A classification of elliptic curves with respect to the GHS attack in odd characteristic

نویسندگان

  • Tsutomu Iijima
  • Fumiyuki Momose
  • Jinhui Chao
چکیده

The GHS attack is known to solve discrete logarithm problems (DLP) in the Jacobian of a curve C0 defined over the d degree extension field kd of k := Fq by mapping it to the DLP in the Jacobian of a covering curve C of C0 over k. Recently, classifications for all elliptic curves and hyperelliptic curves C0/kd of genus 2,3 which possess (2, ..., 2)-covering C/k of P were shown under an isogeny condition (i.e. when g(C) = d · g(C0)). This paper presents a systematic classification procedure for hyperelliptic curves in the odd characteristic case. In particular, we show a complete classification of elliptic curves C0 over kd which have (2, ..., 2)-covering C/k of P for d = 2, 3, 5, 7. It has been reported by Diem[6] that the GHS attack fails for elliptic curves C0 over odd characteristic definition field kd with prime extension degree d greater than or equal to 11 since g(C) become very large. Therefore, for elliptic curves over kd with prime extension degree d, it is sufficient to analyze cases of d = 2, 3, 5, 7. As a result, a complete list of all elliptic curves C0/k which possess (2, ..., 2)-covering C/k of P thus are subjected to the GHS attack with odd characteristic and prime extension degree d is obtained.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristic

In this paper, we present a classification of elliptic curves defined over a cubic extension of a finite field with odd characteristic which have coverings over the finite field therefore subjected to the GHS attack. The densities of these weak curves, with hyperelliptic and non-hyperelliptic coverings, are then analyzed respectively. In particular, we show, for elliptic curves defined by Legen...

متن کامل

On Security of Superelliptic Curves Based Cryptosystems against GHS Weil Descent Attacks

The GHS Weil descent attack by Gaudry, Hess and Smart was originally proposed to elliptic curves over finite fields of characteristic two [11]. Among a number of extensions of this attack, Diem treated the cases of hyperelliptic curves over finite fields of arbitrary odd characteristics [4]. His results were partially extended to algebraic curves of which the function fields are cyclic Galois e...

متن کامل

Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem

We generalise the Weil descent construction of the GHS attack on the elliptic curve discrete logarithm problem (ECDLP) to arbitrary Artin-Schreier extensions. We give a formula for the characteristic polynomial of Frobenius of the obtained curves and prove that the large cyclic factor of the input elliptic curve is not contained in the kernel of the composition of the conorm and norm maps. As a...

متن کامل

Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack under an Isogeny Condition

The GHS attack is known as a method to map the discrete logarithm problem(DLP) in the Jacobian of a curve C0 defined over the d degree extension kd of a finite field k to the DLP in the Jacobian of a new curve C over k which is a covering curve of C0. Such curves C0/kd can be attacked by the GHS attack and index calculus algorithms. In this paper, we will classify all elliptic curves and hypere...

متن کامل

Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristics

In this paper, we present a classification of classes of elliptic curves defined over cubic extension of finite fields with odd characteristics, which have coverings over the finite fields therefore can be attacked by the GHS attack. We then show the density of these weak curves with hyperelliptic and non-hyperelliptic coverings respectively. In particular, we shown for elliptic curves defined ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015