Review Article Elliptic Curve and Associate Cryptosystem

Total Page:16

File Type:pdf, Size:1020Kb

Review Article Elliptic Curve and Associate Cryptosystem International Journal of Modern Science and Technology Vol. 1, No. 8, November 2016. Page 269-275. http://www.ijmst.co/ ISSN: 2456-0235. Review Article Elliptic Curve and Associate Cryptosystem S. Revathi, A. R. Rishivarman Department of Mathematics, Theivanai Ammal College for Women (Autonomous) Villupuram - 605 401. Tamilnadu, India. *Corresponding author’s e-mail: [email protected] Abstract Elliptic curve is a study of points on two-variable polynomials of degree three. With curve defined over a finite field, this set of points are acted by an addition operation forms a finite group structure. Encryption and decryption transform a point into another point in the same set. Besides providing conceptual understanding, discussions are targeting the issues of security and efficiency of elliptic curve cryptosystem. Cryptography is an evolving field that research into discreet mathematical equation that is representable by computer algorithm for providing message confidentiality. The scheme has been widely used by nation-states, corporate and individual who seek privacy for data in storage and during transmission. This paper provides a ground up survey on elliptic curve cryptography. The present paper serves as a basis to understand the fundamental concept behind this cryptosystem. Moreover, we also highlight subareas of research within the scope of elliptic curve cryptosystem. Keywords: Elliptic Curve Cryptography; Finite field; Addition; Multiplication. Introduction such as ad-hoc wireless networks and mobile Public key cryptosystems are constructed by networks.There is a trend that conventional relying on the hardness of mathematical public key cryptographic systems are gradually problem. RSA based on Integer Factorization replaced with ECC systems. Problem and DH based on the Discrete In Sep’2000 Bailey and Christof Paar [14] Logarithm Problem [1]. The main problem of showed efficient arithmetic in finite field conventional Public key Cryptosystems is that extensions with application in elliptic curve the Key size has to be sufficiently large in order cryptography. An elliptic curve coprocessor to meet the high level security requirement, based on the Montgomery algorithm for curve resulting in lower speed and consumption of multiplication can be implemented using more bandwidth [2]. generic coprocessor architecture [15]. In Elliptic curves have a rich and beautiful February, 2005, the NSA announced that it had history, having been studied by mathematicians decided on a strategy of adopting elliptic curve for over a hundred years. They have been cryptography as part of a US government standard in securing sensitive-but-unclassified deployed in diverse areas like: Number theory (proving Fermat`s Last Theorem) in 1995 [3], information. The NSA recommended group of modern physics: String theory (The notion of a algorithms called Suite B, including Elliptic- point-like particle is replaced by a curve-like Curve Menezes-Qu-Vanstone and Elliptic- string.), Elliptic Curve Cryptography (An Curve Diffie-Hellman for key agreement, and efficient public key cryptographic system) [4]. the Elliptic Curve Digital Signature Algorithm In 1985, Neal Koblitz [5] and Victor Miller [6] for digital signatures. The suite also included independently proposed using elliptic curves to AES. design public key cryptographic systems. In the In 2010 [16] Brian King provided a deterministic method that guarantees,the map of late 1990`s, ECC was standardized by a number of organizations such as ANSI [7-9], ISO a message to an elliptic curve point can be made [10,11], NIST [12,13] and it started receiving without any modification. In 1988 Koblitz commercial acceptance. Nowadays, it is mainly suggested for the first time the generalization of used in the resource constrained environments, EC to curves of higher genus namely hyper elliptic curves (HEC) [17]. Since then HEC has Received: 02.11.2016; Received after Revision: 06.11.2016; Accepted: 08.11.2016; Published: 23.11.2016 ©International Journal of Modern Science and Technology. All rights reserved. 269 Revathi and Rishivarman, 2016. Elliptic Curve and Associate Cryptosystem been analyzed and implemented in software plane models of elliptic curve, a generalisation [18,19] and hardware [20,21] both. of Edward curves introduced by Bernstein (2007). Representations of Elliptic curve Jacobian curve Various forms of elliptic curve has been It [28] is used in cryptography instead of the explored as, Weierstrass form because it can provide a Weierstrass curve defense against simple and differential power An elliptic curve over a field is defined analysis style (SPA) attacks and also faster by an equation (Weierstrass equation) arithmetic compared to the Weierstrass curve. : = Montgomery curve (1) This curve was introduced by Peter L where and Montomery [29], and it has been used since where is the discriminant of and is defined 1987 for certain computations, and in particular as follows: in different cryptography applications. (2) Mathematical Background + 4 , Definition 1 = + 4 A general equation of degree three - polynomial with two variables can be defined as If both the coordinate of the point or = (the point at infinity, infinity, or zero element. The set of points on is: (4) where the coefficient belong to any field K. Definition 2 (3) A point P in is non-singular if and Hessian curve only if the partial derivatives of f with This curve [22] was suggested for application respect to x and with respect to y are not in elliptic curve cryptography because both zero at the point P. arithmetic in this curve representation is faster Definition 3 and needs less memory than arithmetic in Let two non-singular cubic curves standard Weierstrass form. and defined over K be given by Edwards curve Weierstrass equations This curve was introduced in 2007 by Edward [23] and in Bernstein and Lange [24] pointed out several advantages of the Edwards (5) and are said to be isomorphic over if form in comparison to the more well known weierstrass form. there exist with invertible, such Twists of curve that the function is defined by the change of In mathematics an elliptic curve E over a variables field K has its quadratic twist, that is another elliptic curve which is isomorphic to E over an which transforms equation into . algebric of K. In particular, an isomorphism Definition 4 between elliptic curves is an isogeny of degree An elliptic curve is a non-singular 1,that is an invertible isogeny. Some curves cubic curve, a rational solution to = have higher order twists such as cubic and over . The set of points is given quartic twists. The curve and its twists have the by same j-invariant and is shown in [25]. Twisted Hessian curve [26] represents a generalization of Hessian curve. It was introduced in elliptic (6) curve cryptography to speed up the addition and where is the rational point at infinity. doubling formulas and to have strongly unified arithmetic. Twisted Edward curves [27] are ©International Journal of Modern Science and Technology. All rights reserved. 270 Revathi and Rishivarman, 2016. Elliptic Curve and Associate Cryptosystem Definition 5 Hence Let be an elliptic curve with integer coefficients. Under a reduction modulo , if is a non-singular curve, Associativity then is said to have a good reduction at . The proof for this property is lengthy. Only Otherwise, has bad reduction at . the simplified version will be laid here. Definition 6 Consider three points and . Let be a Given a point and an integer line through and to produce , so ∈ , a scalar multiplication on ECC is defined will be on . Let be a line as adding point o itself times such that through and to produce , so (7) will be on . Now, let be and . the line through and . Hence Definition 7 is with line . Also, An endomorphism of given by a let be the line through and . Hence rational function, is defined by is with a line . Geometrically, the two lines and are the same, which conclude the proof. Where and are rational function on and Now, let us consider an algebraic (8) formulation of the well-defined point for all arithmetic. For simplicity, consider Group Structure (9) Over where char Closure Let A line through Aline through any two non-singular points (probably the same) on a non-singular curve parallels to y-axis meets a line at infinity at will always intersect the curve at a third point. and meets at another point . Following the Commutativity composition law for inversion, this point is Let be a line through and and extend actually with its -coordinate a reflection of to a third intersection to produce . Extending at -axis. Therefore, from to would produce the same line and Let the same point of intersection. To get a point + , extend a second line from and or , to produce a third intersection or for which . Allow and for either case. Hence consider the following cases separately. If then Identity (10) Consider two points and . Extending where the slope, through and produces . Extending If but then through and results in and the If and then third intersection would be . Hence , (11) . Inverse where the slope . Consider two points and .Extend If and then through a tangent point at to produce Moreover, and such that . Let be a line The first two cases deal with adding two through and with the third different points on the curve and this operation intersection and call it . On , is known as point addition. Meanwhile, the last consider to produce on which two cases involves doubling a point and this again yield the third point at the tangent. operation is known as point doubling. Hasse's Remember tangent is considered as having two theorem on elliptic curves [30] bounds the points. number of points on an elliptic curve over a finite field above and below. If # is the ©International Journal of Modern Science and Technology. All rights reserved.
Recommended publications
  • Revisiting Elliptic Curve Cryptography with Applications to Post-Quantum SIDH Ciphers
    Revisiting Elliptic Curve Cryptography with Applications to Post-quantum SIDH Ciphers by Wesam Nabil Eid Master of Science Electrical and Computer Engineering University of New Haven 2013 A dissertation submitted to the Department of Computer Engineering and Sciences of Florida Institute of Technology in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Engineering Melbourne, Florida May, 2020 ⃝c Copyright 2020 Wesam Nabil Eid All Rights Reserved The author grants permission to make single copies We the undersigned committee hereby recommend that the attached document be accepted as fulfilling in part the requirements for the degree of Ph.D. in Computer Engineering. \Revisiting Elliptic Curve Cryptography with Applications to Post-quantum SIDH Ciphers" a dissertation by Wesam Nabil Eid Marius C. Silaghi, Ph.D. Associate Professor, Department of Computer Engineering and Sciences Major Advisor Carlos Otero, Ph.D. Associate Professor, Department of Computer Engineering and Sciences Committee Member Susan Earles, Ph.D. Associate Professor, Department of Computer Engineering and Sciences Committee Member Eugene Dshalalow, Dr.rer.nat. Professor, Department of Mathematical Sciences Committee Member Philip Bernhard, Ph.D. Associate Professor and Department Head Department of Computer Engineering and Sciences ABSTRACT Revisiting Elliptic Curve Cryptography with Applications to Post-quantum SIDH Ciphers by Wesam Nabil Eid Thesis Advisor: Marius C. Silaghi, Ph.D. Elliptic Curve Cryptography (ECC) has positioned itself as one of the most promising candidates for various applications since its introduction by Miller and Kolbitz in 1985 [53, 44]. The core operation for ECC is the scalar multiplication [k]P where many efforts have addressed its computation speed.
    [Show full text]
  • Enumerative Geometry of Rational Space Curves
    ENUMERATIVE GEOMETRY OF RATIONAL SPACE CURVES DANIEL F. CORAY [Received 5 November 1981] Contents 1. Introduction A. Rational space curves through a given set of points 263 B. Curves on quadrics 265 2. The two modes of degeneration A. Incidence correspondences 267 B. Preliminary study of the degenerations 270 3. Multiplicities A. Transversality of the fibres 273 B. A conjecture 278 4. Determination of A2,3 A. The Jacobian curve of the associated net 282 B. The curve of moduli 283 References 287 1. Introduction A. Rational space curves through a given set of points It is a classical result of enumerative geometry that there is precisely one twisted cubic through a set of six points in general position in P3. Several proofs are available in the literature; see, for example [15, §11, Exercise 4; or 12, p. 186, Example 11]. The present paper is devoted to the generalization of this result to rational curves of higher degrees. < Let m be a positive integer; we denote by €m the Chow variety of all curves with ( degree m in PQ. As is well-known (cf. Lemma 2.4), €m has an irreducible component 0im, of dimension Am, whose general element is the Chow point of a smooth rational curve. Moreover, the Chow point of any irreducible space curve with degree m and geometric genus zero belongs to 0tm. Except for m = 1 or 2, very little is known on the geometry of this variety. So we may also say that the object of this paper is to undertake an enumerative study of the variety $%m.
    [Show full text]
  • Improved Elliptic Curve Arithmetic Over GF (P) Using Different
    Applied Mathematical Sciences, Vol. 9, 2015, no. 45, 2235 - 2243 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2015.53204 Improved Elliptic Curve Arithmetic over GF(p) Using Different Projective Coordinate System M. Lavanya Dept. of Instrumentation Engineering MIT campus, Anna University Chennai, India V. Natarajan Dept. of Instrumentation Engineering MIT campus, Anna University Chennai, India Copyright © 2014 M. Lavanya and V. Natarajan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract Elliptic curve cryptography is a public key cryptography which contains two different keys for encryption and decryption. The points on elliptic curves are represented in affine coordinates, the arithmetic on elliptic curves contain the expensive inverse operation in modular arithmetic, which increases the computation time, memory etc. Hence to avoid the inverse operation the points are represented in projective coordinate system. In this paper the different projective coordinates for different elliptic curves are derived and the number of operations for point addition in EC arithmetic are compared. Keywords: Elliptic curves, Projective coordinates, Affine coordinates, Point addition,Point doubling 1 Introduction Elliptic curves finds application in wide areas of mathematics, they are applied in various fields from cryptography to mathematical physics. Elliptic curves 2236 M. Lavanya and V. Natarajan with points in finite field are called finite groups. Elliptic curve cryptography (ECC) is a public key cryptographic system. It is based on the algebraic structure of elliptic curves over finite fields. Elliptic curve cryptography was proposed by Miller and Koblitz in 1980's.
    [Show full text]
  • Performance Comparison of Projective Elliptic- Curve Point Multiplication in 64-Bit X86 Runtime Environment Ninh Winson Nova Southeastern University, [email protected]
    Nova Southeastern University NSUWorks CEC Theses and Dissertations College of Engineering and Computing 2014 Performance Comparison of Projective Elliptic- curve Point Multiplication in 64-bit x86 Runtime Environment Ninh Winson Nova Southeastern University, [email protected] This document is a product of extensive research conducted at the Nova Southeastern University College of Engineering and Computing. For more information on research and degree programs at the NSU College of Engineering and Computing, please click here. Follow this and additional works at: https://nsuworks.nova.edu/gscis_etd Part of the Computer Sciences Commons, and the Mathematics Commons Share Feedback About This Item NSUWorks Citation Ninh Winson. 2014. Performance Comparison of Projective Elliptic-curve Point Multiplication in 64-bit x86 Runtime Environment. Doctoral dissertation. Nova Southeastern University. Retrieved from NSUWorks, Graduate School of Computer and Information Sciences. (11) https://nsuworks.nova.edu/gscis_etd/11. This Dissertation is brought to you by the College of Engineering and Computing at NSUWorks. It has been accepted for inclusion in CEC Theses and Dissertations by an authorized administrator of NSUWorks. For more information, please contact [email protected]. Performance Comparison of Projective Elliptic-curve Point Multiplication in 64-bit x86 Runtime Environment by Winston Ninh A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science Graduate School of Computer and Information Sciences Nova Southeastern University 2014 We hereby certify that this dissertation, submitted by Winston Ninh, conforms to acceptable standards and is fully adequate in scope and quality to fulfill the dissertation requirements for the degree of Doctor of Philosophy.
    [Show full text]
  • Sage 9.4 Reference Manual: Curves Release 9.4
    Sage 9.4 Reference Manual: Curves Release 9.4 The Sage Development Team Aug 24, 2021 CONTENTS 1 Curve constructor 1 2 Base class of curves 5 3 Affine curves 11 4 Projective curves 37 5 Rational points of curves 65 6 Closed points of integral curves 73 7 Jacobians of curves 79 8 Plane conics 81 9 Plane quartics 107 10 Riemann surfaces 109 11 Indices and Tables 127 Python Module Index 129 Index 131 i ii CHAPTER ONE CURVE CONSTRUCTOR Curves are constructed through the curve constructor, after an ambient space is defined either explicitly or implicitly. EXAMPLES: sage: A.<x,y>= AffineSpace(QQ,2) sage: Curve([y-x^2], A) Affine Plane Curve over Rational Field defined by -x^2 + y sage: P.<x,y,z>= ProjectiveSpace(GF(5),2) sage: Curve(y^2*z^7-x^9-x*z^8) Projective Plane Curve over Finite Field of size 5 defined by -x^9 + y^2*z^7 - x*z^8 AUTHORS: • William Stein (2005-11-13) • David Kohel (2006-01) • Grayson Jorgenson (2016-06) sage.schemes.curves.constructor.Curve(F, A=None) Return the plane or space curve defined by F, where F can be either a multivariate polynomial, a list or tuple of polynomials, or an algebraic scheme. If no ambient space is passed in for A, and if F is not an algebraic scheme, a new ambient space is constructed. Also not specifying an ambient space will cause the curve to be defined in either affine or projective space based on properties of F.
    [Show full text]
  • A Survey on Hardware Implementations of Elliptic Curve Cryptosystems
    A Survey on Hardware Implementations of Elliptic Curve Cryptosystems Bahram Rashidi Dept. of Elec. Eng., University of Ayatollah ozma Boroujerdi Boroujerd, 69199-69411, Iran E-mail: [email protected], [email protected] Abstract In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly advanced. ECC, with much smaller key sizes, offers equivalent security when compared to other asymmetric cryptosystems. In this survey, an comprehensive overview of hardware implementations of ECC is provided. We first discuss different elliptic curves, point multiplication algorithms and underling finite field operations over binary fields F2m and prime fields Fp which are used in the literature for hardware implementation. Then methods, steps and consid- erations of ECC implementation are presented. The implementations of the ECC are categorized in two main groups based on implementation technologies consist of field programmable gate array (FPGA) based imple- mentations and application specific integrated circuit (ASIC) implementations. Therefore, in these categories to have a better presentation and comparison, the implementations are presented and distinguished based on type of finite fields. The best and newest structures in the literature are described in more details for overall presentation of architectures and approaches in each group of implementations. High-speed implementation is an important factor in the ECC applications such as network servers. Also in smart cards, Wireless Sensor Networks (WSN) and Radio Frequency Identification (RFID) tags require to low-cost and lightweight implementations. Therefore, implementation methods related to these applications are explored. In addition, a classification of the previous works in terms of scalability, flexibility, performance and cost effectiveness is provided.
    [Show full text]
  • Arxiv:2001.03033V2 [Math.CA] 24 Sep 2020
    TWO DIMENSIONAL NEIGHBORHOODS OF ELLIPTIC CURVES: ANALYTIC CLASSIFICATION IN THE TORSION CASE. FRANK LORAY, FRÉDÉRIC TOUZET, AND SERGEI M. VORONIN ABSTRACT. We investigate the analytic classification of two dimensional neighborhoods of an elliptic curve with torsion normal bundle. We provide the complete analytic clas- sification for those neighborhoods in the simplest formal class and we indicate how to generalize this construction to general torsion case. CONTENTS 1. Introduction and results 1 2. Preliminary remarks 11 3. Sectorial decomposition and sectorial symmetries 13 4. Analytic classification: an overview 19 5. Construction of U'. 21 6. Construction of V'. 23 7. Foliations 24 8. Symmetries 30 9. Sectorial normalization 32 10. Generalization to the case of trivial normal bundle 45 11. Torsion normal bundle. 53 References 55 1. INTRODUCTION AND RESULTS Let C be a smooth elliptic curve: C = C=Γτ , where Γτ = Z + τZ, with =(τ) > 0. Given an embedding ι : C,! U of C into a smooth complex surface U, we would like to understand the germ (U; ι(C)) of neighborhood of ι(C) in U. Precisely, we will say that two embeddings ι, ι0 : C,! U; U 0 are (formally/analytically) equivalent if there is a (for- arXiv:2001.03033v2 [math.CA] 24 Sep 2020 mal/analytic) isomorphism Ψ:(U; ι(C)) ! (U 0; ι0(C)) between germs of neighborhoods making commutative the following diagram ι (1.1) C / U id Ψ ι0 C / U 0 The two first authors are supported by grant ANR-16-CE40-0008 “Foliage”, and thank CAPES-COFECUB project MA 932/19. The third author is supported by grant RFBR-17-01-00739-a.
    [Show full text]
  • BRNO UNIVERSITY of TECHNOLOGY Faculty of Electrical
    BRNO UNIVERSITY OF TECHNOLOGY Faculty of Electrical Engineering and Communication DOCTORAL THESIS Brno, 2019 Ing. Petr Dzurenda BRNO UNIVERSITY OF TECHNOLOGY VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ FACULTY OF ELECTRICAL ENGINEERING AND COMMUNICATION FAKULTA ELEKTROTECHNIKY A KOMUNIKAČNÍCH TECHNOLOGIÍ DEPARTMENT OF TELECOMMUNICATIONS ÚSTAV TELEKOMUNIKACÍ CRYPTOGRAPHIC PROTECTION OF DIGITAL IDENTITY KRYPTOGRAFICKÁ OCHRANA DIGITÁLNÍ IDENTITY DOCTORAL THESIS DIZERTAČNÍ PRÁCE AUTHOR Ing. Petr Dzurenda AUTOR PRÁCE SUPERVISOR doc. Ing. Jan Hajný, Ph.D. ŠKOLITEL BRNO 2019 ABSTRACT The doctoral thesis deals with privacy-preserving cryptographic schemes in access con- trol and data collection areas. Currently, card-based physical access control systems are used by most people on a daily basis, for example, at work, in public transportation and at hotels. However, these systems have often very poor cryptographic protection. For instance, user identifiers and keys can be easily eavesdropped and counterfeited. Furthermore, privacy-preserving features are almost missing and, therefore, user’s move- ment and behavior can by easily tracked. Service providers (and even eavesdroppers) can profile users, know what they do, where they go, and what they are interested in. In order to improve this state, we propose four novel cryptographic schemes based on efficient zero-knowledge proofs and elliptic curve cryptography. In particular, the thesis presents three novel privacy-friendly authentication schemes for access control and one for data collection application scenarios. The first scheme supports distributed multi-device authentication with multiple Radio-Frequency IDentification (RFID) user’s devices. This feature is particularly important in applications for controlling access to dangerous areas where the presence of protective equipment is checked during each ac- cess control session.
    [Show full text]
  • Elliptic Curves OTHER BOOKS by the AUTHOR
    J.S. Milne: Elliptic Curves OTHER BOOKS BY THE AUTHOR Etale Cohomology Princeton Mathematical Series 33, Princeton University Press, 1980, 323+xiii pages, ISBN 0-691-08238-3 Hodge Cycles, Motives, and Shimura Varieties (with Pierre Deligne, Arthur Ogus, and Kuang-yen Shih) Lecture Notes in Math. 900, Springer-Verlag, 1982, 414 pages, ISBN 3-540- 11174-3 and 0-387-11174-3 Arithmetic Duality Theorems Academic Press, 1986, 421+x pages, ISBN 0-12-498040-6 Second corrected TeXed edition (paperback) BookSurge Publishing 2006, 339+viii pages, ISBN 1-4196-4274-X Elliptic Curves J.S. Milne Copyright c 2006 J.S. Milne. Single unbound paper copies for noncommercial personal use may be made without explicit permission from the copyright holder. All other rights reserved. A paperback version of this work is available from booksellers worldwide, in- cluding www.amazon.com and www.amazon.co.uk, and from the publisher: BookSurge Publishing, www.booksurge.com. Your purchase of this book will encourage the writing of more works like this. BibTeX information @book{milne2006, author={J.S. Milne}, title={Elliptic Curves}, year={2006}, publisher={BookSurge Publishers}, pages={238+viii}, isbn={1-4196-5257-5} } Library of Congress data available (www.jmilne.org/math/pBooks/) Mathematics Subject Classification (MSC2000): 11G, 11D, 14G. R The illustrations were written directly in PostScript code (by the author, ex- cept for the flying tori on the back cover, which use code written by W. Cassel- man). The Kea is a friendly intelligent parrot found only in the mountains of New Zealand. Preface In early 1996, I taught a course on elliptic curves.
    [Show full text]
  • Open Thesis Final.Pdf
    The Pennsylvania State University The Graduate School ALGORITHMS FOR ABELIAN SURFACES OVER FINITE FIELDS AND THEIR APPLICATIONS TO CRYPTOGRAPHY A Dissertation in Mathematics by Hao-Wei Chu © 2021 Hao-Wei Chu Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2021 The dissertation of Hao-Wei Chu was reviewed and approved by the following: Kirsten Eisenträger Professor of Mathematics Francis R. Pentz and Helen M. Pentz Professor of Science Dissertation Advisor Chair of Committee Jack Huizenga Associate Professor of Mathematics Wen-Ching Winnie Li Distinguished Professor of Mathematics Martin Fürer Professor of Computer Science and Engineering Alexei Novikov Professor of Mathematics Director of Graduate Studies ii Abstract This dissertation investigates two types of abelian surfaces: superspecial abelian surfaces over finite fields and abelian surfaces over number fields with complex multiplication. We generalize theorems for elliptic curves to these surfaces, and discuss their applications in cryptography. In the first part, by extending Page’s algorithm in 2014, we give a probabilistic algo- rithm that solves principal ideal problems over matrix algebras over quaternion algebras in subexponential time in the size of the ideal and the determinant of the quaternion algebra. We also discuss their applications to cryptography protocols based on isogenies on superspecial abelian surfaces. In the second part, we discuss a p-adic algorithm which computes the Igusa class poly- nomial of a quartic CM field, which encodes abelian surfaces with complex multiplication by the field. We discuss potential improvements to the canonical lifting algorithm by Carls and Lubicz in 2009, which is the core of the p-adic algorithm.
    [Show full text]
  • Efficient Computation for Hyper Elliptic Curve Based Cryptography
    University of Windsor Scholarship at UWindsor Electronic Theses and Dissertations Theses, Dissertations, and Major Papers 2016 Efficient Computationor F Hyper Elliptic Curve Based Cryptography Raqib Ahmed Asif University of Windsor Follow this and additional works at: https://scholar.uwindsor.ca/etd Recommended Citation Asif, Raqib Ahmed, "Efficient Computationor F Hyper Elliptic Curve Based Cryptography" (2016). Electronic Theses and Dissertations. 5719. https://scholar.uwindsor.ca/etd/5719 This online database contains the full-text of PhD dissertations and Masters’ theses of University of Windsor students from 1954 forward. These documents are made available for personal study and research purposes only, in accordance with the Canadian Copyright Act and the Creative Commons license—CC BY-NC-ND (Attribution, Non-Commercial, No Derivative Works). Under this license, works must always be attributed to the copyright holder (original author), cannot be used for any commercial purposes, and may not be altered. Any other use would require the permission of the copyright holder. Students may inquire about withdrawing their dissertation and/or thesis from this database. For additional inquiries, please contact the repository administrator via email ([email protected]) or by telephone at 519-253-3000ext. 3208. EFFICIENT COMPUTATION FOR HYPER ELLIPTIC CURVE BASED CRYPTOGRAPHY by RAQIB AHMED ASIF A Thesis Submitted to the Faculty of Graduate Studies through Electrical and Computer Engineering in Partial Fulfillment of the Requirements for the Degree of Master of Applied Science at the University of Windsor Windsor, Ontario, Canada 2016 © 2016 Raqib Ahmed Asif EFFICIENT COMPUTATION FOR HYPER ELLIPTIC CURVE BASED CRYPTOGRAPHY by RAQIB AHMED ASIF APPROVED BY: ______________________________________________ Dr.
    [Show full text]