Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm

نویسندگان

  • Tetsuya Izu
  • Jun Kogure
  • Masayuki Noro
  • Kazuhiro Yokoyama
چکیده

The security of elliptic curve cryptosystem depends on the choice of an elliptic curve on which cryptographic operations are performed. Schoof’s algorithm is used to define a secure elliptic curve, as it can compute the number of rational points on a randomly selected elliptic curve defined over a finite field. By realizing efficient combination of several improvements, such as Atkin-Elkies’s method, isogeny cycles method, and baby-step-giant-step algorithm, we can count the number of rational points on an elliptic curve over GF (p) in a reasonable time, where p is a prime whose size is around 240-bit.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

cient Implementation of Schoof ' s Algorithm

Schoof's algorithm is used to nd a secure elliptic curve for cryptosystems, as it can compute the number of rational points on a randomly selected elliptic curve de ned over a nite eld. By realizing e cient combination of several improvements, such as Atkin-Elkies's method, the isogeny cycles method, and trial search by match-and-sort techniques, we can count the number of rational points on an...

متن کامل

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

A New Secure and Efficient Elliptic Curve Cryptosystem

The design of new elliptic curve cryptosystem is still an interest to community of cryptographers. In this article, we propose a new secure and efficient elliptic curve cryptosystem. The scheme requires a single public and private keys and needs 59 and 30 for encryption and decryption algorithm respectively. The communication costs is given by 2| |. The estimated computational speed for the enc...

متن کامل

Finding Good Random Elliptic Curves for Cryptosystems Deened over If 2 N

One of the main diiculties for implementing cryptographic schemes based on elliptic curves deened over nite elds is the necessary computation of the cardinality of these curves. In the case of nite elds IF2n, recent theoretical breakthroughs yield a signiicant speed up of the computations. Once described some of these ideas in the rst part of this paper, we show that our current implementation ...

متن کامل

Schoof's algorithm and isogeny cycles

The heart of Schoof's algorithm for computing the cardinal-ity m of an elliptic curve over a nite eld is the computation of m modulo small primes`. Elkies and Atkin have designed practical improvements to the basic algorithm, that make use of \good" primes`. We show how to use powers of good primes in an eecient way. This is done by computing isogenies between curves over the ground eld. A new ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998