Comparative analysis of cryptoprimitives on canonical elliptic curves and Edwards curves
DOI:
https://doi.org/10.30837/rt.2019.3.198.15Keywords:
elliptic curves, Edwards curves, cryptanalysis, digital signatureAbstract
The article provides a comparative analysis of the basic transformations on canonical elliptic curves and Edwards curves. Comparisons of the performance of group operations in groups of points of elliptic curves and Edwards curves are given. The possibility of using the Pollard algorithm for cryptanalysis of Edwards curves, as well as the acceleration of the sequence generation for the ro-Polard algorithm for Edwards curves is shown, which allows to accelerate the execution of cryptanalysis. The paper proposes an assessment of the resistance of Edwards curves against attacks of the type “full disclosure” using the discrete logarithm in the Edwards curve point group.References
Bernstein D.J., Lange T. Faster Addition and Doubling on Elliptic Curves // Advancesin Cryptology—ASIACRYPT’2007 (Proc. 13th Int. Conf. On the Theory and Applicationof Cryptology and Information Security. Kuching, Malaysia. December 2–6, 2007). Lect. Notes Comp. Sci. V. 4833. Berlin : Springer, 2007. PP. 29–50.
Edwards H.M. A normal form for elliptic curves // Bulletin of the American Mathematical Society, Volume 44, Number 3, July 2007, PP. 393-422
Hisil Huseyin, Koon-Ho Wong Kenneth, Carter Gary, Dawson Ed. Twisted Edwards Curves Revisited // ASIACRYPT. 5350. New York: Springer, 2008. PP. 326-343
Балагура Д.С. Методы оценки сложности криптоанализа для криптографических приложений в группе точек эллиптической кривой, учитывающие вероятность коллизий / Д.С. Балагура, Ю.И. Горбенко // Радиотехника. 2005. Вып. 142. С. 205 – 214.
Бессалов А.В. Эллиптические кривые в форме Эдвардса и криптография: монография. Киев : ІВЦ «Видавництво «Політехника»», 2017. 272с.
Горбенко І. Д. Прикладна криптологія : підручник / І. Д. Горбенко, Ю. І. Горбенко ; вид. 2-ге. Харків : Форт, 2013. 878 с.
Горбенко Ю.І., Єсіна М.В., Кулібаба В.А. Сутність та умови здійснення атаки на зв’язаних ключах відносно ектронних підписів IBS-1 та IBS-2 ДСТУ ISO/IEC 14888-3 // Системи обробки інформації. 2016. № 7. С. 113-118. (http://www.hups.mil.gov.ua/periodic-app/article/16934)
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).