Mathematics of Isogeny Based Cryptography
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Zero Correlation Linear Cryptanalysis on LEA Family Ciphers
Journal of Communications Vol. 11, No. 7, July 2016 Zero Correlation Linear Cryptanalysis on LEA Family Ciphers Kai Zhang, Jie Guan, and Bin Hu Information Science and Technology Institute, Zhengzhou 450000, China Email: [email protected]; [email protected]; [email protected] Abstract—In recent two years, zero correlation linear Zero correlation linear cryptanalysis was firstly cryptanalysis has shown its great potential in cryptanalysis and proposed by Andrey Bogdanov and Vicent Rijmen in it has proven to be effective against massive ciphers. LEA is a 2011 [2], [3]. Generally speaking, this cryptanalytic block cipher proposed by Deukjo Hong, who is the designer of method can be concluded as “use linear approximation of an ISO standard block cipher - HIGHT. This paper evaluates the probability 1/2 to eliminate the wrong key candidates”. security level on LEA family ciphers against zero correlation linear cryptanalysis. Firstly, we identify some 9-round zero However, in this basic model of zero correlation linear correlation linear hulls for LEA. Accordingly, we propose a cryptanalysis, the data complexity is about half of the full distinguishing attack on all variants of 9-round LEA family code book. The high data complexity greatly limits the ciphers. Then we propose the first zero correlation linear application of this new method. In FSE 2012, multiple cryptanalysis on 13-round LEA-192 and 14-round LEA-256. zero correlation linear cryptanalysis [4] was proposed For 13-round LEA-192, we propose a key recovery attack with which use multiple zero correlation linear approximations time complexity of 2131.30 13-round LEA encryptions, data to reduce the data complexity. -
13 Elliptic Function
13 Elliptic Function Recall that a function g : C → Cˆ is an elliptic function if it is meromorphic and there exists a lattice L = {mω1 + nω2 | m, n ∈ Z} such that g(z + ω)= g(z) for all z ∈ C and all ω ∈ L where ω1,ω2 are complex numbers that are R-linearly independent. We have shown that an elliptic function cannot be holomorphic, the number of its poles are finite and the sum of their residues is zero. Lemma 13.1 A non-constant elliptic function f always has the same number of zeros mod- ulo its associated lattice L as it does poles, counting multiplicites of zeros and orders of poles. Proof: Consider the function f ′/f, which is also an elliptic function with associated lattice L. We will evaluate the sum of the residues of this function in two different ways as above. Then this sum is zero, and by the argument principle from complex analysis 31, it is precisely the number of zeros of f counting multiplicities minus the number of poles of f counting orders. Corollary 13.2 A non-constant elliptic function f always takes on every value in Cˆ the same number of times modulo L, counting multiplicities. Proof: Given a complex value b, consider the function f −b. This function is also an elliptic function, and one with the same poles as f. By Theorem above, it therefore has the same number of zeros as f. Thus, f must take on the value b as many times as it does 0. -
On the NIST Lightweight Cryptography Standardization
On the NIST Lightweight Cryptography Standardization Meltem S¨onmez Turan NIST Lightweight Cryptography Team ECC 2019: 23rd Workshop on Elliptic Curve Cryptography December 2, 2019 Outline • NIST's Cryptography Standards • Overview - Lightweight Cryptography • NIST Lightweight Cryptography Standardization Process • Announcements 1 NIST's Cryptography Standards National Institute of Standards and Technology • Non-regulatory federal agency within U.S. Department of Commerce. • Founded in 1901, known as the National Bureau of Standards (NBS) prior to 1988. • Headquarters in Gaithersburg, Maryland, and laboratories in Boulder, Colorado. • Employs around 6,000 employees and associates. NIST's Mission to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. 2 NIST Organization Chart Laboratory Programs Computer Security Division • Center for Nanoscale Science and • Cryptographic Technology Technology • Secure Systems and Applications • Communications Technology Lab. • Security Outreach and Integration • Engineering Lab. • Security Components and Mechanisms • Information Technology Lab. • Security Test, Validation and • Material Measurement Lab. Measurements • NIST Center for Neutron Research • Physical Measurement Lab. Information Technology Lab. • Advanced Network Technologies • Applied and Computational Mathematics • Applied Cybersecurity • Computer Security • Information Access • Software and Systems • Statistical -
LEA 192: High Speed Architecture of Lightweight Block Cipher
International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-2S, December 2019 LEA 192: High Speed Architecture of Lightweight Block Cipher Zeesha Mishra, Shubham Mishra, Bibhudendra Acharya The communication among connected things must be secure Abstract: High-throughput lightweight cryptography and fast while processing confidential data. Due to a calculation is the need of the present world to convey between two substantial amount of sensitive and valuable data and low asset obliged devices Pipelining is the technique have been used computational resources in the network, it has become to achieve high throughput. In this paper we have target to cumbersome to provide security in the IoT[2]. lightweight block cipher LEA. Block size of LEA is 128 and key Resource-constrained applications comprising of sensor size 128, 192, and 256 bit. In this paper we have focus on LEA architecture for 192- bit key size and achieve very good nodes in wireless sensor networks, RFID tags require smaller throughput. This method has a higher capability of throughput as footprint with minimum battery consumption. compared to previous LEA ciphers. Proposed work is 56% LEA[3] is a lightweight block cipher. LEA has 128-bit improved version of compared paper for respective Speed and block size with 128, 192, 256-bit key sizes and rounds 24, 28 area also less than previous architecture. Graph representation and 32 respectively. LEA supports simple ARX (addition have been shown of different matrices and comparison. rotation XOR ) operation, LEA is not using complex S-box Keywords : ARX, Block Cipher, Cryptography, LEA, structure like AES [4] hence it will give high-speed Lightweight, Pipeline, Throughput. -
ELLIPTIC FUNCTIONS (Approach of Abel and Jacobi)
Math 213a (Fall 2021) Yum-Tong Siu 1 ELLIPTIC FUNCTIONS (Approach of Abel and Jacobi) Significance of Elliptic Functions. Elliptic functions and their associated theta functions are a new class of special functions which play an impor- tant role in explicit solutions of real world problems. Elliptic functions as meromorphic functions on compact Riemann surfaces of genus 1 and their associated theta functions as holomorphic sections of holomorphic line bun- dles on compact Riemann surfaces pave the way for the development of the theory of Riemann surfaces and higher-dimensional abelian varieties. Two Approaches to Elliptic Function Theory. One approach (which we call the approach of Abel and Jacobi) follows the historic development with motivation from real-world problems and techniques developed for solving the difficulties encountered. One starts with the inverse of an elliptic func- tion defined by an indefinite integral whose integrand is the reciprocal of the square root of a quartic polynomial. An obstacle is to show that the inverse function of the indefinite integral is a global meromorphic function on C with two R-linearly independent primitive periods. The resulting dou- bly periodic meromorphic functions are known as Jacobian elliptic functions, though Abel was actually the first mathematician who succeeded in inverting such an indefinite integral. Nowadays, with the use of the notion of a Rie- mann surface, the inversion can be handled by using the fundamental group of the Riemann surface constructed to make the square root of the quartic polynomial single-valued. The great advantage of this approach is that there is vast literature for the properties of the Jacobain elliptic functions and of their associated Jacobian theta functions. -
Abelian Varieties
Abelian Varieties J.S. Milne Version 2.0 March 16, 2008 These notes are an introduction to the theory of abelian varieties, including the arithmetic of abelian varieties and Faltings’s proof of certain finiteness theorems. The orginal version of the notes was distributed during the teaching of an advanced graduate course. Alas, the notes are still in very rough form. BibTeX information @misc{milneAV, author={Milne, James S.}, title={Abelian Varieties (v2.00)}, year={2008}, note={Available at www.jmilne.org/math/}, pages={166+vi} } v1.10 (July 27, 1998). First version on the web, 110 pages. v2.00 (March 17, 2008). Corrected, revised, and expanded; 172 pages. Available at www.jmilne.org/math/ Please send comments and corrections to me at the address on my web page. The photograph shows the Tasman Glacier, New Zealand. Copyright c 1998, 2008 J.S. Milne. Single paper copies for noncommercial personal use may be made without explicit permis- sion from the copyright holder. Contents Introduction 1 I Abelian Varieties: Geometry 7 1 Definitions; Basic Properties. 7 2 Abelian Varieties over the Complex Numbers. 10 3 Rational Maps Into Abelian Varieties . 15 4 Review of cohomology . 20 5 The Theorem of the Cube. 21 6 Abelian Varieties are Projective . 27 7 Isogenies . 32 8 The Dual Abelian Variety. 34 9 The Dual Exact Sequence. 41 10 Endomorphisms . 42 11 Polarizations and Invertible Sheaves . 53 12 The Etale Cohomology of an Abelian Variety . 54 13 Weil Pairings . 57 14 The Rosati Involution . 61 15 Geometric Finiteness Theorems . 63 16 Families of Abelian Varieties . -
State of the Art in Lightweight Symmetric Cryptography
State of the Art in Lightweight Symmetric Cryptography Alex Biryukov1 and Léo Perrin2 1 SnT, CSC, University of Luxembourg, [email protected] 2 SnT, University of Luxembourg, [email protected] Abstract. Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a “lightweight” algorithm is usually designed to satisfy. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (nist...) and international (iso/iec...) standards are listed. We then discuss some trends we identified in the design of lightweight algorithms, namely the designers’ preference for arx-based and bitsliced-S-Box-based designs and simple key schedules. Finally, we argue that lightweight cryptography is too large a field and that it should be split into two related but distinct areas: ultra-lightweight and IoT cryptography. The former deals only with the smallest of devices for which a lower security level may be justified by the very harsh design constraints. The latter corresponds to low-power embedded processors for which the Aes and modern hash function are costly but which have to provide a high level security due to their greater connectivity. Keywords: Lightweight cryptography · Ultra-Lightweight · IoT · Internet of Things · SoK · Survey · Standards · Industry 1 Introduction The Internet of Things (IoT) is one of the foremost buzzwords in computer science and information technology at the time of writing. -
Lecture 9 Riemann Surfaces, Elliptic Functions Laplace Equation
Lecture 9 Riemann surfaces, elliptic functions Laplace equation Consider a Riemannian metric gµν in two dimensions. In two dimensions it is always possible to choose coordinates (x,y) to diagonalize it as ds2 = Ω(x,y)(dx2 + dy2). We can then combine them into a complex combination z = x+iy to write this as ds2 =Ωdzdz¯. It is actually a K¨ahler metric since the condition ∂[i,gj]k¯ = 0 is trivial if i, j = 1. Thus, an orientable Riemannian manifold in two dimensions is always K¨ahler. In the diagonalized form of the metric, the Laplace operator is of the form, −1 ∆=4Ω ∂z∂¯z¯. Thus, any solution to the Laplace equation ∆φ = 0 can be expressed as a sum of a holomorphic and an anti-holomorphid function. ∆φ = 0 φ = f(z)+ f¯(¯z). → In the following, we assume Ω = 1 so that the metric is ds2 = dzdz¯. It is not difficult to generalize our results for non-constant Ω. Now, we would like to prove the following formula, 1 ∂¯ = πδ(z), z − where δ(z) = δ(x)δ(y). Since 1/z is holomorphic except at z = 0, the left-hand side should vanish except at z = 0. On the other hand, by the Stokes theorem, the integral of the left-hand side on a disk of radius r gives, 1 i dz dxdy ∂¯ = = π. Zx2+y2≤r2 z 2 I|z|=r z − This proves the formula. Thus, the Green function G(z, w) obeying ∆zG(z, w) = 4πδ(z w), − should behave as G(z, w)= log z w 2 = log(z w) log(¯z w¯), − | − | − − − − near z = w. -
Tongan Ways of Talking
TONGAN WAYS OF TALKING MELENAITE TAUMOEFOLAU University of Auckland Some excellent work has been published on Tongan speech levels from a sociolinguistic perspective (e.g., Philips 1991). The purpose of this article is to contribute to the literature by describing some important, not previously well-described features of ways of talking (WOT) in Tongan. I will use as my theoretical framework George Grace’s theory of language; he argued that a language is “a generalized way of talking about things” (Grace 1987: 99), a device for saying things, and it is, in turn, made up of “conventionalized ways of talking about consecrated subject-matters” (p. 103). In this article I will distinguish the following “ways of talking” (WOT):1 WOT 1. lea fakatu‘i—way of talking to or about the monarch/king (tu‘i) WOT 2. lea fakahouhou‘eiki—way of talking to or about chiefly people (hou‘eiki) WOT 3. lea fakamatäpule—polite way of talking that is characteristic of titled orators (matäpule) WOT 4. lea fakatökilalo / faka‘aki‘akimui—self-derogatory way of talking when addressing those of higher rank WOT 5. lea tavale—way of talking to a person with whom one is familiar or with whom one is socially equal, or way of talking to or about commoners (tu‘a) WOT 6. lea ‘ita—abusive way of talking Here I make four main claims about Tongan ways of talking: • The number of registers described for Tongan has been underestimated. I distinguish six (above) instead of the three that are traditionally described: of king—tu‘i, of chiefs—hou‘eiki, of commoners—tu‘a. -
Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPECK
cryptography Article Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPECK Sarah A. Alzakari * and Poorvi L. Vora Department of Computer Science, The George Washington University, 800 22nd St. NW, Washington, DC 20052, USA; [email protected] * Correspondence: [email protected] Abstract: We apply McKay’s pseudo-linear approximation of addition modular 2n to lightweight ARX block ciphers with large words, specifically the SPECK family. We demonstrate that a pseudo- linear approximation can be combined with a linear approximation using the meet-in-the-middle attack technique to recover several key bits. Thus we illustrate improvements to SPECK linear distinguishers based solely on Cho–Pieprzyk approximations by combining them with pseudo-linear approximations, and propose key recovery attacks. Keywords: SPECK; pseudo-linear cryptanalysis; linear cryptanalysis; partly-pseudo-linear attack 1. Introduction ARX block ciphers—which rely on Addition-Rotation-XOR operations performed a number of times—provide a common approach to lightweight cipher design. In June 2013, a group of inventors from the US’s National Security Agency (NSA) proposed two families of lightweight block ciphers, SIMON and SPECK—each of which comes in a variety of widths and key sizes. The SPECK cipher, as an ARX cipher, provides efficient software implementations, while SIMON provides efficient hardware implementations. Moreover, both families perform well in both hardware and software and offer the flexibility across Citation: Alzakari, S.; Vora, P. different platforms that will be required by future applications [1,2]. In this paper, we focus Partly-Pseudo-Linear Cryptanalysis on the SPECK family as an example lightweight ARX block cipher to illustrate our attack. -
NOTES on ELLIPTIC CURVES Contents 1
NOTES ON ELLIPTIC CURVES DINO FESTI Contents 1. Introduction: Solving equations 1 1.1. Equation of degree one in one variable 2 1.2. Equations of higher degree in one variable 2 1.3. Equations of degree one in more variables 3 1.4. Equations of degree two in two variables: plane conics 4 1.5. Exercises 5 2. Cubic curves and Weierstrass form 6 2.1. Weierstrass form 6 2.2. First definition of elliptic curves 8 2.3. The j-invariant 10 2.4. Exercises 11 3. Rational points of an elliptic curve 11 3.1. The group law 11 3.2. Points of finite order 13 3.3. The Mordell{Weil theorem 14 3.4. Isogenies 14 3.5. Exercises 15 4. Elliptic curves over C 16 4.1. Ellipses and elliptic curves 16 4.2. Lattices and elliptic functions 17 4.3. The Weierstrass } function 18 4.4. Exercises 22 5. Isogenies and j-invariant: revisited 22 5.1. Isogenies 22 5.2. The group SL2(Z) 24 5.3. The j-function 25 5.4. Exercises 27 References 27 1. Introduction: Solving equations Solving equations or, more precisely, finding the zeros of a given equation has been one of the first reasons to study mathematics, since the ancient times. The branch of mathematics devoted to solving equations is called Algebra. We are going Date: August 13, 2017. 1 2 DINO FESTI to see how elliptic curves represent a very natural and important step in the study of solutions of equations. Since 19th century it has been proved that Geometry is a very powerful tool in order to study Algebra. -
Elliptic Curves, Isogenies, and Endomorphism Rings
Elliptic curves, isogenies, and endomorphism rings Jana Sot´akov´a QuSoft/University of Amsterdam July 23, 2020 Abstract Protocols based on isogenies of elliptic curves are one of the hot topic in post-quantum cryptography, unique in their computational assumptions. This note strives to explain the beauty of the isogeny landscape to students in number theory using three different isogeny graphs - nice cycles and the Schreier graphs of group actions in the commutative isogeny-based cryptography, the beautiful isogeny volcanoes that we can walk up and down, and the Ramanujan graphs of SIDH. This is a written exposition 1 of the talk I gave at the ANTS summer school 2020, available online at https://youtu.be/hHD1tqFqjEQ?t=4. Contents 1 Introduction 1 2 Background 2 2.1 Elliptic curves . .2 2.2 Isogenies . .3 2.3 Endomorphisms . .4 2.4 From ideals to isogenies . .6 3 CM and commutative isogeny-based protocols 7 3.1 The main theorem of complex multiplication . .7 3.2 Diffie-Hellman using groups . .7 3.3 Diffie-Hellman using group actions . .8 3.4 Commutative isogeny-based cryptography . .8 3.5 Isogeny graphs . .9 4 Other `-isogenies 10 5 Supersingular isogeny graphs 13 5.1 Supersingular curves and isogenies . 13 5.2 SIDH . 15 6 Conclusions 16 1Please contact me with any comments or remarks at [email protected]. 1 1 Introduction There are three different aspects of isogenies in cryptography, roughly corresponding to three different isogeny graphs: unions of cycles as used in CSIDH, isogeny volcanoes as first studied by Kohel, and Ramanujan graphs upon which SIDH and SIKE are built.