TY - GEN
T1 - Improvement of Faugère et al.'s method to solve ECDLP
AU - Huang, Yun Ju
AU - Petit, Christophe
AU - Shinohara, Naoyuki
AU - Takagi, Tsuyoshi
PY - 2013
Y1 - 2013
N2 - Solving the elliptic curve discrete logarithm problem (ECDLP) by using Gröbner basis has recently appeared as a new threat to the security of elliptic curve cryptography and pairing-based cryptosystems. At Eurocrypt 2012, Faugère, Perret, Petit and Renault proposed a new method using a multivariable polynomial system to solve ECDLP over finite fields of characteristic 2. At Asiacrypt 2012, Petit and Quisquater showed that this method may beat generic algorithms for extension degrees larger than about 2000. In this paper, we propose a variant of Faugère et al.'s attack that practically reduces the computation time and memory required. Our variant is based on the idea of symmetrization. This idea already provided practical improvements in several previous works for composite-degree extension fields, but its application to prime-degree extension fields has been more challenging. To exploit symmetries in an efficient way in that case, we specialize the definition of factor basis used in Faugère et al.'s attack to replace the original polynomial system by a new and simpler one. We provide theoretical and experimental evidence that our method is faster and requires less memory than Faugère et al.'s method when the extension degree is large enough.
AB - Solving the elliptic curve discrete logarithm problem (ECDLP) by using Gröbner basis has recently appeared as a new threat to the security of elliptic curve cryptography and pairing-based cryptosystems. At Eurocrypt 2012, Faugère, Perret, Petit and Renault proposed a new method using a multivariable polynomial system to solve ECDLP over finite fields of characteristic 2. At Asiacrypt 2012, Petit and Quisquater showed that this method may beat generic algorithms for extension degrees larger than about 2000. In this paper, we propose a variant of Faugère et al.'s attack that practically reduces the computation time and memory required. Our variant is based on the idea of symmetrization. This idea already provided practical improvements in several previous works for composite-degree extension fields, but its application to prime-degree extension fields has been more challenging. To exploit symmetries in an efficient way in that case, we specialize the definition of factor basis used in Faugère et al.'s attack to replace the original polynomial system by a new and simpler one. We provide theoretical and experimental evidence that our method is faster and requires less memory than Faugère et al.'s method when the extension degree is large enough.
UR - http://www.scopus.com/inward/record.url?scp=84891939354&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84891939354&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-41383-4_8
DO - 10.1007/978-3-642-41383-4_8
M3 - Conference contribution
AN - SCOPUS:84891939354
SN - 9783642413827
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 115
EP - 132
BT - Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Proceedings
T2 - 8th International Workshop on Security, IWSEC 2013
Y2 - 18 November 2013 through 20 November 2013
ER -