• Keine Ergebnisse gefunden

Elliptic curves

N/A
N/A
Protected

Academic year: 2022

Aktie "Elliptic curves"

Copied!
52
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Topics in Algebra: Cryptography

Univ.-Prof. Dr. Goulnara ARZHANTSEVA

WS 2019

(2)

Weierstrass equation

Letkbe a field.

Weierstrass equations

TheaffineWeierstrass equation:

E:y2+a1xy +a3y =x3+a2x2+a4x+a6,aik.

ThehomogeneousWeierstrass equation:

E:y2z+a1xyz+a3yz2=x3+a2x2z+a4xz2+a6z3,aik.

Thevanishing set:

E(k) ={(x :y :z)∈P2so thatx,y,z ∈kis a solution ofE} ⊆P2 Thedefining polynomial:

F:y2z+a1xyz+a3yz2−(x3+a2x2z+a4xz2+a6z3),aik.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 2 / 37

(3)

Elliptic curves: projective plane and the point at ∞

E :y2=x3x + 1, E:y2z =x3xz2+z3and the point (0 : 1 : 0) at [image by ‘Squeamish Ossifrage’: crypto.stackexchange.com]

(4)

Elliptic curves

Definition: Elliptic curve

E isellipticifE is smooth.

Normal forms

1. Ifchark6= 2 then inE substitutey 7→y −a1x+a2 3 obtaining y2=x3+a02x2+a04x+a06

2. Ifchark6= 2,3 then substitutex 7→x− 13a02,a02=a2+a421 obtaining y2=x3+ax +b

chark6= 2,3 :disc(x3+ax+b) =−16(4a3+ 27b2)

chark6= 2,y2=f(x) =x3+a02x2+a04x+a06is singular⇐⇒discf = 0

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 4 / 37

(5)

Elliptic curves

Elliptic curves in normal form [image: Wikipedia]

(6)

Elliptic curve: The group structure (E (k), +)

ka field,kits algebraic closure,O= (0 : 1 : 0)∈E(k) the point at∞

Group structure on theR-points ofE :y2=x3x + 1 [image: Wikipedia]

Group structure: collinear triples sum toO.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 6 / 37

(7)

Elliptic curve: The group structure (E (k), +)

ka field,kits algebraic closure.

E(k) is theprojective algebraic setdefined by a homogeneous Weierstrass equation over the algebraic closure of the field.

An elliptic curve always contains the point at infinity, which is the neutral element in the corresponding abelian group.

An elliptic curve is a special case of aplane algebraic curve.

We can view the additiongeometrically,algebraically, and analytically.

(8)

Elliptic curve and projective lines

The defining polynomial:

F:y2z+a1xyz+a3yz2−(x3+a2x2z+a4xz2+a6z3),aik.

LetL={(x :y :z)|ax +by+cz = 0} ⊂P2(k) be a projective line with (a,b,c)6= (0,0,0)

Theorem: Intersection ofE with a projective line

LetL⊂P2(k) be a projective line. Then|L∩E(k)|= 3, counted with multiplicity.

IfLisk-rational (i.e.a,b,c∈k), and 2 of the intersection points are k-rational, then so is the 3rd point of the intersection.

If a polynomial of degreed overkhasd −1 roots ink, then the last root is also ink.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 8 / 37

(9)

Elliptic curve and projective lines

The defining polynomial:

F:y2z+a1xyz+a3yz2−(x3+a2x2z+a4xz2+a6z3),aik.

LetL={(x :y :z)|ax +by+cz = 0} ⊂P2(k) be a projective line with (a,b,c)6= (0,0,0)

Theorem: Intersection ofE with a projective line

LetL⊂P2(k) be a projective line. Then|L∩E(k)|= 3, counted with multiplicity.

IfLisk-rational (i.e.a,b,c∈k), and 2 of the intersection points are k-rational, then so is the 3rd point of the intersection.

If a polynomial of degreed overkhasd −1 roots ink, then the last root is also ink.

(10)

Elliptic curve and projective lines

Proof: a=b = 0. ThenL={(x :y : 0)}is the line at infinity and L∩E(k) ={(0 : 1 : 0)}of multiplicity 3.

a6= 0 orb6= 0. ThenL={(x :y : 1)|ax+by =−c} ∪ {(b:−a: 0)}and

we have two sub-cases.

1)b 6= 0. Then (b:−a: 0)6= (0 : 1 : 0), hence, (b:−a: 0)6∈E(k) as

(0 : 1 : 0) is its only point at infinity.

We substitutey =−ax+cb inE and obtain a cubic polynomial inx with 3 roots ink, counted with multiplicity.

2)b = 0,a6= 0. (0 : 1 : 0)∈L∩E(k).

We substitutex =−ac inE and obtain a quadratic polynomial iny that has two roots ink, counted with multiplicity. This gives 3 points.

For thek-rationality assertion useVieta’s formulas.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 9 / 37

(11)

Elliptic curve and projective lines

Proof: a=b = 0. ThenL={(x :y : 0)}is the line at infinity and L∩E(k) ={(0 : 1 : 0)}of multiplicity 3.

a6= 0 orb6= 0. ThenL={(x :y : 1)|ax+by =−c} ∪ {(b:−a: 0)}and

we have two sub-cases.

1)b 6= 0. Then (b:−a: 0)6= (0 : 1 : 0), hence, (b:−a: 0)6∈E(k) as

(0 : 1 : 0) is its only point at infinity.

We substitutey =−ax+cb inE and obtain a cubic polynomial inx with 3 roots ink, counted with multiplicity.

2)b = 0,a6= 0. (0 : 1 : 0)∈L∩E(k).

We substitutex =−ac inE and obtain a quadratic polynomial iny that has two roots ink, counted with multiplicity. This gives 3 points.

For thek-rationality assertion useVieta’s formulas.

(12)

Elliptic curve and projective lines

Proof: a=b = 0. ThenL={(x :y : 0)}is the line at infinity and L∩E(k) ={(0 : 1 : 0)}of multiplicity 3.

a6= 0 orb6= 0. ThenL={(x :y : 1)|ax+by =−c} ∪ {(b:−a: 0)}and

we have two sub-cases.

1)b 6= 0. Then (b:−a: 0)6= (0 : 1 : 0), hence, (b:−a: 0)6∈E(k) as

(0 : 1 : 0) is its only point at infinity.

We substitutey =−ax+cb inE and obtain a cubic polynomial inx with 3 roots ink, counted with multiplicity.

2)b = 0,a6= 0. (0 : 1 : 0)∈L∩E(k).

We substitutex =−ac inE and obtain a quadratic polynomial iny that has two roots ink, counted with multiplicity. This gives 3 points.

For thek-rationality assertion useVieta’s formulas.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 9 / 37

(13)

Elliptic curve and projective lines

Proof: a=b = 0. ThenL={(x :y : 0)}is the line at infinity and L∩E(k) ={(0 : 1 : 0)}of multiplicity 3.

a6= 0 orb6= 0. ThenL={(x :y : 1)|ax+by =−c} ∪ {(b:−a: 0)}and

we have two sub-cases.

1)b 6= 0. Then (b:−a: 0)6= (0 : 1 : 0), hence, (b:−a: 0)6∈E(k) as

(0 : 1 : 0) is its only point at infinity.

We substitutey =−ax+cb inE and obtain a cubic polynomial inx with 3 roots ink, counted with multiplicity.

2)b = 0,a6= 0. (0 : 1 : 0)∈L∩E(k).

We substitutex =−ca inE and obtain a quadratic polynomial iny that has two roots ink, counted with multiplicity. This gives 3 points.

For thek-rationality assertion useVieta’s formulas.

(14)

Elliptic curve and projective lines: Bézout’s theorem

Alternatively, to obtain|L∩E(k)|= 3, we can use the following result.

Theorem: Bézout’1779

LetC1,C2be two plane projective curves over a fieldkwhose defining polynomialsF1,F2are relatively prime (i.e. their polynomial greatest common divisor is a constant) and have degreesd1andd2.

Then their intersectionC1∩ C2inP2(k0), withk0 an algebraically closed fieldk0k, counted with theirmultiplicities, consists ofd1·d2points.

E has degree 3 (i.e. F has degree 3), a projective line has degree 1.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 10 / 37

(15)

Elliptic curve and projective lines: Tangents

Definition: Tangents

LetP∈E(k). The projective line TP :=

(u:v :w)∈P2| ∂F

∂x (P)·u+∂F

∂y (P)·v+∂F

∂z (P)·w = 0

is thetangentofE at pointP.

Let∇= (∂x,∂y ,∂z ), thenTP is defined by∇F(P)·

u v w

= 0.

ForO= (0 : 1 : 0), we have∇F(O) = (0,0,1),then O ∈TO ={(u :v :w)|w = 0}the line at∞.

(16)

Elliptic curve: The group structure (E (k), +)

We can view the additiongeometrically,algebraically, and analytically.

Group structure onE(k), geometrically

ForP,Q∈E(k) defineP∗Q byE(k)∩L={P,Q,P∗Q}, where L:=

(the projective line throughP andQifP 6=Q the tangentTP ofE atPifP =Q

We define

P+Q:= (P∗Q)∗ O.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 12 / 37

(17)

Elliptic curve: The group structure (E (k), +)

Theorem: Group structure onE(k)

LetP,Q,R∈E(k) andL⊂P2(k) a projective line. Then:

1 ∗and + are commutative.

2 (P∗Q)∗P =Q.

3 O ∗ O=O

4 IfL∩E(k) ={P,Q,R}, then (P+Q) +R=O.

5 P+O=P.

6 P+Q=O ⇔P∗Q=O.

7 + is associative.

8 (E(k),+) is an abelian group with neutral elementOand

−P=P∗ O.

9 E(k) is a subgroup ofE(k).

(18)

Elliptic curve: The group structure (E (k), +)

Proof:

1 By definitions of∗and +.

2 By definition ofLin the definition of∗.

3 SinceO ∈TO, see above.

4 (P+Q) +R= (((P∗Q)∗ O)∗R)∗ O2.=O ∗ O3.=O.

5 P+O= (P∗ O)∗ O1.= (O ∗P)∗ O2.=P.

6 IfP∗Q=O, thenP+Q= (P∗Q)∗ O=O ∗ O3.=O.IfP+Q=O, then

P∗Q5.= (P∗Q) +O= ((P∗Q)∗ O)∗ O= (P+Q)∗ O=O ∗ O3.=O.

7 Case by case analysis (whetherP =Qor/andR=P+Q, etc.) or, use algebraic formulas, or see the next slide.

8 Follows from 1, 5, 6, and 7.

9 IfE is defined overkandP,Q∈E(k), thenL,L∩E are defined overk. In addition,P∗Qis, as the 3rd root ofL∩E(k), also ink.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 14 / 37

(19)

The group structure (E (k), +): Associativity

Sketch: LetP,Q,R∈E(k).

To compute−((P+Q) +R) we form projective lines L1=PQ,M2=O,P+QandL3=R,P+Q.

To compute−(P+ (Q+R)) we form projective lines M1=QR,L2=O,Q+RandM3=P,Q+R.

We see thatPij =Li∩Mj ∈E, except possiblyP33. Bythe Theorem below, having 8 pointsPij 6=P33onE ⇒P33 ∈E.

SinceL3∩E ={R,P+Q,−((P+Q) +R)}, we must have

−((P+Q) +R) =P33.

Similarly,−(P+ (Q+R)) =P33, so−((P+Q) +R) =−(P+ (Q+R)), whence the associativity.

Cases:Pij =OorPij =Pkl (a line is tangent) or two lines are equal.

(20)

The group structure (E (k), +): Associativity

Sketch: LetP,Q,R∈E(k).

To compute−((P+Q) +R) we form projective lines L1=PQ,M2=O,P+QandL3=R,P+Q.

To compute−(P+ (Q+R)) we form projective lines M1=QR,L2=O,Q+RandM3=P,Q+R.

We see thatPij =Li ∩Mj ∈E, except possiblyP33. Bythe Theorem below, having 8 pointsPij 6=P33onE ⇒P33 ∈E.

SinceL3∩E ={R,P+Q,−((P+Q) +R)}, we must have

−((P+Q) +R) =P33.

Similarly,−(P+ (Q+R)) =P33, so−((P+Q) +R) =−(P+ (Q+R)), whence the associativity.

Cases:Pij =OorPij =Pkl (a line is tangent) or two lines are equal.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 15 / 37

(21)

The group structure (E (k), +): Associativity

Sketch: LetP,Q,R∈E(k).

To compute−((P+Q) +R) we form projective lines L1=PQ,M2=O,P+QandL3=R,P+Q.

To compute−(P+ (Q+R)) we form projective lines M1=QR,L2=O,Q+RandM3=P,Q+R.

We see thatPij =Li ∩Mj ∈E, except possiblyP33. Bythe Theorem below, having 8 pointsPij 6=P33onE ⇒P33 ∈E.

SinceL3∩E ={R,P+Q,−((P+Q) +R)}, we must have

−((P+Q) +R) =P33.

Similarly,−(P+ (Q+R)) =P33, so−((P+Q) +R) =−(P+ (Q+R)), whence the associativity.

Cases:Pij =OorPij =Pkl (a line is tangent) or two lines are equal.

(22)

The group structure (E (k), +): Associativity

Sketch: LetP,Q,R∈E(k).

To compute−((P+Q) +R) we form projective lines L1=PQ,M2=O,P+QandL3=R,P+Q.

To compute−(P+ (Q+R)) we form projective lines M1=QR,L2=O,Q+RandM3=P,Q+R.

We see thatPij =Li ∩Mj ∈E, except possiblyP33. Bythe Theorem below, having 8 pointsPij 6=P33onE ⇒P33 ∈E.

SinceL3∩E ={R,P+Q,−((P+Q) +R)}, we must have

−((P+Q) +R) =P33.

Similarly,−(P+ (Q+R)) =P33, so−((P+Q) +R) =−(P+ (Q+R)), whence the associativity.

Cases:Pij =OorPij =Pkl (a line is tangent) or two lines are equal.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 15 / 37

(23)

The group structure (E (k), +): Associativity

Theorem: Cayley-Bacharach’1886

IfP1, . . . ,P8are points inP2(k), no 4 on a line, and no 7 on a conic, then there is a 9th pointQsuch thatanycubic throughP1, . . . ,P8also passes throughQ.

Using the Theorem: Two cubic curves,L1L2L3= 0 andM1M2M3= 0, pass through 8 points: O,P,Q,R,P+Q,Q+R,−(P+Q),−(Q+R).By Bezout’s theorem, two cubics intersect in 9 points,P33is the 9th point.

By the Theorem, any other cubic through these 8 points also passes throughP33. So,E passes throughP33.OnM1M2M3∩E we have:

O,P,Q,R,P+Q,Q+R,−(P+Q),−(Q+R),−(P+ (Q+R)),P33. Only 3 points on a line intersect a cubic, so two of these points must coincide. By definition,P33 is6= any of the first 8 points, so

P33=−(P+ (Q+R)).

Similarly, forL1L2L3∩E, that givesP33 =−((P+Q) +R).

(24)

The group structure (E (k), +): Associativity

Theorem: Cayley-Bacharach’1886

IfP1, . . . ,P8are points inP2(k), no 4 on a line, and no 7 on a conic, then there is a 9th pointQsuch thatanycubic throughP1, . . . ,P8also passes throughQ.

Using the Theorem: Two cubic curves,L1L2L3= 0 andM1M2M3= 0, pass through 8 points: O,P,Q,R,P+Q,Q+R,−(P+Q),−(Q+R).By Bezout’s theorem, two cubics intersect in 9 points,P33is the 9th point.

By the Theorem, any other cubic through these 8 points also passes throughP33. So,E passes throughP33.

OnM1M2M3∩E we have: O,P,Q,R,P+Q,Q+R,−(P+Q),−(Q+R),−(P+ (Q+R)),P33. Only 3 points on a line intersect a cubic, so two of these points must coincide. By definition,P33 is6= any of the first 8 points, so

P33=−(P+ (Q+R)).

Similarly, forL1L2L3∩E, that givesP33 =−((P+Q) +R).

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 16 / 37

(25)

The group structure (E (k), +): Associativity

Theorem: Cayley-Bacharach’1886

IfP1, . . . ,P8are points inP2(k), no 4 on a line, and no 7 on a conic, then there is a 9th pointQsuch thatanycubic throughP1, . . . ,P8also passes throughQ.

Using the Theorem: Two cubic curves,L1L2L3= 0 andM1M2M3= 0, pass through 8 points: O,P,Q,R,P+Q,Q+R,−(P+Q),−(Q+R).By Bezout’s theorem, two cubics intersect in 9 points,P33is the 9th point.

By the Theorem, any other cubic through these 8 points also passes throughP33. So,E passes throughP33.OnM1M2M3∩E we have:

O,P,Q,R,P+Q,Q+R,−(P+Q),−(Q+R),−(P+ (Q+R)),P33. Only 3 points on a line intersect a cubic, so two of these points must coincide. By definition,P33 is6= any of the first 8 points, so

P33=−(P+ (Q+R)).

Similarly, forL1L2L3∩E, that givesP33 =−((P+Q) +R).

(26)

The group structure (E (k), +): Associativity

Theorem: Cayley-Bacharach’1886

IfP1, . . . ,P8are points inP2(k), no 4 on a line, and no 7 on a conic, then there is a 9th pointQsuch thatanycubic throughP1, . . . ,P8also passes throughQ.

Using the Theorem: Two cubic curves,L1L2L3= 0 andM1M2M3= 0, pass through 8 points: O,P,Q,R,P+Q,Q+R,−(P+Q),−(Q+R).By Bezout’s theorem, two cubics intersect in 9 points,P33is the 9th point.

By the Theorem, any other cubic through these 8 points also passes throughP33. So,E passes throughP33.OnM1M2M3∩E we have:

O,P,Q,R,P+Q,Q+R,−(P+Q),−(Q+R),−(P+ (Q+R)),P33. Only 3 points on a line intersect a cubic, so two of these points must coincide. By definition,P33 is6= any of the first 8 points, so

P33=−(P+ (Q+R)).

Similarly, forL1L2L3∩E, that givesP33 =−((P+Q) +R).

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 16 / 37

(27)

The group structure (E (k), +): Associativity

Theorem: Cayley-Bacharach’1886

IfP1, . . . ,P8are points inP2(k), no 4 on a line, and no 7 on a conic, then there is a 9th pointQsuch that any cubic throughP1, . . . ,P8also passes throughQ.

Hypothesis of the Theorem are fulfilled: If 4 of the points

O,P,Q,R,P+Q,Q+R,−(P+Q),−(Q+R) are on a lineL, then, as they are also onE,|L∩E(k)|>4, which contradicts Bezout’s theorem (as 1·3 = 3).

If 7 of them lie on a conicC, as they are also onE,|C∩E(k)|>7, which contradicts Bezout’s theorem (as 2·3 = 6.)

(28)

Elliptic curve: The group structure (E (k), +)

The defining polynomial:

F:y2z+a1xyz+a3yz2−(x3+a2x2z+a4xz2+a6z3),aik.

P = (x1,y1) = (x1:y1: 1),Q= (x2,y2) = (x2:y2: 1)∈E(k) with P,Q6=O.

Letλ= yx2−y1

2−x1 ifP 6=Qandλ=

∂F

∂x (P)

∂F

∂y (P) =−a1y12y−3x12−2a2x1−a4

1+a1x1+a3 ifP=Q.

Group structure onE(k), algebraically (without proof) P+Q= (λ2+a1λ−a2−x1−x2,−y1+λ(x1−x3)−a1x1−a3)

−P =P∗ O= (x1:−y1−a1x1−a3: 1) Here: x3=λ2+a1λ−a2−x1−x2.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 18 / 37

(29)

Elliptic curve: The group structure (E (k), +)

Theorem: Mordell’1922–Weil’1928

For an abelian varietyAover a number fieldk, the groupA(k) of k-rational points ofAis afinitely-generatedabelian group.

Corollary

For a number fieldk, the abelian groupE(k) is finitely generated.

Theorem: Structure of finitely generated abelian groups

Given a finitely generated abelian groupA, there existr,k ∈N>0and n1, . . . ,nk ∈Nwithni|ni+1such thatA∼= Zr×Z/n1Z× · · · ×Z/nkZ,r is therankofAand theni’s are thedeterminantal divisorsofA.

(30)

Elliptic curves over finite fields

Elliptic curveE:y2=x3x over the finite fieldF61[image: Wikipedia]

The tangentTPofE algebraically:Pis the double root ofFTP.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 20 / 37

(31)

Elliptic curve: Size of (E ( F

q

), +)

Letpbe a prime,q =pnandN =|E(Fq)|.

Theorem: Hasse’1933 (without proof)

The order ofE(Fq) satisfies:

|q+ 1−N|62√ q

LetP∈E(Fq), the order ofE(Fq) satisfiesN·P=O. By Hasse’s bound, we can findNin 4√

q steps.

Exercises: Shank’s Baby-Step Giant-Step algorithmto solve theDLP inE(Fq). In particular, we can findNin 4q14 steps.

(32)

Elliptic curve: Size of (E ( F

q

), +)

Letpbe a prime,q =pnandN =|E(Fq)|.

Theorem: Hasse’1933 (without proof)

The order ofE(Fq) satisfies:

|q+ 1−N|62√ q

LetP∈E(Fq), the order ofE(Fq) satisfiesN·P=O.

By Hasse’s bound, we can findNin 4√

q steps.

Exercises: Shank’s Baby-Step Giant-Step algorithmto solve theDLP inE(Fq). In particular, we can findNin 4q14 steps.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 21 / 37

(33)

Elliptic curve: Structure of (E ( F

q

), +)

Theorem: existence of elliptic curves over finite fields (without proof) Letpbe a prime,q =pnandN =q+ 1−afor somea∈Zwith

|a|62√

q.Then there is an elliptic curveE(Fq) with|E(Fq)|=N if and only ifasatisfies one of the following conditions:

1 gcd(a,p) =1.

2 nis even anda=±2√ q

3 nis even,p6≡1 mod 3, anda=±√ q.

4 nis odd,p= 2 orp= 3, anda=±pn+12 .

5 nis even,p6≡1 mod 4, anda= 0.

6 nis odd anda= 0.

(34)

Elliptic curve: Structure of (E ( F

q

), +)

Theorem: structure for elliptic curves over finite fields (without proof) Letpbe a prime,q =pnandN =q+ 1−afor somea∈Zwith

|a|62√

q.WriteN =pen1n2withp6 |n1n2andn1|n2(possiblyn1= 1).

Then there isE(Fq) such that

E(Fq)∼= Z/peZ×Z/n1Z×Z/n2Z if and only if

1 n1|q−1 in the cases 1, 3, 4, 5, 6 of the preceding Theorem.

2 n1=n2in the case 2 of the preceding theorem.

These areall groupsthat occur asE(Fq).

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 23 / 37

(35)

Realizations of abelian groups

DLP assumptionincludes that theDLP in ((Z/pZ)×,·) is not in BPP.

Exercises: theDLP in (Z/(p−1)Z,+) is in P.

However,

((Z/pZ)×,·)∼= (Z/(p−1)Z,+).

Thus, the complexity of the DLP depends on therealizationof the abelian group.

(E(k),+) is an elliptic curve realization of the abelian group. It is a realization which resists allknown attackson the DLP. SafeCurves= curves with efficientandsecure implementation.

(36)

Realizations of abelian groups

DLP assumptionincludes that theDLP in ((Z/pZ)×,·) is not in BPP.

Exercises: theDLP in (Z/(p−1)Z,+) is in P.

However,

((Z/pZ)×,·)∼= (Z/(p−1)Z,+).

Thus, the complexity of the DLP depends on therealizationof the abelian group.

(E(k),+) is an elliptic curve realization of the abelian group.

It is a realization which resists allknown attackson the DLP.

SafeCurves= curves with efficientandsecure implementation.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 24 / 37

(37)

Realizations of abelian groups

DLP assumptionincludes that theDLP in ((Z/pZ)×,·) is not in BPP.

Exercises: theDLP in (Z/(p−1)Z,+) is in P.

However,

((Z/pZ)×,·)∼= (Z/(p−1)Z,+).

Thus, the complexity of the DLP depends on therealizationof the abelian group.

(E(k),+) is an elliptic curve realization of the abelian group.

It is a realization which resists allknown attackson the DLP.

SafeCurves= curves with efficientandsecure implementation.

(38)

ECC versus RSA

A smaller key size with ECC

ECC with 256-bit key∼RSA with 3072-bit key

Protection Symmetric RSA modulus Elliptic curve

Standard: not now 80 1024 160

Near-term: 2018-28 128 3072 256

Long-term: 2018-68 256 15360 512

ECRYPT-CSA Recommendations (2018)

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 25 / 37

(39)

ECC versus RSA

A smaller key size with ECC

ECC with 256-bit key∼ElGamal 3072-bit group size

General number field sieve(GNFS) for DLP in (Z/pZ)× runs in time 2O(n1/3·(log2n)2/3)forpof lengthO(n).

So, for a512-bit primep, the GNFS solves the DLP in (Z/pZ)×in roughly

25121/3·92/3 ∼28·4= 232steps.

The bestgeneric algorithmsolves DLP inE(Fq) withN=|E(Fq)|, whereN is a64-bit prime, in roughly

N∼264/2= 232steps.

(40)

ECC in Practice: Example

SSL / TLS protocols

SSL=Secure Sockets Layer, TLS=Transport Layer Security

They use public key cryptography to derive symmetric keys and then use symmetric key cryptography to ensureconfidentialityanddata integrityof the communication.

Web browsing, email, instant messaging, communication between a browser and a server.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 27 / 37

(41)

Diffie-Hellman key agreement

To exchange keys securely over an insecure communication channel:

Diffie-Hellman’1976Key exchangeprotocol

1 Alice and Bob agree publicly on a cyclic groupG=hgi.

2 Alice choses randomly 06a6|G|and computesA:=ga. Bob chooses randomly 06b6|G|and computesB:=gb.

3 Alice sendsA, Bob sendsB.

4 Alice computesS:=Ba. Bob computesS:=Ab.

5 Since it is the sameS, they can use it as their secrete key to encrypt and decrypt messages.

Standard choice: G= (Z/pZ)×, Public information: G=hgi,A,B.

(42)

Diffie-Hellman key agreement: Interceptor attacks

Passive attack by Eve

Eve=eavesdroppershould solve theDHP, i.e. givengaandgb(but not aorb) she wants to findS=gab.

Solving the DLP inGwould solve the DHP inG. Hence, DLP6∈BPP is at least as strong as DHP6∈BPP. Theequivalenceis unknown.

Active attack by Mallory

Mallory=(wo)man-in-the middle attacktells Allice to be Bob and does the exchange gettingS.

He/she tells to Bob to be Alice and does the exchange gettingS0. Whenever Alice sends Bob a message, Mallory takes the cyphertext, decrypts it withS, reads it, then encrypts it withS0 and sends to Bob.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 29 / 37

(43)

Diffie-Hellman key agreement: Interceptor attacks

Passive attack by Eve

Eve=eavesdroppershould solve theDHP, i.e. givengaandgb(but not aorb) she wants to findS=gab.

Solving the DLP inGwould solve the DHP inG. Hence, DLP6∈BPP is at least as strong as DHP6∈BPP. Theequivalenceis unknown.

Active attack by Mallory

Mallory=(wo)man-in-the middle attacktells Allice to be Bob and does the exchange gettingS.

He/she tells to Bob to be Alice and does the exchange gettingS0. Whenever Alice sends Bob a message, Mallory takes the cyphertext, decrypts it withS, reads it, then encrypts it withS0 and sends to Bob.

(44)

EC based Diffie-Hellman

Standard choice: G= (Z/pZ)×, Public information: G=hgi,A,B.

ECC choice: G=E(Fq) and the elliptic-curve public-private key pair.

Practice: ECDHEprotocol, last E=ephemeral, i.e. the public keys are not static, they are temporary.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 30 / 37

(45)

Digital Signature Scheme

To ensure the authenticity of data over an insecure channel:

Definition: Signature schemeis a 5-tuple (P,A,K,S,V), satisfying:

P is a finite set of possiblemessages;

Ais a finite set of possiblesignatures;

K, thekeyspace, is a finite set of possiblekeys;

S ={sigk :k ∈ K}consists of polynomialsigning algorithms sigk:P → A;

V ={verk :k ∈ K}consists of polynomialverification algorithms verk:P × A → {true, false};

∀x ∈ P,∀y ∈ A:verk(x,y) =

(true, ify =sigk(x) false, otherwise.

A pair (x,y) withx ∈ P,y ∈ Ais called asigned message.

(46)

Digital Signature Scheme (DSS)

∀k ∈ K,verk is public andsigk is private.

There might by more than oney ∈ Asuch thatverk(x,y) = true, depending on the definition ofverk.

We require that the problem that, given a messagex ∈ P, anyone other than Alice can compute a signaturey ∈ Asuch that

verk(x,y) = true, is not in BPP.

Aforged signatureis a valid signature produced by someone other than Alice.

Usually, one signs only hash values of messages for performance reasons: ‘hash-then-sign’.

A digital signature should lose its validity if anything in the signed data was altered.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 32 / 37

(47)

Digital Signature Scheme (DSS)

∀k ∈ K,verk is public andsigk is private.

There might by more than oney ∈ Asuch thatverk(x,y) = true, depending on the definition ofverk.

We require that the problem that, given a messagex ∈ P, anyone other than Alice can compute a signaturey ∈ Asuch that

verk(x,y) = true, is not in BPP.

Aforged signatureis a valid signature produced by someone other than Alice.

Usually, one signs only hash values of messages for performance reasons: ‘hash-then-sign’.

A digital signature should lose its validity if anything in the signed data was altered.

(48)

RSA and EC variants of Digital Signature

RSA Signature Algorithm

It is the DSS withsigk defined by the RSA decryption functionDk and verk defined by the RSA encryption functionEk:

sigk(x) =Dk(x) andverk(x,y) = true⇔x =Ek(y)

Reminder:Dk(x) =xd modnandEk(y) =ye mod n, Analogously: DSS using one-way functions with trapdoors.

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 33 / 37

(49)

EC variant of Digital Signature

EIGamal Signature Scheme: a suitable signature scheme, not just use of the ElGamal cryptosystem in the DSS.

Digital Signature Algorithm (DSA)

ECDSA

(50)

Every day example

‘The connection to this site is encrypted and authenticated using TLS 1.2 (a strong protocol), ECDHE_RSA with X25519 (a strong key exchange), and AES_128_GCM (a strong cipher).’

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 35 / 37

(51)

Test questions

Question 12

1 Why does ElGamal producetwocomponents ciphertext?

2 Why the exponents used for decryption are smaller for ElGamal compared to RSA?

3 Why ECC is more popular than the original ElGamal?

Question 13

Which of the following statements are true?

1 Breaking ElGamal is equivalent to solving Asymmetry of ElGamal.

2 ElGamal is less efficient for encryption than RSA.

3 ElGamal is more efficient for decryption than RSA.

4 There is no message expansion in the RSA-OAEP cryptosystem.

(52)

Test questions

Question 14

Prove Cayley-Bacharach’s theorem.

Question 15

Check that for a primeq, each natural number in the Hasse interval occurs as the order ofE(Fq).

c

Univ.-Prof. Dr. Goulnara Arzhantseva Chapter 03: Elliptic Curve Cryptography 37 / 37

Referenzen

ÄHNLICHE DOKUMENTE

Paper Source Specifies whether paper feeds into the printer from the MP tray, the standard paper cassette (Cassette 1), or the optional paper cassette unit (Cassette 2).. If you select

Be sure to specify a paper size using the paper size setting dial on the paper cassette or the Tray Menu on the control panel.. The factory default paper size for all of the

The findings build on a substantial body of previous work, including that of Murthi and colleagues, 3 who used 1981 census data to explore female dis- advantage and advantage

Starting Position: Position yourself on a decline bench with your feet locked in.Your upper body should be raised off the bench, so you’ll have to contract your abs just to stay

Diese oder eine ähnliche Frage muß man sich wohl als Studierender immer mal stellen. Wenn man die Zeichen der Zeit bzw. der demo- kratisch legitimierten Regierung zu

a certain graph, is shown, and he wants to understand what it means — this corre- sponds to reception, though it involves the understanding of a non-linguistic sign;

“the importance of the support of local communities, private sector, civil society and media for increasing awareness about the threats of terrorism and more effectively

Women interviewed for this report in Egypt, Libya, and Yemen felt increasingly concerned about their general safety and security, highlighting fears of crime and armed