Cargando…

Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016

Wang et al. proposed a method for obtaining elliptic curves with embedding degree 1 for securing critical infrastructures, and presented several elliptic curves generated by their method with torsion points of 160 bits and 189 bits orders. They also presented some experimental results and claimed th...

Descripción completa

Detalles Bibliográficos
Autor principal: Teruya, Tadanori
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6380619/
https://www.ncbi.nlm.nih.gov/pubmed/30779766
http://dx.doi.org/10.1371/journal.pone.0212310
_version_ 1783396331366121472
author Teruya, Tadanori
author_facet Teruya, Tadanori
author_sort Teruya, Tadanori
collection PubMed
description Wang et al. proposed a method for obtaining elliptic curves with embedding degree 1 for securing critical infrastructures, and presented several elliptic curves generated by their method with torsion points of 160 bits and 189 bits orders. They also presented some experimental results and claimed that their implementation of an elliptic curve generated with their method is faster than an implementation for embedded devices presented by Bertoni et al. In this paper, we point out that the security and efficiency claims given by Wang et al. are flawed. Specifically, we show that it is possible to solve finite field discrete logarithm problems defined over their elliptic curves in practice. On the elliptic curves with torsion points of 160 bits orders generated by Wang et al., their instances of finite field discrete logarithm problems are solved in around 4 hours by using a standard desktop PC. On the torsion points of 189 bits orders, their instances are solved in around 10 days by using two standard desktop PCs. The hardness of the finite field discrete logarithm problems is one of the most important bases of security; therefore, their elliptic curves should not be used for cryptographic purposes.
format Online
Article
Text
id pubmed-6380619
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-63806192019-03-01 Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016 Teruya, Tadanori PLoS One Research Article Wang et al. proposed a method for obtaining elliptic curves with embedding degree 1 for securing critical infrastructures, and presented several elliptic curves generated by their method with torsion points of 160 bits and 189 bits orders. They also presented some experimental results and claimed that their implementation of an elliptic curve generated with their method is faster than an implementation for embedded devices presented by Bertoni et al. In this paper, we point out that the security and efficiency claims given by Wang et al. are flawed. Specifically, we show that it is possible to solve finite field discrete logarithm problems defined over their elliptic curves in practice. On the elliptic curves with torsion points of 160 bits orders generated by Wang et al., their instances of finite field discrete logarithm problems are solved in around 4 hours by using a standard desktop PC. On the torsion points of 189 bits orders, their instances are solved in around 10 days by using two standard desktop PCs. The hardness of the finite field discrete logarithm problems is one of the most important bases of security; therefore, their elliptic curves should not be used for cryptographic purposes. Public Library of Science 2019-02-19 /pmc/articles/PMC6380619/ /pubmed/30779766 http://dx.doi.org/10.1371/journal.pone.0212310 Text en © 2019 Tadanori Teruya http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Teruya, Tadanori
Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016
title Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016
title_full Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016
title_fullStr Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016
title_full_unstemmed Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016
title_short Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016
title_sort security analysis of elliptic curves with embedding degree 1 proposed in plos one 2016
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6380619/
https://www.ncbi.nlm.nih.gov/pubmed/30779766
http://dx.doi.org/10.1371/journal.pone.0212310
work_keys_str_mv AT teruyatadanori securityanalysisofellipticcurveswithembeddingdegree1proposedinplosone2016