Cover Attacks A report for the AREHCC project

نویسنده

  • Jasper Scholten
چکیده

In this report, we give an overview of a certain class of attacks on elliptic and hyperelliptic curve cryptography. The attacks we will discuss are only applicable if one considers discrete logarithms in class groups of elliptic or hyperelliptic curves over finite non-prime fields. Let us state the general idea of the class of attacks we will consider: Let H/K be a elliptic or hyperelliptic curve (or even a more general curve) defined over a finite non-prime field K. Assume that the DLP in the divisor class group Cl(H/K) = Jac(H)(K) of H/K (of degree 0) is used as a cryptographic primitive. (Note that if E is an elliptic curve, one has a canonical isomorphism E(K) ≃ Cl(E/K), thus we consider in particular the DLP in elliptic curves.) The assumption that the DLP is used as a cryptographic primitive means in particular that Cl(H/K) contains a large subgroup of prime order. We will use this fact in the following. If the genus of H would be ≥ 4 (and maybe ≥ 3), index calculus attacks on Cl(H/K) would be more efficient than “generic attacks” like Pollard ρ. If however the genus of H is 1 or 2, generic attacks are more efficient than index calculus attacks; c.f. [4], [7], [17]. The idea is now to transfer the DLP in Cl(H/K) in a DLP in the class group of a curve of higher genus over a smaller field. Let us assume that K is an extension of another finite field k. (The field k need not be a prime field.) Let us fix explicitly that char(k) = p, k = Fq and K = Fqn , i.e. [K : k] = n. Assume that we have an explicitely given curve C/k defined over k and an explicitely given cover c : C −→ H defined over K. (A non-constant morphism between two curves is called a cover.) Then we have the conorm or pull-back map c : Cl(H/K) −→ Cl(C/K), and we also have the norm map N : Cl(C/K) −→ Cl(C/k). By composing

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transition Potential Modeling of Land-Cover based on Similarity Weighted Instance-based Learning Procedure and Its Implication in the REDD Project Design Document

  Reducing Emissions from Deforestation and Forest Degradation (REDD) is a climate change mitigation strategy employed to reduce the intensity of deforestation and GHGS emissions. In recent decades, drastic land use changes in Mazandaran province caused a substantial reduction in the amount of Hyrcanian forests. The present research based on objectives of REDD projects paid to identify of fore...

متن کامل

Stream ciphers and the eSTREAM project

Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.

متن کامل

Ciliary Body Tuberculosis Presenting with Attacks of Acute Intraocular Pressure Rise

Purpose: To report a rare presentation of ophthalmic tuberculosis. Case Report: A 19-year-old man was referred to the glaucoma clinic due to multiple attacks of increased intraocular pressure (IOP) in his right eye. IOP of the right eye was 50 mmHg, and glaucomatous damage of the optic nerve was present. In gonioscopy, an oval-black lesion was present in the ciliary body band on the temporal si...

متن کامل

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

The impact of sound land use management to reduce runoff

The study aimed to determine the impact of sound land use management to the runoff in Kabuntalan, Maguindanao in Tamontaka river basin. This was done through simulation and the comparison of the three land cover scenarios such as 2015 land cover, 2025 projected land cover and desired land use to determine its difference in terms of runoff. Hydrologic Engineering Center-Hydrologic Modeling Syste...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003