for m = 1 or 2, very little is known on the geometry of this variety. So we may also say that the object of this paper is to undertake an enumerative study of the variety $%m.
    [Show full text]
  • Improved Elliptic Curve Arithmetic Over GF (P) Using Different
    Applied Mathematical Sciences, Vol. 9, 2015, no. 45, 2235 - 2243 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2015.53204 Improved Elliptic Curve Arithmetic over GF(p) Using Different Projective Coordinate System M. Lavanya Dept. of Instrumentation Engineering MIT campus, Anna University Chennai, India V. Natarajan Dept. of Instrumentation Engineering MIT campus, Anna University Chennai, India Copyright © 2014 M. Lavanya and V. Natarajan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract Elliptic curve cryptography is a public key cryptography which contains two different keys for encryption and decryption. The points on elliptic curves are represented in affine coordinates, the arithmetic on elliptic curves contain the expensive inverse operation in modular arithmetic, which increases the computation time, memory etc. Hence to avoid the inverse operation the points are represented in projective coordinate system. In this paper the different projective coordinates for different elliptic curves are derived and the number of operations for point addition in EC arithmetic are compared. Keywords: Elliptic curves, Projective coordinates, Affine coordinates, Point addition,Point doubling 1 Introduction Elliptic curves finds application in wide areas of mathematics, they are applied in various fields from cryptography to mathematical physics. Elliptic curves 2236 M. Lavanya and V. Natarajan with points in finite field are called finite groups. Elliptic curve cryptography (ECC) is a public key cryptographic system. It is based on the algebraic structure of elliptic curves over finite fields. Elliptic curve cryptography was proposed by Miller and Koblitz in 1980's.
    [Show full text]
  • Performance Comparison of Projective Elliptic- Curve Point Multiplication in 64-Bit X86 Runtime Environment Ninh Winson Nova Southeastern University, [email protected]
    Nova Southeastern University NSUWorks CEC Theses and Dissertations College of Engineering and Computing 2014 Performance Comparison of Projective Elliptic- curve Point Multiplication in 64-bit x86 Runtime Environment Ninh Winson Nova Southeastern University, [email protected] This document is a product of extensive research conducted at the Nova Southeastern University College of Engineering and Computing. For more information on research and degree programs at the NSU College of Engineering and Computing, please click here. Follow this and additional works at: https://nsuworks.nova.edu/gscis_etd Part of the Computer Sciences Commons, and the Mathematics Commons Share Feedback About This Item NSUWorks Citation Ninh Winson. 2014. Performance Comparison of Projective Elliptic-curve Point Multiplication in 64-bit x86 Runtime Environment. Doctoral dissertation. Nova Southeastern University. Retrieved from NSUWorks, Graduate School of Computer and Information Sciences. (11) https://nsuworks.nova.edu/gscis_etd/11. This Dissertation is brought to you by the College of Engineering and Computing at NSUWorks. It has been accepted for inclusion in CEC Theses and Dissertations by an authorized administrator of NSUWorks. For more information, please contact [email protected]. Performance Comparison of Projective Elliptic-curve Point Multiplication in 64-bit x86 Runtime Environment by Winston Ninh A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science Graduate School of Computer and Information Sciences Nova Southeastern University 2014 We hereby certify that this dissertation, submitted by Winston Ninh, conforms to acceptable standards and is fully adequate in scope and quality to fulfill the dissertation requirements for the degree of Doctor of Philosophy.
    [Show full text]
  • Sage 9.4 Reference Manual: Curves Release 9.4
    Sage 9.4 Reference Manual: Curves Release 9.4 The Sage Development Team Aug 24, 2021 CONTENTS 1 Curve constructor 1 2 Base class of curves 5 3 Affine curves 11 4 Projective curves 37 5 Rational points of curves 65 6 Closed points of integral curves 73 7 Jacobians of curves 79 8 Plane conics 81 9 Plane quartics 107 10 Riemann surfaces 109 11 Indices and Tables 127 Python Module Index 129 Index 131 i ii CHAPTER ONE CURVE CONSTRUCTOR Curves are constructed through the curve constructor, after an ambient space is defined either explicitly or implicitly. EXAMPLES: sage: A.<x,y>= AffineSpace(QQ,2) sage: Curve([y-x^2], A) Affine Plane Curve over Rational Field defined by -x^2 + y sage: P.<x,y,z>= ProjectiveSpace(GF(5),2) sage: Curve(y^2*z^7-x^9-x*z^8) Projective Plane Curve over Finite Field of size 5 defined by -x^9 + y^2*z^7 - x*z^8 AUTHORS: • William Stein (2005-11-13) • David Kohel (2006-01) • Grayson Jorgenson (2016-06) sage.schemes.curves.constructor.Curve(F, A=None) Return the plane or space curve defined by F, where F can be either a multivariate polynomial, a list or tuple of polynomials, or an algebraic scheme. If no ambient space is passed in for A, and if F is not an algebraic scheme, a new ambient space is constructed. Also not specifying an ambient space will cause the curve to be defined in either affine or projective space based on properties of F.
    [Show full text]
  • A Survey on Hardware Implementations of Elliptic Curve Cryptosystems
    A Survey on Hardware Implementations of Elliptic Curve Cryptosystems Bahram Rashidi Dept. of Elec. Eng., University of Ayatollah ozma Boroujerdi Boroujerd, 69199-69411, Iran E-mail: [email protected], [email protected] Abstract In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly advanced. ECC, with much smaller key sizes, offers equivalent security when compared to other asymmetric cryptosystems. In this survey, an comprehensive overview of hardware implementations of ECC is provided. We first discuss different elliptic curves, point multiplication algorithms and underling finite field operations over binary fields F2m and prime fields Fp which are used in the literature for hardware implementation. Then methods, steps and consid- erations of ECC implementation are presented. The implementations of the ECC are categorized in two main groups based on implementation technologies consist of field programmable gate array (FPGA) based imple- mentations and application specific integrated circuit (ASIC) implementations. Therefore, in these categories to have a better presentation and comparison, the implementations are presented and distinguished based on type of finite fields. The best and newest structures in the literature are described in more details for overall presentation of architectures and approaches in each group of implementations. High-speed implementation is an important factor in the ECC applications such as network servers. Also in smart cards, Wireless Sensor Networks (WSN) and Radio Frequency Identification (RFID) tags require to low-cost and lightweight implementations. Therefore, implementation methods related to these applications are explored. In addition, a classification of the previous works in terms of scalability, flexibility, performance and cost effectiveness is provided.
    [Show full text]
  • Arxiv:2001.03033V2 [Math.CA] 24 Sep 2020
    TWO DIMENSIONAL NEIGHBORHOODS OF ELLIPTIC CURVES: ANALYTIC CLASSIFICATION IN THE TORSION CASE. FRANK LORAY, FRÉDÉRIC TOUZET, AND SERGEI M. VORONIN ABSTRACT. We investigate the analytic classification of two dimensional neighborhoods of an elliptic curve with torsion normal bundle. We provide the complete analytic clas- sification for those neighborhoods in the simplest formal class and we indicate how to generalize this construction to general torsion case. CONTENTS 1. Introduction and results 1 2. Preliminary remarks 11 3. Sectorial decomposition and sectorial symmetries 13 4. Analytic classification: an overview 19 5. Construction of U'. 21 6. Construction of V'. 23 7. Foliations 24 8. Symmetries 30 9. Sectorial normalization 32 10. Generalization to the case of trivial normal bundle 45 11. Torsion normal bundle. 53 References 55 1. INTRODUCTION AND RESULTS Let C be a smooth elliptic curve: C = C=Γτ , where Γτ = Z + τZ, with =(τ) > 0. Given an embedding ι : C,! U of C into a smooth complex surface U, we would like to understand the germ (U; ι(C)) of neighborhood of ι(C) in U. Precisely, we will say that two embeddings ι, ι0 : C,! U; U 0 are (formally/analytically) equivalent if there is a (for- arXiv:2001.03033v2 [math.CA] 24 Sep 2020 mal/analytic) isomorphism Ψ:(U; ι(C)) ! (U 0; ι0(C)) between germs of neighborhoods making commutative the following diagram ι (1.1) C / U id Ψ ι0 C / U 0 The two first authors are supported by grant ANR-16-CE40-0008 “Foliage”, and thank CAPES-COFECUB project MA 932/19. The third author is supported by grant RFBR-17-01-00739-a.
    [Show full text]
  • BRNO UNIVERSITY of TECHNOLOGY Faculty of Electrical
    BRNO UNIVERSITY OF TECHNOLOGY Faculty of Electrical Engineering and Communication DOCTORAL THESIS Brno, 2019 Ing. Petr Dzurenda BRNO UNIVERSITY OF TECHNOLOGY VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ FACULTY OF ELECTRICAL ENGINEERING AND COMMUNICATION FAKULTA ELEKTROTECHNIKY A KOMUNIKAČNÍCH TECHNOLOGIÍ DEPARTMENT OF TELECOMMUNICATIONS ÚSTAV TELEKOMUNIKACÍ CRYPTOGRAPHIC PROTECTION OF DIGITAL IDENTITY KRYPTOGRAFICKÁ OCHRANA DIGITÁLNÍ IDENTITY DOCTORAL THESIS DIZERTAČNÍ PRÁCE AUTHOR Ing. Petr Dzurenda AUTOR PRÁCE SUPERVISOR doc. Ing. Jan Hajný, Ph.D. ŠKOLITEL BRNO 2019 ABSTRACT The doctoral thesis deals with privacy-preserving cryptographic schemes in access con- trol and data collection areas. Currently, card-based physical access control systems are used by most people on a daily basis, for example, at work, in public transportation and at hotels. However, these systems have often very poor cryptographic protection. For instance, user identifiers and keys can be easily eavesdropped and counterfeited. Furthermore, privacy-preserving features are almost missing and, therefore, user’s move- ment and behavior can by easily tracked. Service providers (and even eavesdroppers) can profile users, know what they do, where they go, and what they are interested in. In order to improve this state, we propose four novel cryptographic schemes based on efficient zero-knowledge proofs and elliptic curve cryptography. In particular, the thesis presents three novel privacy-friendly authentication schemes for access control and one for data collection application scenarios. The first scheme supports distributed multi-device authentication with multiple Radio-Frequency IDentification (RFID) user’s devices. This feature is particularly important in applications for controlling access to dangerous areas where the presence of protective equipment is checked during each ac- cess control session.
    [Show full text]
  • Review Article Elliptic Curve and Associate Cryptosystem
    International Journal of Modern Science and Technology Vol. 1, No. 8, November 2016. Page 269-275. http://www.ijmst.co/ ISSN: 2456-0235. Review Article Elliptic Curve and Associate Cryptosystem S. Revathi, A. R. Rishivarman Department of Mathematics, Theivanai Ammal College for Women (Autonomous) Villupuram - 605 401. Tamilnadu, India. *Corresponding author’s e-mail: [email protected] Abstract Elliptic curve is a study of points on two-variable polynomials of degree three. With curve defined over a finite field, this set of points are acted by an addition operation forms a finite group structure. Encryption and decryption transform a point into another point in the same set. Besides providing conceptual understanding, discussions are targeting the issues of security and efficiency of elliptic curve cryptosystem. Cryptography is an evolving field that research into discreet mathematical equation that is representable by computer algorithm for providing message confidentiality. The scheme has been widely used by nation-states, corporate and individual who seek privacy for data in storage and during transmission. This paper provides a ground up survey on elliptic curve cryptography. The present paper serves as a basis to understand the fundamental concept behind this cryptosystem. Moreover, we also highlight subareas of research within the scope of elliptic curve cryptosystem. Keywords: Elliptic Curve Cryptography; Finite field; Addition; Multiplication. Introduction such as ad-hoc wireless networks and mobile Public key cryptosystems are constructed by networks.There is a trend that conventional relying on the hardness of mathematical public key cryptographic systems are gradually problem. RSA based on Integer Factorization replaced with ECC systems. Problem and DH based on the Discrete In Sep’2000 Bailey and Christof Paar [14] Logarithm Problem [1].
    [Show full text]
  • Elliptic Curves OTHER BOOKS by the AUTHOR
    J.S. Milne: Elliptic Curves OTHER BOOKS BY THE AUTHOR Etale Cohomology Princeton Mathematical Series 33, Princeton University Press, 1980, 323+xiii pages, ISBN 0-691-08238-3 Hodge Cycles, Motives, and Shimura Varieties (with Pierre Deligne, Arthur Ogus, and Kuang-yen Shih) Lecture Notes in Math. 900, Springer-Verlag, 1982, 414 pages, ISBN 3-540- 11174-3 and 0-387-11174-3 Arithmetic Duality Theorems Academic Press, 1986, 421+x pages, ISBN 0-12-498040-6 Second corrected TeXed edition (paperback) BookSurge Publishing 2006, 339+viii pages, ISBN 1-4196-4274-X Elliptic Curves J.S. Milne Copyright c 2006 J.S. Milne. Single unbound paper copies for noncommercial personal use may be made without explicit permission from the copyright holder. All other rights reserved. A paperback version of this work is available from booksellers worldwide, in- cluding www.amazon.com and www.amazon.co.uk, and from the publisher: BookSurge Publishing, www.booksurge.com. Your purchase of this book will encourage the writing of more works like this. BibTeX information @book{milne2006, author={J.S. Milne}, title={Elliptic Curves}, year={2006}, publisher={BookSurge Publishers}, pages={238+viii}, isbn={1-4196-5257-5} } Library of Congress data available (www.jmilne.org/math/pBooks/) Mathematics Subject Classification (MSC2000): 11G, 11D, 14G. R The illustrations were written directly in PostScript code (by the author, ex- cept for the flying tori on the back cover, which use code written by W. Cassel- man). The Kea is a friendly intelligent parrot found only in the mountains of New Zealand. Preface In early 1996, I taught a course on elliptic curves.
    [Show full text]
  • Open Thesis Final.Pdf
    The Pennsylvania State University The Graduate School ALGORITHMS FOR ABELIAN SURFACES OVER FINITE FIELDS AND THEIR APPLICATIONS TO CRYPTOGRAPHY A Dissertation in Mathematics by Hao-Wei Chu © 2021 Hao-Wei Chu Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2021 The dissertation of Hao-Wei Chu was reviewed and approved by the following: Kirsten Eisenträger Professor of Mathematics Francis R. Pentz and Helen M. Pentz Professor of Science Dissertation Advisor Chair of Committee Jack Huizenga Associate Professor of Mathematics Wen-Ching Winnie Li Distinguished Professor of Mathematics Martin Fürer Professor of Computer Science and Engineering Alexei Novikov Professor of Mathematics Director of Graduate Studies ii Abstract This dissertation investigates two types of abelian surfaces: superspecial abelian surfaces over finite fields and abelian surfaces over number fields with complex multiplication. We generalize theorems for elliptic curves to these surfaces, and discuss their applications in cryptography. In the first part, by extending Page’s algorithm in 2014, we give a probabilistic algo- rithm that solves principal ideal problems over matrix algebras over quaternion algebras in subexponential time in the size of the ideal and the determinant of the quaternion algebra. We also discuss their applications to cryptography protocols based on isogenies on superspecial abelian surfaces. In the second part, we discuss a p-adic algorithm which computes the Igusa class poly- nomial of a quartic CM field, which encodes abelian surfaces with complex multiplication by the field. We discuss potential improvements to the canonical lifting algorithm by Carls and Lubicz in 2009, which is the core of the p-adic algorithm.
    [Show full text]
  • Efficient Computation for Hyper Elliptic Curve Based Cryptography
    University of Windsor Scholarship at UWindsor Electronic Theses and Dissertations Theses, Dissertations, and Major Papers 2016 Efficient Computationor F Hyper Elliptic Curve Based Cryptography Raqib Ahmed Asif University of Windsor Follow this and additional works at: https://scholar.uwindsor.ca/etd Recommended Citation Asif, Raqib Ahmed, "Efficient Computationor F Hyper Elliptic Curve Based Cryptography" (2016). Electronic Theses and Dissertations. 5719. https://scholar.uwindsor.ca/etd/5719 This online database contains the full-text of PhD dissertations and Masters’ theses of University of Windsor students from 1954 forward. These documents are made available for personal study and research purposes only, in accordance with the Canadian Copyright Act and the Creative Commons license—CC BY-NC-ND (Attribution, Non-Commercial, No Derivative Works). Under this license, works must always be attributed to the copyright holder (original author), cannot be used for any commercial purposes, and may not be altered. Any other use would require the permission of the copyright holder. Students may inquire about withdrawing their dissertation and/or thesis from this database. For additional inquiries, please contact the repository administrator via email ([email protected]) or by telephone at 519-253-3000ext. 3208. EFFICIENT COMPUTATION FOR HYPER ELLIPTIC CURVE BASED CRYPTOGRAPHY by RAQIB AHMED ASIF A Thesis Submitted to the Faculty of Graduate Studies through Electrical and Computer Engineering in Partial Fulfillment of the Requirements for the Degree of Master of Applied Science at the University of Windsor Windsor, Ontario, Canada 2016 © 2016 Raqib Ahmed Asif EFFICIENT COMPUTATION FOR HYPER ELLIPTIC CURVE BASED CRYPTOGRAPHY by RAQIB AHMED ASIF APPROVED BY: ______________________________________________ Dr.
    [Show full text]