Discrete Logarithms and Elliptic Curves in Cryptography
نویسندگان
چکیده
Since ancient times, there has been a tug-of-war taking place between code makers and code breakers. Only within the last fifty years have the code makers emerged victorious (for now that is) with the advent of public key cryptography. This paper surveys the mathematical foundations, shortcomings, and novel variants of the “first” public key cryptosystem envisioned by Whitfield Diffie, Martin Hellman, and Ralph Merkle in 1976. The system they developed, Diffie-Hellman key exchange, relied on the difficulty of taking discrete logarithms in the finite fields Zp, where p is prime. While relatively secure, methods known as the index calculus exist to crack Diffie-Hellman key exchange in less than exponential running time. This has led to the use of elliptic curves in analogous cryptosystems. The basic theory underlying these elliptic curve cryptosystems is presented as well as a comparison of these systems with standard RSA encryption.
منابع مشابه
Discrete logarithms in curves over finite fields
The discrete logarithm problem in finite groups is one of the supposedly difficult problems at the foundation of asymmetric or public key cryptography. The first cryptosystems based on discrete logarithms were implemented in the multiplicative groups of finite fields, in which the discrete logarithm problem turned out to be easier than one would wish, just as the factorisation problem at the he...
متن کاملNew algorithm for the discrete logarithm problem on elliptic curves
A new algorithms for computing discrete logarithms on elliptic curves defined over finite fields is suggested. It is based on a new method to find zeroes of summation polynomials. In binary elliptic curves one is to solve a cubic system of Boolean equations. Under a first fall degree assumption the regularity degree of the system is at most 4. Extensive experimental data which supports the assu...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملImplementing Elliptic Curve Cryptography
The strength of public key cryptography utilizing Elliptic Curves relies on the difficulty of computing discrete logarithms in a finite field. Diffie-Hellman key exchange algorithm also relies on the same fact. There are two flavors of this algorithm, one using Elliptic Curves and another without using Elliptic Curves. Both flavors of the algorithm rely on the difficulty of computing discrete l...
متن کاملDiscrete Logarithms on Elliptic Curves
Cryptographic protocols often make use of the inherent hardness of the classical discrete logarithm problem, which is to solve gx ≡ y (mod p) for x. The hardness of this problem has been exploited in the Diffie-Hellman key exchange, as well as in cryptosystems such as ElGamal. There is a similar discrete logarithm problem on elliptic curves: solve kB = P for k. Therefore, Diffie-Hellman and ElG...
متن کامل