The Future of Curve-Based Cryptography: Alfred Menezes University of Waterloo, Canada
The Future of Curve-Based Cryptography: Alfred Menezes University of Waterloo, Canada
Cryptography
Alfred Menezes
University of Waterloo, Canada
CIBSI’03, October 28, 2003
Purpose of this Talk
Discuss the current trends of research in
public-key cryptography based on algebraic
curves
2
Outline
Groups and Cryptography
Elliptic Curve Cryptography
Hyperelliptic Curve Cryptography
Bilinear Maps
Conclusions
3
Groups and Cryptography
(1976) Diffie-Hellman Key Agreement Scheme
Let g be a generator of the multiplicative group of the
integers modulo a prime p
gx
A B
x gy y
K=(gy)x K=(gx)y
The shared secret is K = gxy
4
Groups and Cryptography
(1976) Diffie-Hellman Key Agreement Scheme
Let g be a generator of a cyclic group G of
order n
gx
A B
x gy y
K=(gy)x K=(gx)y
5
Desirable Groups
Group elements have a compact
representation
Group operation can be performed efficiently
Discrete logarithm problem (DLP) is
intractable
– Given G, g, n, gx, find x
– The hardness of the DLP determines the size of
parameters needed to attain a desired security
level
6
Why Consider Other Groups?
Shoup proved a lower bound of n for generic
algorithms for solving the DLP in cyclic groups
of order n
This matches the running time (n/2) of
Pollard’s rho algorithm, the best generic
algorithm known for the DLP
Are there suitable groups for which Pollard’s
rho algorithm is indeed the best DLP solver?
For some groups, such as the multiplicative
group of a finite field, faster algorithms are
known that take subexponential time
7
An Abundant Source of Groups
Abelian varieties over finite fields
Jacobians of algebraic curves
Jacobians of hyperelliptic curves
– High genus
– Low genus (2, 3, 4)
– Genus 1 (elliptic curves)
– Genus 0 (finite fields)
Jacobians of other algebraic curves
– Picard curves
– Superelliptic curves
8
Elliptic Curve Cryptography (ECC)
Proposed by Koblitz and Miller in 1985
Let F=GF(q) denote the finite field of order q
(of characteristic not equal to 2 or 3)
An elliptic curve E over F is defined by an
equation y2 = x3 + ax + b
The set of F-rational points on E is the set
E(F) = { (x,y) : y2 = x3 + ax + b, xK, yK }
together with the point at infinity
9
Group Law
There is a natural way to add two points on an
elliptic curve. The addition turns E(F) into an
(additively written) abelian group
The addition rule involves a few arithmetic
operations in the underlying field F
For example, if P=(x1,y1) and Q=(x2,y2), then
P+Q=(x3,y3), where
– x3=2-x1-x2,
– y3= (x1-x3)-y1, and
=(y2-y1)/(x2-x1)
10
Basic Properties
E(F) is an abelian group of order roughly q
11
Elliptic Curve Discrete Log Problem
ECDLP: Given an elliptic curve E, a base point
GE(F), n=order(G), and dG, find d
12
Elliptic Curve Discrete Log Problem (2)
Attack on prime-field anomalous curves (1997)
– If F=GF(p) and #E(F)=p, then E(F) can be efficiently
mapped to the additive group of the integers
modulo p (where the discrete logarithm problem is
trivial)
Weil descent attack (2000- )
– For some elliptic curves, especially some elliptic
curves over F=GF(2m) where m is composite, E(F)
can be efficiently embedded in the jacobian of a
high-genus hyperelliptic curve over a subfield of F
(where subexponential-time attacks can be
mounted)
13
Elliptic Curve Discrete Log Problem (3)
If the elliptic curve parameters are carefully
chosen, then these attacks can be easily
avoided
15
Performance
Elliptic curve parameters can be chosen to
enhance performance
– Special fields: Use F=GF(p), where
p=2256-2224+2192+296-1
– Special curves: Elliptic curves with efficiently
computable endomorphisms to accelerate curve
operations
– Precomputation: In some protocols,
exponentiation dQ can be accelerated by
precomputing multiples of Q
16
ECC in Practice
It appears that ECC is most suited for
– Applications that require very high levels and long-
term security (national security)
– Applications where operating environments are
constrained (processing power, memory, bandwidth,
power consumption)
Several standards have been written to specify
ECC signature, key agreement and encryption
schemes
– ISO
– American National Standards Institute (ANSI)
– IEEE
17
Government Deployments
US government National Institute for
Standards and Technology (NIST)
– Standards for elliptic curve signature and key
agreement schemes
– Protection of sensitive (but unclassified) data
US National Security Agency (NSA)
– Elliptic curve key agreement schemes used to
protect national security related systems
Canadian Communications Security
Establishment
German military
18
Commercial Deployment
5C Content Protection
– Hitachi, Intel, Matsushita, Sony, Toshiba
– Digital Transmission Content Protection (DTCP)
specification
Microsoft
– Windows Media Player
US Federal Aviation Authority (FAA)
Canada Post
– Postal Indicia Standard
19
Hyperelliptic Curve Cryptography
Let F=GF(q) be a finite field of order q
20
Jacobian of a Hyperelliptic Curve
The jacobian of a hyperelliptic curve is an
abelian group of order roughly qg
The group elements can be compactly
represented, and the group law can be
efficiently computed
The main advantage of hyperelliptic curves over
elliptic curves is that a smaller underlying field
is needed to obtain a group of a desired order
– Example: 2160 vs (280)2 vs (240)4 vs (232)5
– A smaller field may lead to faster and more compact
implementations
21
Hyperelliptic Curve DLP
(1994, Adleman, Huang, DeMarrais)
Subexponential-time algorithm for high genus
(2000, Gaudry) Algorithm that is faster than
Pollard’s rho algorithm for genus 5,6,7,8
(2003, Theriault) Algorithms that are
(asymptotically) faster than Pollard’s rho
algorithm for genus 3,4
22
Implementation
(2002, Lange) Performance of arithmetic in
genus 2 hyperelliptic curves is very
competitive with elliptic curve arithmetic
23
Bilinear Maps
Recall the Weil and Tate pairing attack
– For some elliptic curves, including supersingular
curves, E(F) can be efficiently embedded in the
multiplicative group of a small extension K of F
24
Three-party Two-round Diffie-Hellman
bcP
A B
a bP b
aP cP
abP C caP
c
25
Three-party One-round Diffie-Hellman
(2000) Joux
Let e : E(F) E(F) K* be a bilinear map,
aP
A B
a bP b
aP cP
cP C bP
c
…...Numerous others
27
Conclusions
Elliptic Curve Cryptography
– Subject has reached maturity and basic protocols
are being standardized and deployed
28
Conclusions (2)
Hyperelliptic Curve Cryptography
– We are beginning to get a full appreciation of the
hardness of the HCDLP
– Other curves?
29
Conclusions (3)
Cryptography using Bilinear maps
– Very active area of research
30
Thank you for your attention
Questions: [email protected]
31