On the Performance of Hyperelliptic Cryptosystems
نویسنده
چکیده
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to generate suitable curves for use in cryptography. This paper presents a practical comparison between the performance of elliptic curve based digital signature schemes and schemes based on hyperelliptic curves. We conclude that, at present, hyperelliptic curves o er no performance advantage over elliptic curves. Elliptic curve cryptosystems are now being deployed in the real world and there has been much work in recent years on their implementation. A natural generalization of such schemes was given by Koblitz [12], who described how the group law on a Jacobian of a hyperelliptic curve can be used to de ne a cryptographic system. Almost all of the standard discrete logarithm based protocols such as DSA and El Gamal have elliptic and hyperelliptic variants. This is because such protocols only require the presence of a nite abelian group, with a large prime order subgroup, within which the basic group operation is easy whilst the associated discrete logarithm problem is hard. We shall not discuss these protocols in this paper since everything that can be said for elliptic curve based protocols can usually be said for hyperelliptic curve based protocols. Instead we shall concentrate more on the underlying group: In particular how one performs the group operation and how one produces groups of the required type. The Jacobian of a genus g hyperelliptic curve will have roughly q points on it, where q denotes the number of elements in the eld of de nition of the Jacobian. By choosing hyperelliptic curves of genus greater than one we can achieve the same order of magnitude of the group order with a smaller value for q when compared with elliptic curve based systems which have g = 1. This has led some people to suggest that hyperelliptic curves may o er some advantages over elliptic curves in some special situations. For example if we wanted to only perform arithmetic using single words on a 32-bit computer we could choose g = 5 or 6 to obtain group orders of around 160 to 192 bits. One has to be a little careful as to how large one makes g, since for large genus there is a sub-exponential method to solve the discrete logarithm problem [1]. However this does not appear to a ect the security of curves of genus less than 10 over eld sizes of around 32 bits. In this paper we give an overview of the group law on a curve of genus g in arbitrary characteristic. We shall give a more e cient reduction method
منابع مشابه
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n
We investigate the discrete logarithm problem over jacobians of hyperelliptic curves suitable for public-key cryptosystems. We focus on the case when the definition field has small characteristic 2, 3, 5 and 7, then we present hyperelliptic cryptosystems that resist against all known attacks. We further implement our designed hyperelliptic cryptosystems over finite fields F2n in software on Alp...
متن کاملSoftware and hardware implementation of hyperelliptic curve cryptosystems
The hyperelliptic curve cryptosystem is one of the emerging cryptographic primitives of the last years. This system offers the same security as established public-key cryptosystems, such as those based on RSA or elliptic curves, with much shorter operand length. Consequently, this system allows highly efficient computation of the underlying field arithmetic. However, until recently the common b...
متن کاملComparative Analysis of Higher Genus Hyperelliptic Curve Cryptosystems over Finite Field Fp
The performance analysis of Hyperelliptic Curve Cryptosystems (HECC) over prime fields (Fp) of genus 5 and 6 are discussed in this paper. We have implemented a HECC system of genus 5 & 6 in a Intel Pentium III Celeron Processor @ 933 MHz speed with 256 MB RAM in Java 1.5. We have also compared their efficiency on the parameters of time taken for divisor generation, key generation, encryption an...
متن کاملHyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update)
For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial performance penalty compared to elliptic curve cryptosystems (ECC) and are, thus, not too attractive for practical applications. Only quite recently improvements have been made, mainly restricted to curves of genus 2. The work at hand advances the state-of-thea...
متن کاملCompact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems
To achieve the same level of security, hyperelliptic curve cryptosystems (HCC) use a smaller field than elliptic curve cryptosystems (ECC). HCC has a more potential application to the product that has limited memory and computing power, for instance Smart cards. We discussed how to represent the domain parameters of HCC in a compact way. The domain parameters include the field over which the cu...
متن کاملComparative Study of Hyperelliptic Curve Cryptosystem over Prime Field and Its Survey
Public key cryptography is the famous cryptography technique used in many corporate sectors for developing software to provide security services. Hyperelliptic Curve Cryptosystem (HECC) is one of the public key cryptographic technique, an expansion of Elliptic Curve Cryptography which offers the similar level of security compared with other cryptosystems such as RSA, ECC and DSA. HECC supervise...
متن کامل