Hyperelliptic Curve Cryptography

نویسنده

  • Adam Ibrahim
چکیده

The use of elliptic-curve groups in cryptography, suggested by Miller [1] and Koblitz [2] three decades ago,provides the same level of security for the Discrete Logarithm Problem as multiplicative groups, with much smallerkey sizes and parameters. The idea was refined two years later by Koblitz, who worked with the group formed bythe points of the Jacobian of hyperelliptic curves to implement Hyperelliptic Curve Cryptography (HECC) as animprovement on Elliptic Curve Cryptography (ECC) [3]. In this project we give a short introduction to hyperellipticcurves as the generalisation of elliptic curves to higher genera, define divisors and their Mumford representation, andgive the group laws with Cantor’s algorithm for curves of genus 2. We then show as an example how hyperellipticcurves can be used in the Digital Signature Algorithm, before discussing the advantages and drawbacks of HECCin terms of implementation and security, as well as a novel idea that strives to reap the benefits of both ECC andHECC: hyper-and-elliptic curve cryptography [4]. REFERENCES[1] V. Miller, “Use of elliptic curves in cryptography,” pp. 417–426, 1986.[2] N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of computation, vol. 48, no. 177, pp. 203–209, 1987.[3] N. Koblitz, “Hyperelliptic cryptosystems,” Journal of cryptology, vol. 1, no. 3, pp. 139–150, 1989.[4] D. J. Bernstein and T. Lange, “Hyper-and-elliptic-curve cryptography,” LMS Journal of Computation and Mathematics, vol. 17, no. A,pp. 181–202, 2014.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem

The Diffie-Hellman problem as a cryptographic primitive plays an important role in modern cryptology. The Bit Security or Hard-Core Bits of Diffie-Hellman problem in arbitrary finite cyclic group is a long-standing open problem in cryptography. Until now, only few groups have been studied. Hyperelliptic curve cryptography is an alternative to elliptic curve cryptography. Due to the recent crypt...

متن کامل

Comparative Study of Hyperelliptic Curve Cryptosystem over Prime Field and Its Survey

Public key cryptography is the famous cryptography technique used in many corporate sectors for developing software to provide security services. Hyperelliptic Curve Cryptosystem (HECC) is one of the public key cryptographic technique, an expansion of Elliptic Curve Cryptography which offers the similar level of security compared with other cryptosystems such as RSA, ECC and DSA. HECC supervise...

متن کامل

An Introduction to Elliptic and Hyperelliptic Curve Cryptography and the NTRU Cryptosystem

This paper provides a self-contained introduction to elliptic and hyperelliptic curve cryptography and to the NTRU cryptosystem. The goal is to introduce the necessary mathematical background, detail various existing encryption and signature schemes and give an overview of the known security weaknesses.

متن کامل

Isomorphism Classes of Hyperelliptic Curves of Genus 2 over Fq

We give the exact number and representatives of the isomorphism, which preserves infinity, classes of hyperelliptic curves of genus 2 over finite fields with characteristic 2 in most cases. These results have applications to hyperelliptic curve cryptography.

متن کامل

Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2n)

The optimization of the Harley algorithm is an active area of hyperelliptic curve cryptography. We propose an efficient method for software implementation of genus three Harley algorithm over F2n . Our method is based on fast finite field multiplication using one SIMD operation, SSE2 on Pentium 4, and parallelized Harley algorithm. We demonstrated that software implementation using proposed met...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015