Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem
نویسنده
چکیده
In [2], Faugére et al. shows that the decomposition problem of a point of elliptic curve over binary field F2n reduces to solving low degree equations system over F2 coming from Weil descent. Using this method, the discrete logarithm problem of elliptic curve over F2n reduces to linear constrains, i.e., solving equations system using linear algebra of monomial modulo field equations, and its complexity is expected to be subexponential of input size n. However, it is pity that at least using linear constrains, it is exponential. In [7], Petit et al. shows that assuming first fall degree assumption, from which the complexity of solving low degree equations system using Gröbner basis computation is subexponential, its total complexity is heuristically subexponential. On the other hands, the author [6] shows that the decomposition problem of Jacobian of plane curve over Fpn also essentially reduces to solving low degree equations system over Fp coming from Weil descent. In this paper, we revise (precise estimation of first fall degree) the results of Petit et al. and show that the discrete logarithm problem of elliptic curve over small characteristic field Fpn is subexponential of input size n, and the discrete logarithm problem of Jacobian of small genus curve over small characteristic field Fpn is also subexponential of input size n, under first fall degree assumption.
منابع مشابه
Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem (Draft)
In [2], Faugére et al. shows that the decomposition problem of a point of elliptic curve over binary field F2n reduces to solving low degree equations system over F2 coming from Weil descent. Using this method, the discrete logarithm problem of elliptic curve over F2n reduces to linear constrains, i.e., solving equations system using linear algebra of monomial modulo field equations, and its co...
متن کاملOn Security of Superelliptic Curves Based Cryptosystems against GHS Weil Descent Attacks
The GHS Weil descent attack by Gaudry, Hess and Smart was originally proposed to elliptic curves over finite fields of characteristic two [11]. Among a number of extensions of this attack, Diem treated the cases of hyperelliptic curves over finite fields of arbitrary odd characteristics [4]. His results were partially extended to algebraic curves of which the function fields are cyclic Galois e...
متن کاملSolving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods - An Experimental Study
At ASIACRYPT 2012, Petit and Quisquater suggested that there may be a subexponential-time index-calculus type algorithm for the Elliptic Curve Discrete Logarithm Problem (ECDLP) in characteristic two fields. This algorithm uses Semaev polynomials and Weil Descent to create a system of polynomial equations that subsequently is to be solved with Gröbner basis methods. Its analysis is based on heu...
متن کاملLast Fall Degree, HFE, and Weil Descent Attacks on ECDLP
Weil descent methods have recently been applied to attack the Hidden Field Equation (HFE) public key systems and solve the elliptic curve discrete logarithm problem (ECDLP) in small characteristic. However the claims of quasi-polynomial time attacks on the HFE systems and the subexponential time algorithm for the ECDLP depend on various heuristic assumptions. In this paper we introduce the noti...
متن کاملA Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields
This paper shows that many of elliptic curve cryptosystems over quartic extension fields of odd characteristics are reduced to genus two hyperelliptic curve cryptosystems over quadratic extension fields. Moreover, it shows that almost all of the genus two hyperelliptic curve cryptosystems over quadratic extension fields of odd characteristics come under Weil descent attack. This means that many...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013