Public-Key Cryptography Before 1985 RSA Finite Fields

Public-Key Cryptography Before 1985 RSA Finite Fields

Public-Key Cryptography Before 1985 Two public-key families emerged that were commercially The Elliptic Curve Discrete Logarithm Problem: viable: State of the Art 1. RSA Alfred Menezes (based on integer factorization) 2. Diffie-Hellman/ElGamal (based on the finite field discrete logarithm problem) –1 –2 RSA Finite Fields Invented by Rivest, Shamir and Adleman in 1977. Let q = pm be a prime power. Security is based on the hardness of the problem of There is a unique finite field Fq of size q. factoring an integer n that is the product of two primes p and q of the same bitlength. Example: Prime Fields Fp Integers modulo p: Z = 0, 1, 2,...,p 1 . 1/2 p In 1985, n could be factored in subexponential time 2(log n) { − } (using the ‘quadratic sieve’ algorithm). Example: Binary Fields F2m Binary polynomials modulo an irreducible polynomial. Consequence: For a 64-bit level of security, one needed ∗ 512 F F n 2 . The nonzero elements of q form a cyclic group q of size ≈ q 1. − Fully exponential time: 2c(log n) = nc [terribly inefficient] Let g be an element of order n in Fq (where n divides q 1). − − (log n)c Then g = g0,g1,g2,...,gn 1 is a group of size n. Subexponential time: 2 [inefficient, but not terribly so] h i { } c Polynomial time: (log n) [efficient] –3 –4 Diffie-Hellman Discrete Logarithm Problem (DLP) Invented by Diffie and Hellman in 1976. The DLP can be generalized to arbitrary cyclic groups. Let g be an element of order n in F , and let G = g . q h i Let G = g be a group of prime order n. X = gx h i Alice Bob The DLP in G is: Given h G, compute the integer x Y = gy y z [0,n 1] such that h =∈gz. K = Y x = gxy K = Xy = gxy ∈ − The best generic algorithm for solving the DLP is Pollard’s G The finite field DLP: Given h , compute the integer rho method which has a running time √n. z [0,n 1] such that h = gz.∈ ≈ ∈ − F∗ In 1985, the DLP in q could be solved in subexponential Consequence: For a 64-bit level of security, one needs 1/2 time 2(log q) (using ‘index-calculus’ algorithms) and in fully n 2128. ≈ exponential time √n (using Pollard’s rho method). Consequence: For a 64-bit level of security, one needed q 2512 and n 2128. ≈ ≈ –5 –6 Elliptic Curves Elliptic Curve Cryptography An elliptic curve E defined over a finite field Fq is given by In 1985, Koblitz and Miller proposed using the group of an equation: points on an elliptic curve in public-key cryptography. 2 3 E/Fq : Y = X + aX + b. The solutions (x,y), where x,y F , to the equation form an Their proposal was motivated by two factors: ∈ q group. This group E(Fq) has size q. 1. The lack of a subexponential-time algorithm for the DLP y ≈ y on elliptic curves (ECDLP). Consequence: For a 64-bit level of security, one needs = ( , ) = P x1 y1 128 Q (x2, y2) q 2 . ≈ x x 2. The large number of elliptic curves (approximately 2q) P = (x1, y1) for each finite field Fq. R = (x , y ) R = (x3, y3) 3 3 –7 –8 Hyperelliptic Curves Hyperelliptic Curve Cryptography A hyperelliptic curve C of genus g defined over a finite field In 1989, Koblitz proposed using groups from hyperelliptic Fq is given by an equation: curves in public-key cryptography. C/F : Y 2 = X2g+1 + a X2g + + a X + a . q 2g · · · 1 0 His proposal was motivated by two factors: 1. The lack of a subexponential-time algorithm for the DLP Note that a hyperelliptic curve of genus g = 1 is precisely an on hyperelliptic curves (HCDLP). elliptic curve. [Elliptic curve: Y 2 = X3 + aX + b] Consequence: For a 64-bit level of security, one needs The genus is a ‘measure of a curve’s complexity’. qg 2128. ≈ For example, g = 4 and q 232, or g = 8 and q 216. A hyperelliptic curve gives a group of size qg. ≈ ≈ ≈ 2. The large number of hyperelliptic curves (approximately 2g−1 Pollard’s rho method for solving the HCDLP has running q ) for each finite field Fq. time qg/2. –9 – 10 Number Field Sieve Early Attacks on the ECDLP/HCDLP (Pollard, Lenstra, Lenstra, Manasse; 1990) (M, Okamoto, Vanstone; 1990) 1/3 F Subexponential-time 2(log n) factoring algorithm. Weil pairing attack: For very special elliptic curves E/ q, the ECDLP can be efficiently reduced to the DLP in the (Gordon; 1990) finite field Fqk for some small k (where subexponential-time (log p)1/3 F∗ attacks are applicable). [k = embedding degree] Subexponential-time 2 for the DLP in p. 2 3 Example: E : Y = X + 1 over Zp, p 11 (mod 12) is Security Block Hash ECC Fq RSA ≡ supersingular. The embedding degree is k = 2. in bits cipher function q 2 n 2 k k k k 80 SKIPJACK (SHA-1) 160 1024 Supersingular elliptic curves have embedding degree k 6. ≤ 112 Triple-DES SHA-224 224 2048 128 AES Small SHA-256 256 3072 192 AES Medium SHA-384 384 7680 256 AES Large SHA-512 512 15360 – 11 – 12 Early Attacks on the ECDLP/HCDLP Ramifications [Recall: Pollard’s rho attack on the HCDLP has running time Many cryptographers and practitioners were traumatized by qg/2] these attacks on the ECDLP and HCDLP. (Adleman, DeMarrais, Huang; 1994) Their fears were somewhat alleviated by prohibiting the g 1/2 weak curves from emerging ECC standards: Index-calculus subexponential 2(log q ) attack for very high genus hyperelliptic curves ((2g + 1)0.98 q). ◮ Example: IEEE P1363 and ANSI X9.62 draft stanards ≥ required that k 20 (thus excluding all supersingular elliptic curves).≥ (Araki, Satoh, Semaev, Smart; 1997) Smart-ASS attack: For elliptic curves E/F of size p, the p But many experts remained skeptical about the security of ECDLP can be solved very efficiently. both supersingular and ordinary elliptic curves. In May 1997, RSA Security posted ECC Central on their web site. – 13 – 14 Ron Rivest (1997) Ron Rivest (1997) “Elliptic curves show promise as an alternative basis on “...Over time, this may change, but for now trying to get an which to implement public-key cryptography. They are a evaluation of the security of an elliptic-curve cryptosystem plausible “back-up” to RSA in case someone should is a bit like trying to get an evaluation of some recently discover a fast integer factorization algorithm. And in some discovered Chaldean poetry. Until elliptic curves have applications their apparent ability to utilize smaller public been further studied and evaluated, I would advise keys might be of interest.” against fielding any large-scale applications based on them.” “But the security of cryptosystems based on elliptic curves is not well understood, due in large part to the abstruse “As elliptic curves begin to receive the kind of stringent nature of elliptic curves. Few cryptographers understand review already received by RSA, they will (if they are not elliptic curves, so there is not the same widespread broken) be added to RSA’s toolkits and recommended for understanding and consensus concerning the security of small-scale or short-term applications. In the end, time will elliptic curves that RSA enjoys....” tell how well they stand up to attack.” – 15 – 16 Len Adleman (1997) Standardized Elliptic Curves “It is correct that I am suspicious of elliptic curve 1999-2000: The first ECC standards were issued. cryptosystems. .....” Example: ANSI X9.62, 1999 ◮ “I suspect that the lack of a sub-exponential algorithm is ECDSA: Elliptic Curve version of the DSA. F F merely a matter of neglect....” ◮ Elliptic curves over prime fields p and binary fields 2m . ◮ Requirement on the embedding degree: k 20. ≥ “I am fortified in this opinion by the fact that the Jacobians of hyperelliptic curve were also suggested for Example: NIST’s FIPS 186-2 (ECDSA), 2000 cryptography.... Nonetheless Ming-Deh Huang, Jonathan ◮ 5 randomly selected elliptic curves over prime fields Fp, where DeMarrais and I were able to show that for ‘high genus’ the p are Mersenne-like primes (e.g. p = 2192 264 1). hyperelliptic curves a subexponential algorithm does exist.” − − ◮ 5 randomly selected elliptic curves over binary fields F2m , all with m prime. ◮ 5 Koblitz elliptic curves over binary fields F2m , all with m prime. – 17 – 18 XTR XTR and Supersingular Elliptic Curves (A. Lenstra & Verheul; 2000) ◮ Let b F 2 be a square but not a cube. ∈ p 2 3 ◮ ECSTR: Efficient Compact Subgroup Trace ◮ The elliptic curve E/Fp2 : Y = X + b is supersingular Representation and #E(F 2 ) = p2 p + 1. p − ◮ Faster than ECC and RSA. ◮ Let P E(F 2 ) be a point of order n. ∈ p ◮ P has embedding degree k = 3, and the Weil/Tate ◮ 2 3 6 n p p + 1 p + 1 p 1, where p 2 (mod 3). pairingsh i give an efficiently computable isomorphism | − | | − ∗≡ ∗ ◮ XTR group X: order-n subgroup of F 6 . φ : P X F 6 . p h i −→ ⊂ p p2 p4 ◮ g X is represented as Tr 6 2 (g) = g + g + g F 2 . ∈ p ,p ∈ p ◮ In 2000, we asked whether there is an efficiently computable isomorphism ψ : X P . ◮ “XTR is not affected by the uncertainty still marring −→ h i ◮ ECC” ECSTR: Elliptic Curve Supersingular Trace Representation ◮ ECSTR: Elliptic Curves Still Too Risky – 19 – 20 Verheul’s Theorem The Resurrection In May 2001, Verheul proved the following: Invention of pairing-based cryptography: Suppose that there is an efficiently-computable Joux & Sakai-Ohgishi-Kasahara (2000) isomorphism ψ from the XTR group X to the order-n Boneh-Franklin (August 2001) subgroup P of E(Fp2 ).

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us