Constructing Elliptic Curves with Prescribed Embedding Degrees
|
|
|
- Edgar Skinner
- 10 years ago
- Views:
Transcription
1 Constructing Elliptic Curves with Prescribed Embedding Degrees Paulo S. L. M. Barreto 1, Ben Lynn 2, and Michael Scott 3 1 Laboratório de Arquitetura e Redes de Computadores (LARC), Escola Politécnica, Universidade de São Paulo, Brazil. [email protected] 2 Computer Science Department, Stanford University, USA. [email protected] 3 School of Computer Applications, Dublin City University Ballymun, Dublin 9, Ireland. [email protected] Abstract. Pairing-based cryptosystems depend on the existence of groups where the Decision Diffie-Hellman problem is easy to solve, but the Computational Diffie-Hellman problem is hard. Such is the case of elliptic curve groups whose embedding degree is large enough to maintain a good security level, but small enough for arithmetic operations to be feasible. However, the embedding degree for most elliptic curves is enormous, and the few previously known suitable elliptic curves have embedding degree k 6. In this paper, we examine criteria for curves with larger k that generalize prior work by Miyaji et al. based on the properties of cyclotomic polynomials, and propose efficient representations for the underlying algebraic structures. 1 Introduction A subgroup G of (the group of points of) an elliptic curve E(F q ) is said to have embedding degree or security multiplier k if the subgroup order r divides q k 1, but does not divide q i 1 for all 0 < i < k. The Tate pairing [3, 9, 11] (or the Weil pairing [15, 18, 25]) maps the discrete logarithm in G to the discrete logarithm in F q k, and this is the basis for the Frey-Rück attack [10]. An important open problem in pairing-based cryptography [5, 6, 12, 14, 22, 23, 27, 29] is to build curves containing a subgroup with embedding degree k that is at once big enough to prevent the Frey-Rück attack, but small enough that the Tate pairing is efficiently computable, which in turn means that arithmetic in F q k is feasible. The embedding degree is known to be usually enormous [2, 19], and for a long time, the only elliptic curves known to admit subgroups with reasonable k were supersingular curves, particularly over F 3 m where k = 6 [18]. Such curves are constructed over fields of low characteristic, making them more susceptible to discrete logarithm algorithms [24]. Co-sponsored by Scopus Tecnologia S. A.
2 Recently, Miyaji, Nakabayashi and Takano [19] showed, using certain properties of the cyclotomic polynomial of order k, how to build non-supersingular curves over F q of prime order with k = 3, 4, 6 using the complex multiplication (CM) method [16, 20], as long as certain conditions, which we call the MNT criteria, hold for the field size q, the trace of Frobenius t [25, III.4.6], and the curve order n. However, no technique was known for systematically building curves where k > 6 but not enormous. In this paper we investigate generalizations of the MNT criteria for curves with general embedding degree k, and address the actual construction of such curves. We also discuss representations of the involved fields and groups that lead to efficient implementations of the Tate pairing. Another method for building curves with arbitrary k has been recently proposed by Dupont, Enge and Morain [8]. This paper is organized as follows. Section 2 describes generalizations of the MNT criteria. Section 3 deals with the problem of solving the resulting CM equation to obtain suitable field and curve parameters. Section 4 discusses techniques for efficient implementation of the finite field arithmetic and the Tate pairing. We present our conclusions in section 5. 2 Generalizing the MNT criteria Any elliptic curve E over F q of order n satisfies Hasse s theorem [25, V.1.1], which states that the trace t of the Frobenius endomorphism on E, related to q and n by the equation n = q + 1 t, is restricted to t 2 q. Given an embedding degree k > 0, our goal is to find a prime 4 q, an integer t such that t 2 q, a large prime r satisfying r q k 1 but r q i 1 for all 0 < i < k, and a curve E(F q ) whose trace of Frobenius is t and whose order n = q + 1 t satisfies r n, that is, n = hr for some h. We begin by noticing that q = (t 1) + hr implies q u 1 (t 1) u 1 (mod r) for all u > 0. Therefore, any suitable r must satisfy r (t 1) k 1 and r (t 1) i 1 for all 0 < i < k. Let Φ m be the m-th cyclotomic polynomial [17, definition 2.44]. It is well known [17, theorem 2.45(i)] that x u 1 = d u Φ d(x) for any u > 0. This leads to the following lemma. Lemma 1. Any suitable prime r satisfies r Φ k (t 1) and r Φ i (t 1) for all 0 < i < k. Proof. It is necessary that r Φ i (t 1) for all 0 < i < k, as otherwise r (t 1) i 1 for some 0 < i < k. But since r is prime, r (t 1) k 1 implies r Φ d (t 1) for some d dividing k, and the only remaining possibility is d = k. Hence, necessarily r Φ k (t 1). The basic MNT strategy is to choose a trace t of suitable size, finding a prime r in the conditions of the above lemma, computing from t and r a prime of form 4 Actually, q may be a prime power, but for simplicity we will only refer to the prime case as this is the most relevant in practice. 2
3 q = hr + t 1 for some small cofactor 5 h, and finally using the CM method to build the desired curve. 2.1 Constraining the parameters We now derive explicit constraints on the form of t and q, for any h and any k, generalizing the original approach by Miyaji et al. Let l be an integer with l > 1, let r be a prime factor of Φ k (l), and let d be an integer satisfying 1 d deg Φ k /2. Set n = hr for some h, q = n + l d, and t = l d + 1. It follows from lemma 1 that r satisfies r l kd 1, and in general r l id 1 for 0 < i < k. The restriction d deg Φ k /2 is imposed to ensure the Hasse bound is satisfied. Theorem 1. The choice of parameters proposed above leads to curves containing a subgroup of order r with embedding degree at most k. Proof. From the condition q = hr + l d it follows that q k 1 l dk 1 (mod r). Since Φ k (l) l dk 1 [17, theorem 2.45(i)], the restriction r Φ k (l) implies r l dk 1, that is, l dk 1 0 (mod r). Therefore, q k 1 0 (mod r), that is, r q k 1. An important observation here is that we still must verify that r q i 1 for 0 < i < k, even for such a special case as r = Φ k (l). Since l i 1 = u i Φ u(l), it is obvious that Φ k (l) l i 1, and hence, apparently r l i 1. However, this reasoning is wrong: the relation Φ k (l) l i 1 only holds for the polynomials themselves, not necessarily for some specific argument l. In contrast to the original work by Miyaji et al., the above criteria are not exhaustive, and it is not difficult to find other conditions leading to perfectly valid parameters. For instance, an obvious generalization is q = n + Φ k (l)g(l) + l d, for any polynomial g(l). This does not help much because in general Φ k (l)g(l) makes the trace t too big to satisfy the Hasse bound, except when the term l d cancels the term of highest degree in Φ k (l)g(l) and the remaining terms are of suitably low degree (for example, for k = 9, by picking an appropriate g, one can obtain q = n l 3 1). Also, if d is even, k is even, and k/2 is odd, it can be verified that setting t = l d +1 and q = hr l d is equally possible, that is, r q k 1 (the restriction to even k such that k/2 is odd ensures that q k/2 1 (l dk + 1) 0 (mod r)). Sometimes, fortuitous solutions barely resembling (but related to) the MNT criteria can be found for particular choices of k. However, for simplicity we will focus on the parameters considered in theorem 1; extending the discussion below to other parameters should not be difficult, and would be hardly necessary in practice. 3 Solving the CM equation The strategy to build curves given the above criteria seems straightforward: choose l and h, find a prime q and the corresponding trace t according to the 5 Miyaji et al. consider only h = 1, that is, curves of prime order. 3
4 proposed relations, solve for the CM discriminant D (and for V ) the CM equation DV 2 = 4q t 2, or equivalently, DV 2 = 4n (t 2) 2, and use the CM method to compute the curve equation coefficients. Since n = hr and r Φ k (l), we can write n = mφ k (l) for some m. Thus, the CM equations for the parameter criteria given in section 2.1 has the form: DV 2 = 4mΦ k (l) (l d 1) 2. (1) Unfortunately, this approach is not practical, because in general the CM discriminant D is too large (comparable to q), and cryptographically significant parameters would have q at least. It is possible to find toy examples using this direct approach, though. For instance, the curve E : y 2 = x 3 3x over F has 4r points, where r = The subgroup of order r has embedding degree k = 12. This curve satisfies m = 4, r = Φ k (l), t = l + 1, and q = 4Φ k (l) + l for l = The CM equation is DV 2 = 4q t 2 where D = and V = 11670, and the class number is Miyaji et al. solve this problem for k = 3, 4, 6 by noticing that the CM equation leads, in these cases, to a quadratic Diophantine equation reducible to Pell s equation, whose solution is well known [26]. The case of arbitrary k is much harder, since no general method is known to solve Diophantine equations of degree deg(φ k ) 4. However, Tzanakis [28] describes how to solve quartic elliptic Diophantine equations of form V 2 = al 4 + bl 3 + cl 2 + dl + e 2, where a > 0 (notice the squared independent term). For k = 5, 8, 10, 12, the degree of Φ k is 4, so that equation 1 has the form DV 2 = al 4 +bl 3 +cl 2 +dl+f. If a solution to this equation in small integers is known (as can often be found by exhaustive search), this equation reduces to Tzanakis form by multiplying both sides by D and applying a linear transformation involving the known solution, so that the independent term of the transformed equation is a perfect square. Unfortunately again, this approach has proven unsuccessful in practice. Using the Magma implementation of Tzanakis method, we were not able to find any cryptographically significant examples of curves with k = 5, 8, 10, 12, the only such cases being those where D is too large for traditional CM methods. We have not tried more recent variants of the CM method like that of [1], so there is still hope that solutions of equation 1 with large D are actually practical. But even if this direct approach remains out of reach, there are successful ways to generate suitable field and curve parameters, as we show next. 3.1 A particular case Let p be a prime (not to be confused with the finite field size q). We describe how to find algebraic solutions of equation 1 for the special case D = 3, d = 1, and k = 3 i 2 j p s, for certain exponents i, j, s and prime p > 3. In principle, this method enables the ratio m/r to get arbitrarily small for large k if s = 0. 4
5 The cyclotomic polynomials are known [21] to satisfy the following properties. If v is any prime dividing u, then Φ uv (x) = Φ u (x v )/Φ u (x). On the other hand, if v u, then Φ uv (x) = Φ u (x v ). Using these properties, it is easy to show by induction that for all i > 0, Φ 3 i(l) = l 2 3i 1 + l 3i and Φ 2i 3(l) = l 2i l 2i Restrict l so that l 1 (mod 3). Thus, 4Φ 3 i(l) 1 = 3[(2l 3i 1 + 1)/3] 2 and 4Φ 2i 3(l) 3 = [(2l 2i 1 1)] 2. In the first case, multiplying both sides by (l 1) 2 leads to 4 (l 1) 2 Φ 3 i(l) (l 1) 2 = 3[(l 1)(2l 3i 1 + 1)/3] 2, which gives the solution k = 3 i, r = Φ 3 i(l)/3, t = l + 1, m = (l 1) 2, V = (l 1)(2l 3i 1 + 1)/3. In the second case, multiplying both sides by (l 1) 2 /3 leads to 4 [(l 1) 2 /3]Φ 2i 3(l) (l 1) 2 = 3[(l 1)(2l 2i 1 1)/3] 2, which gives the solution k = 2 i 3, r = Φ 2i 3(l), t = l + 1, m = (l 1) 2 /3, V = (l 1)(2l 2i 1 1)/3. In both cases, we assume that q = mr + l is prime. Similarly, one can show by induction that, for any prime p > 3 and for all i, j > 0 Φ 3i p j (l) = [(2l3i 1 p j + 1) 2 + 3]/[(2l 3i 1 p j 1 + 1) 2 + 3]. Multiplying both sides by 12z 2 [(2l 3i 1 p j 1 + 1) 2 + 3] for any z leads to 4 3z 2 [(2l 3i 1 p j 1 + 1) 2 + 3]Φ 3 i p j (l) (6z)2 = 3[2z(2l 3i 1 p j + 1)] 2. Choosing r to be any large factor of Φ 3i pj (l), this gives the solution k = 3 i p j, l = 6z + 1, n = 3z 2 [(2l 3i 1 p j 1 + 1) 2 + 3]Φ 3i p j (l), V = z(2l 3i 1 p j + 1). It is also straightforward (but tedious) to show that Φ 3i 2 j p s(l) = [(2l3i 1 2 j 1 p s 1) 2 + 3]/[(2l 3i 1 2 j 1 p s 1 1) 2 + 3] hence 4 3z 2 [(2l 3i 1 2 j 1 p s 1 1) 2 +3]Φ 3i 2 j p s(l) (6z)2 = 3[2z(2l 3i 1 2 j 1 p s 1)] 2, which gives the solution k = 3 i 2 j p s, l = 6z + 1, m = 3z 2 [(2l 3i 1 2 j 1 p s 1 1) 2 + 3], V = 2z(2l 3i 1 2 j 1 p s 1). 5
6 In all cases, it is necessary to ensure that q = mφ k (l) + l is prime. Appendix A contains a detailed example of this method. It is unclear whether this strategy can be extended to more general k, since the corresponding expressions get very involved. Moreover, this method only produces solutions for D = 3, which could potentially have a lower security level, even though no specific vulnerability based on the small D value is known at the time of this writing [4, section VIII.2]. The next method we describe is suitable for much more general D. 3.2 A general method The general form of the criteria we have been considering is n = mφ k (l), t = l d + 1, q = n + t 1 = mφ k (l) + l d, where 1 d deg Φ k /2. Usually one wants m to be small and Φ k (l) to contain a large prime factor r (the best case is then Φ k (l) itself being a prime). However, finding solutions under these conditions is hard for any k such that deg Φ k > 2. Therefore, we relax the restrictions on m, say, by allowing m to be comparable to r. It turns out that obtaining suitable parameters becomes quite easy. Consider the CM equation DV 2 = 4mΦ k (l) (l d 1) 2. We assume that both D and l are chosen and t D; we want to find a solution m (and V ) to this equation. For convenience, let A = 4Φ k (l) and B = (l d 1) 2, so that the equations reads DV 2 = Am B. Initially, find the smallest m 0 0 such that D Am 0 B, that is, Am 0 B = z 0 D for some z 0. If A is invertible modulo D, then m 0 = B/A (mod D) and z 0 = (Am 0 B)/D. If A is not invertible modulo D but B is a multiple of D, then m 0 = 0 and z 0 = B/D. Otherwise, there is no solution for this choice of l and D. Thus we ensure that m 0 is never larger than D. Define: m i = m 0 + id, z i = z 0 + ia. Substituting these into the CM equation gives Dz i = Am i B. This means that any solution to this equation involves z i that is a perfect square. Therefore, solve V 2 = z 0 + ia for V and i, and pick up the smallest solution i such that q = m i Φ k (l) + l d is a prime. This requires z 0 to be a quadratic residue (QR) modulo A. If so, all solutions i α can be written as i α = i 0 + αa, where i 0 = (V0 2 z 0 )/A and V 0 = z 0 (mod A). A neat strategy to obtain a tight ratio between log q and log r is to restrict the search to i 0 alone and vary only l. Experiments we conducted showed that, in practice, m tends to be close to r. Nevertheless, such solutions are perfectly suitable for most pairing-based cryptosystems, the only exception being the short signature scheme of [6]. Appendix B contains examples of this method. 6
7 4 Implementation issues Since curves with medium-sized embedding degree k can be effectively constructed as described above, the natural question to ask is how to efficiently implement the underlying arithmetic and, particularly, the Tate pairing. We restrict the discussion to even k. Let even(f q k) denote the subset of F q k consisting of polynomials whose component monomials are all of even degree, i.e. even(f q k) = {u F q k : u(x) = a k 2 x k 2 +a k 4 x k 4 + +a 0 }. Similarly, let odd(f q k) denote the subset of F q k consisting of polynomials whose component monomials are all of odd degree, i.e. odd(f q k) = {u F q k : u(x) = a k 1 x k 1 + a k 3 x k a 1 x}. We propose representing F p k as F p [x]/r k (x) with a reduction polynomial of form R k (x) = x k + x 2 + ω for some ω F p. This choice is motivated by the following analysis. Lemma 2. If R(x) = x k +x 2 +ω is irreducible over Fq, then r(x) = x k/2 +x+ω is irreducible over Fq. Proof. By contradiction. If r(x) = f(x)g(x) for some f, g Fq[x], then R(x) = r(x 2 ) = f(x 2 )g(x 2 ), against the hypothesis that R(x) is irreducible. This establishes that the mapping ψ : Fq[x]/r(x) Fq[x]/R(x), ψ(f) = F such that F (x) = f(x 2 ), induces an isomorphism between F q k/2 and even(f q k). Notice that this lemma would remain valid if R contained more even-degree monomials, but a trinomial is better suited for efficient implementations. However, it is possible that an irreducible binomial R(x) = x k + ω exists, in which case it would be an even better choice. Lemma 3. Let Q = (u, v) E(F q k) where E : v 2 = f(u), u even(f q k), and f(u) is a quadratic nonresidue. Then v odd(f q k). Proof. Notice that f(u) even(f q k). Let v(x) = α(x) + xβ(x), where α, β even(f q k). Then v 2 = (α 2 + β 2 ) + x(2αβ) even(f q k), so that either α = 0 or β = 0. But β = 0 would mean that f(u) = α 2 is a quadratic residue, against the hypothesis. Therefore, α = 0, that is, v odd(f q k). We are now prepared to address the main theorem: Theorem 2. Let Q = (u, v) E(F q k) where E : v 2 = f(u), u even(f q k), and f(u) is a quadratic nonresidue. If S = (s, t) Q, then s even(f q k) and t odd(f q k). Proof. This is a consequence of the elliptic addition rules [25, algorithm 2.3]. It is straightforward but tedious to show that the point addition formula and the doubling formula do satisfy the theorem. Thus, we only have to let S = mq, and proceed by induction on m. 7
8 This way, curve points Q = (u, v) E/ F p k, where f(u) even(f q k) is a quadratic nonresidue, are not only suitable for the computation of the Tate pairing e(p, Q) for any P E/ F p (because obviously Q is linearly independent from P ); they also have the nice property that the technique of denominator elimination [3, section 5.1] is applicable, thus nearly doubling the performance of Miller s algorithm. 5 Conclusion We have shown how to effectively solve the problem of constructing elliptic curves with prescribed embedding degree, and suggested ways to efficiently implement the resulting curves so that pairing-based cryptosystems are practical. A natural line of further research is to investigate whether curves of any given embedding degree can be constructed for general abelian varieties. We also point out that the problem of generating elliptic curves of prime or near-prime order remains open; such curves are important in certain cryptosystems, like the BLS signature scheme [6]. 6 Acknowledgements We are grateful to Steven Galbraith and Frederik Vercauteren for their valuable comments and feedback during the preparation of this work. We also thank Michael Naehrig for pointing out an error (now fixed) in the last example of appendix B. References 1. A. Agashe, K. Lauter, and R. Venkatesan, Constructing elliptic curves with a known number of points over a prime field, High Primes and Misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams, Fields Institute Communications Series, Vol. 42, 2002, pp R. Balasubramanian, N. Koblitz, The improbability that an Elliptic Curve has Subexponential Discrete Log Problem under the Menezes-Okamoto-Vanstone Algorithm, Journal of Cryptology, Vol. 11, No. 2, 1998, pp P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott, Efficient algorithms for pairing-based cryptosystems, Advances in Cryptology Crypto 2002, Lecture Notes in Computer Science 2442, pp , Springer-Verlag, I. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography, Cambridge University Press, D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology Crypto 2001, Lecture Notes in Computer Science 2139, pp , Springer-Verlag, D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, Asiacrypt 2001, Lecture Notes in Computer Science 2248, pp , Springer-Verlag,
9 7. R. Crandall and C. Pomerance, Prime Numbers: a Computational Perspective, Springer-Verlag, R. Dupont, A. Enge, and F. Morain Building curves with arbitrary small MOV degree over finite prime fields, Cryptology eprint Archive, Report 2002/094, available at 9. G. Frey, M. Müller, and H. Rück, The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems, IEEE Transactions on Information Theory, 45(5), pp , G. Frey and H. Rück, A Remark Concerning m-divisibility and the Discrete Logarithm in the Divisor Class Group of Curves, Mathematics of Computation, 62 (1994), pp S. D. Galbraith, K. Harrison, and D. Soldera, Implementing the Tate pairing, Algorithmic Number Theory ANTS V, Lecture Notes in Computer Science 2369, pp , Springer-Verlag, F. Hess, Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings, Cryptology eprint Archive, Report 2002/012, available at IEEE Std , Standard Specifications for Public Key Cryptography, A. Joux, A one-round protocol for tripartite Diffie-Hellman, Algorithm Number Theory Symposium ANTS IV, Lecture Notes in Computer Science 1838, pp , Springer-Verlag, A. Joux and K. Nguyen, Separating Decision Diffie-Hellman from Diffie-Hellman in Cryptographic Groups, Journal of Cryptology, Vol. 16, No. 4, 2003, pp G. J. Lay and H. G. Zimmer, Constructing Elliptic Curves with Given Group Order over Large Finite Fields, Algorithmic Number Theory Symposium ANTS I, Lecture Notes in Computer Science 877 (1994), pp R. Lidl and H. Niederreiter, Introduction to finite fields and their applications, Cambridge University Press, A. Menezes, T. Okamoto, and S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Transactions on Information Theory 39(1993), pp A. Miyaji, M. Nakabayashi, and S. Takano, New explicit conditions of elliptic curve traces for FR-reduction, IEICE Trans. Fundamentals, Vol. E84 A, no. 5, May F. Morain, Building cyclic elliptic curves modulo large primes, Advances in Cryptology Eurocrypt 91, Lecture Notes in Computer Science 547 (1991), pp T. Nagell, Introduction to Number Theory, 2nd reprint edition, Chelsea Publishing, K. G. Paterson, ID-based signatures from pairings on elliptic curves, Electronics Letters, Vol. 38, No. 18, 2002, pp R. Sakai, K. Ohgishi, and M. Kasahara, Cryptosystems based on pairing, 2000 Symposium on Cryptography and Information Security (SCIS2000), Okinawa, Japan, Jan , O. Schirokauer, D. Weber, and T. Denny, Discrete Logarithms: the Effectiveness of the Index Calculus Method, ANTS, pp , J. H. Silverman, Elliptic curve discrete logarithms and the index calculus, Workshop on Elliptic Curve Cryptography (ECC 98), September 14 16, N. P. Smart, The Algorithmic Resolution of Diophantine Equations, London Mathematical Society Student Text 41, Cambridge University Press,
10 27. N. P. Smart, An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing, Electronics Letters, Vol. 38, 2002, pp N. Tzanakis, Solving elliptic diophantine equations by estimating linear forms in elliptic logarithms. The case of quartic equations, Acta Arithmetica 75 (1996), pp E. Verheul, Self-blindable Credential Certificates from the Weil Pairing, Advances in Cryptology Asiacrypt 2001, Lecture Notes in Computer Science 2248 (2002), pp A An example of the closed-form construction This simple construction implements the method of section 3.1 and quickly yields a curve and a point of large prime order r, with embedding degree k = Choose z of an appropriate size at random. 2. Set w = 3 z, t = w Set r = w 4 + 4w 3 + 5w 2 + 2w + 1. If r is not prime return to step Set q = (w 6 + 4w 5 + 5w 4 + 2w 3 + w 2 + 3w + 3)/3. If q is not prime, return to step Use the CM method to find the curve of the form y 2 = x 3 + B with discriminant D = 3 of order n = q + 1 t. Find a point of order r on the curve using the method described in [13, section A11.3]. Note that n = mr and m = 3z 2. Rather than using the CM method in step 5, in practice small values of B can be tested to find the correct curve [7]. An example run of this algorithm yields z = r = q = n = Here r is a 151-bit prime, and q is a 224-bit prime. The curve is quickly found as E : y 2 = x over F q. B An example of the general construction Let s be the approximate desired size (in bits) of the subgroup order r, let D be the chosen CM discriminant, and let k be the desired embedding degree. The following procedure implements a simplified subset of the general construction method described in section 3.2, and yields a suitable field size q, as prime subgroup order r, the curve order n (it also indirectly provides the cofactor m, which it seeks to minimize, and the trace of Frobenius t). 1. Choose l 2 s/g at random, where g deg(φ k ). 10
11 2. Compute r Φ k (l), t l + 1, A 4r, and B (l 1) Check that r is prime and also that A is invertible mod D and not a perfect square. If these conditions fail, choose another l in step Find the smallest m 0 0 such that Am 0 B = z 0 D for some z 0, namely, set m 0 B/A (mod D) and z 0 (Am 0 B)/D. 5. Check that z 0 is a QR mod r, and then compute V z 0 (mod r). If z 0 is not a QR mod r, or if V 2 z 0 0 (mod 4), choose another l in step 1. This ensures that V 2 z 0 = 0 (mod A). 6. Let i 0 (V 2 z 0 )/A, m m 0 + i 0 D, n mr, and q n + t 1. If q is not prime, restart with another l at step 1. Otherwise, we have the solution. An example run of this algorithm for k = 7 and D = yields q = \ r = m = n = \ t = Here r is a 157-bit prime, and q is a 320-bit prime. The curve is quickly found as E : y 2 = x 3 3x + b over F q, where b = \ Another example, this time for k = 11 and D = : q = \ r = m = n = \ t = Here r is a 225-bit prime, q is a 448-bit prime, and the curve is E : y 2 = x 3 3x + b over F q, where b = \
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
with Embedding Degree 10 University of California, Berkeley, USA ANTS-VII, 2006 Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3 Outline 1 Introduction
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION
EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION CHRISTIAN ROBENHAGEN RAVNSHØJ Abstract. Consider the Jacobian of a genus two curve defined over a finite field and with complex multiplication.
Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified
ECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
Lecture 25: Pairing-Based Cryptography
6.897 Special Topics in Cryptography Instructors: Ran Canetti and Ron Rivest May 5, 2004 Lecture 25: Pairing-Based Cryptography Scribe: Ben Adida 1 Introduction The field of Pairing-Based Cryptography
Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.
Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. We begin by defining the ring of polynomials with coefficients in a ring R. After some preliminary results, we specialize
A One Round Protocol for Tripartite
A One Round Protocol for Tripartite Diffie Hellman Antoine Joux SCSSI, 18, rue du Dr. Zamenhoff F-92131 Issy-les-Mx Cedex, France [email protected] Abstract. In this paper, we propose a three participants
Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28
Arithmetic algorithms for cryptology 5 October 2015, Paris Sieves Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Sieves 0 / 28 Starting point Notations q prime g a generator of (F q ) X a (secret) integer
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z
FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization
Identity-Based Encryption from the Weil Pairing
Appears in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages
Implementation of Elliptic Curve Digital Signature Algorithm
Implementation of Elliptic Curve Digital Signature Algorithm Aqeel Khalique Kuldip Singh Sandeep Sood Department of Electronics & Computer Engineering, Indian Institute of Technology Roorkee Roorkee, India
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS DANIEL RABAYEV AND JACK SONN Abstract. Let f(x) be a monic polynomial in Z[x] with no rational roots but with roots in Q p for
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
Introduction to Finite Fields (cont.)
Chapter 6 Introduction to Finite Fields (cont.) 6.1 Recall Theorem. Z m is a field m is a prime number. Theorem (Subfield Isomorphic to Z p ). Every finite field has the order of a power of a prime number
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
A new probabilistic public key algorithm based on elliptic logarithms
A new probabilistic public key algorithm based on elliptic logarithms Afonso Comba de Araujo Neto, Raul Fernando Weber 1 Instituto de Informática Universidade Federal do Rio Grande do Sul (UFRGS) Caixa
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Implementing Network Security Protocols
Implementing Network Security Protocols based on Elliptic Curve Cryptography M. Aydos, E. Savaş, and Ç. K. Koç Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331, USA {aydos,savas,koc}@ece.orst.edu
Integer Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
Study of algorithms for factoring integers and computing discrete logarithms
Study of algorithms for factoring integers and computing discrete logarithms First Indo-French Workshop on Cryptography and Related Topics (IFW 2007) June 11 13, 2007 Paris, France Dr. Abhijit Das Department
Efficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
I. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY
January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.
it is easy to see that α = a
21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UF. Therefore
Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any.
Algebra 2 - Chapter Prerequisites Vocabulary Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any. P1 p. 1 1. counting(natural) numbers - {1,2,3,4,...}
New Efficient Searchable Encryption Schemes from Bilinear Pairings
International Journal of Network Security, Vol.10, No.1, PP.25 31, Jan. 2010 25 New Efficient Searchable Encryption Schemes from Bilinear Pairings Chunxiang Gu and Yuefei Zhu (Corresponding author: Chunxiang
Identity Based Encryption. Terence Spies VP Engineering [email protected]
Identity Based Encryption Terence Spies VP Engineering [email protected] Voltage Security Overview Breakthrough technology for encryption and access control Based on work of Dr. Boneh at Stanford and
Primality - Factorization
Primality - Factorization Christophe Ritzenthaler November 9, 2009 1 Prime and factorization Definition 1.1. An integer p > 1 is called a prime number (nombre premier) if it has only 1 and p as divisors.
Module MA3411: Abstract Algebra Galois Theory Appendix Michaelmas Term 2013
Module MA3411: Abstract Algebra Galois Theory Appendix Michaelmas Term 2013 D. R. Wilkins Copyright c David R. Wilkins 1997 2013 Contents A Cyclotomic Polynomials 79 A.1 Minimum Polynomials of Roots of
How To Prove The Dirichlet Unit Theorem
Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if
LUC: A New Public Key System
LUC: A New Public Key System Peter J. Smith a and Michael J. J. Lennon b a LUC Partners, Auckland UniServices Ltd, The University of Auckland, Private Bag 92019, Auckland, New Zealand. b Department of
minimal polyonomial Example
Minimal Polynomials Definition Let α be an element in GF(p e ). We call the monic polynomial of smallest degree which has coefficients in GF(p) and α as a root, the minimal polyonomial of α. Example: We
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
CIS 5371 Cryptography. 8. Encryption --
CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.
PYTHAGOREAN TRIPLES KEITH CONRAD
PYTHAGOREAN TRIPLES KEITH CONRAD 1. Introduction A Pythagorean triple is a triple of positive integers (a, b, c) where a + b = c. Examples include (3, 4, 5), (5, 1, 13), and (8, 15, 17). Below is an ancient
A New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
Short Programs for functions on Curves
Short Programs for functions on Curves Victor S. Miller Exploratory Computer Science IBM, Thomas J. Watson Research Center Yorktown Heights, NY 10598 May 6, 1986 Abstract The problem of deducing a function
SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by
SUBGROUPS OF CYCLIC GROUPS KEITH CONRAD 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by g = {g k : k Z}. If G = g, then G itself is cyclic, with g as a generator. Examples
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
A SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
Integer roots of quadratic and cubic polynomials with integer coefficients
Integer roots of quadratic and cubic polynomials with integer coefficients Konstantine Zelator Mathematics, Computer Science and Statistics 212 Ben Franklin Hall Bloomsburg University 400 East Second Street
Factoring Polynomials
Factoring Polynomials Sue Geller June 19, 2006 Factoring polynomials over the rational numbers, real numbers, and complex numbers has long been a standard topic of high school algebra. With the advent
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC Laxminath Tripathy 1 Nayan Ranjan Paul 2 1Department of Information technology, Eastern Academy of Science and
Factoring & Primality
Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount
THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0
THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 RICHARD J. MATHAR Abstract. We count solutions to the Ramanujan-Nagell equation 2 y +n = x 2 for fixed positive n. The computational
A New and Efficient Signature on Commitment Values
International Journal of Network Security, Vol.7, No., PP.0 06, July 2008 0 A New and Efficient Signature on Commitment Values Fangguo Zhang,3, Xiaofeng Chen 2,3, Yi Mu 4, and Willy Susilo 4 (Corresponding
= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
Faster Pairing Computation
Faster Pairing Computation Christophe Arène 1, Tanja Lange 2, Michael Naehrig 2, and Christophe Ritzenthaler 1 1 Institut de mathématiques de Luminy Université de la Méditerranée 163 Avenue de Luminy Case
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction
MATH 168: FINAL PROJECT Troels Eriksen 1 Introduction In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key
ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION
ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION Aldrin W. Wanambisi 1* School of Pure and Applied Science, Mount Kenya University, P.O box 553-50100, Kakamega, Kenya. Shem Aywa 2 Department of Mathematics,
Factorization Algorithms for Polynomials over Finite Fields
Degree Project Factorization Algorithms for Polynomials over Finite Fields Sajid Hanif, Muhammad Imran 2011-05-03 Subject: Mathematics Level: Master Course code: 4MA11E Abstract Integer factorization is
ELLIPTIC CURVES AND LENSTRA S FACTORIZATION ALGORITHM
ELLIPTIC CURVES AND LENSTRA S FACTORIZATION ALGORITHM DANIEL PARKER Abstract. This paper provides a foundation for understanding Lenstra s Elliptic Curve Algorithm for factoring large numbers. We give
Faster deterministic integer factorisation
David Harvey (joint work with Edgar Costa, NYU) University of New South Wales 25th October 2011 The obvious mathematical breakthrough would be the development of an easy way to factor large prime numbers
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Modern/Public-key cryptography started in 1976 with the publication of the following paper. W. Diffie
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto Naehrig Curves
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto Naehrig Curves Jean-Luc Beuchat 1, Jorge E. González-Díaz 2, Shigeo Mitsunari 3, Eiji Okamoto 1, Francisco Rodríguez-Henríquez
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure
ELEMENTARY THOUGHTS ON DISCRETE LOGARITHMS. Carl Pomerance
ELEMENTARY THOUGHTS ON DISCRETE LOGARITHMS Carl Pomerance Given a cyclic group G with generator g, and given an element t in G, the discrete logarithm problem is that of computing an integer l with g l
An Approach to Shorten Digital Signature Length
Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Notes on Factoring. MA 206 Kurt Bryan
The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor
CHAPTER 5. Number Theory. 1. Integers and Division. Discussion
CHAPTER 5 Number Theory 1. Integers and Division 1.1. Divisibility. Definition 1.1.1. Given two integers a and b we say a divides b if there is an integer c such that b = ac. If a divides b, we write a
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings Fangguo Zhang 1, Reihaneh Safavi-Naini 1 and Chih-Yin Lin 2 1 School of Information Technology and Computer
THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY KRISTIN LAUTER, MICROSOFT CORPORATION
T OPICS IN WIRELESS SECURITY THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY KRISTIN LAUTER, MICROSOFT CORPORATION Q 2 = R 1 Q 2 R 1 R 1 As the wireless industry explodes, it faces
Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem)
Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem) In order to understand the details of the Fingerprinting Theorem on fingerprints of different texts from Chapter 19 of the
Winter Camp 2011 Polynomials Alexander Remorov. Polynomials. Alexander Remorov [email protected]
Polynomials Alexander Remorov [email protected] Warm-up Problem 1: Let f(x) be a quadratic polynomial. Prove that there exist quadratic polynomials g(x) and h(x) such that f(x)f(x + 1) = g(h(x)).
Quotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
Monogenic Fields and Power Bases Michael Decker 12/07/07
Monogenic Fields and Power Bases Michael Decker 12/07/07 1 Introduction Let K be a number field of degree k and O K its ring of integers Then considering O K as a Z-module, the nicest possible case is
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Notes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
Elements of Applied Cryptography Public key encryption
Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let
Homework until Test #2
MATH31: Number Theory Homework until Test # Philipp BRAUN Section 3.1 page 43, 1. It has been conjectured that there are infinitely many primes of the form n. Exhibit five such primes. Solution. Five such
FACTORISATION YEARS. A guide for teachers - Years 9 10 June 2011. The Improving Mathematics Education in Schools (TIMES) Project
9 10 YEARS The Improving Mathematics Education in Schools (TIMES) Project FACTORISATION NUMBER AND ALGEBRA Module 33 A guide for teachers - Years 9 10 June 2011 Factorisation (Number and Algebra : Module
The van Hoeij Algorithm for Factoring Polynomials
The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial
Factorization Methods: Very Quick Overview
Factorization Methods: Very Quick Overview Yuval Filmus October 17, 2012 1 Introduction In this lecture we introduce modern factorization methods. We will assume several facts from analytic number theory.
Elliptic Curve Cryptography
Elliptic Curve Cryptography Elaine Brow, December 2010 Math 189A: Algebraic Geometry 1. Introduction to Public Key Cryptography To understand the motivation for elliptic curve cryptography, we must first
Number Theory Hungarian Style. Cameron Byerley s interpretation of Csaba Szabó s lectures
Number Theory Hungarian Style Cameron Byerley s interpretation of Csaba Szabó s lectures August 20, 2005 2 0.1 introduction Number theory is a beautiful subject and even cooler when you learn about it
Notes 11: List Decoding Folded Reed-Solomon Codes
Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,
Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University
Implementation and Comparison of Various Digital Signature Algorithms -Nazia Sarang Boise State University What is a Digital Signature? A digital signature is used as a tool to authenticate the information
QUADRATIC RECIPROCITY IN CHARACTERISTIC 2
QUADRATIC RECIPROCITY IN CHARACTERISTIC 2 KEITH CONRAD 1. Introduction Let F be a finite field. When F has odd characteristic, the quadratic reciprocity law in F[T ] (see [4, Section 3.2.2] or [5]) lets
