For faster navigation, this Iframe is preloading the Wikiwand page for Trace zero cryptography.

Trace zero cryptography

This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages) This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: "Trace zero cryptography" – news · newspapers · books · scholar · JSTOR (March 2011) (Learn how and when to remove this message) The article's lead section may need to be rewritten. Please help improve the lead and read the lead layout guide. (June 2019) (Learn how and when to remove this message) (Learn how and when to remove this message)

In 1998 Gerhard Frey firstly proposed using trace zero varieties for cryptographic purpose. These varieties are subgroups of the divisor class group on a low genus hyperelliptic curve defined over a finite field. These groups can be used to establish asymmetric cryptography using the discrete logarithm problem as cryptographic primitive.

Trace zero varieties feature a better scalar multiplication performance than elliptic curves. This allows fast arithmetic in these groups, which can speed up the calculations with a factor 3 compared with elliptic curves and hence speed up the cryptosystem.

Another advantage is that for groups of cryptographically relevant size, the order of the group can simply be calculated using the characteristic polynomial of the Frobenius endomorphism. This is not the case, for example, in elliptic curve cryptography when the group of points of an elliptic curve over a prime field is used for cryptographic purpose.

However to represent an element of the trace zero variety more bits are needed compared with elements of elliptic or hyperelliptic curves. Another disadvantage, is the fact, that it is possible to reduce the security of the TZV of 1/6th of the bit length using cover attack.

Mathematical background

[edit]

A hyperelliptic curve C of genus g over a prime field where q = pn (p prime) of odd characteristic is defined as

where f monic, deg(f) = 2g + 1 and deg(h) ≤ g. The curve has at least one -rational Weierstraßpoint.

The Jacobian variety of C is for all finite extension isomorphic to the ideal class group . With the Mumford's representation it is possible to represent the elements of with a pair of polynomials [u, v], where u, v.

The Frobenius endomorphism σ is used on an element [u, v] of to raise the power of each coefficient of that element to q: σ([u, v]) = [uq(x), vq(x)]. The characteristic polynomial of this endomorphism has the following form:

where ai in

With the Hasse–Weil theorem it is possible to receive the group order of any extension field by using the complex roots τi of χ(T):

Let D be an element of the of C, then it is possible to define an endomorphism of , the so-called trace of D:

Based on this endomorphism one can reduce the Jacobian variety to a subgroup G with the property, that every element is of trace zero:

G is the kernel of the trace endomorphism and thus G is a group, the so-called trace zero (sub)variety (TZV) of .

The intersection of G and is produced by the n-torsion elements of . If the greatest common divisor the intersection is empty and one can compute the group order of G:

The actual group used in cryptographic applications is a subgroup G0 of G of a large prime order l. This group may be G itself.[1][2]

There exist three different cases of cryptographical relevance for TZV:[3]

  • g = 1, n = 3
  • g = 1, n = 5
  • g = 2, n = 3

Arithmetic

[edit]

The arithmetic used in the TZV group G0 based on the arithmetic for the whole group , But it is possible to use the Frobenius endomorphism σ to speed up the scalar multiplication. This can be archived if G0 is generated by D of order l then σ(D) = sD, for some integers s. For the given cases of TZV s can be computed as follows, where ai come from the characteristic polynomial of the Frobenius endomorphism :

  • For g = 1, n = 3:
  • For g = 1, n = 5:
  • For g = 2, n = 3:

Knowing this, it is possible to replace any scalar multiplication mD (|m| ≤ l/2) with:

With this trick the multiple scalar product can be reduced to about 1/(n − 1)th of doublings necessary for calculating mD, if the implied constants are small enough.[3][2]

Security

[edit]

The security of cryptographic systems based on trace zero subvarieties according to the results of the papers[2][3] comparable to the security of hyper-elliptic curves of low genus g' over , where p' ~ (n − 1)(g/g' ) for |G| ~128 bits.

For the cases where n = 3, g = 2 and n = 5, g = 1 it is possible to reduce the security for at most 6 bits, where |G| ~ 2256, because one can not be sure that G is contained in a Jacobian of a curve of genus 6. The security of curves of genus 4 for similar fields are far less secure.

Cover attack on a trace zero crypto-system

[edit]

The attack published in[4] shows, that the DLP in trace zero groups of genus 2 over finite fields of characteristic diverse than 2 or 3 and a field extension of degree 3 can be transformed into a DLP in a class group of degree 0 with genus of at most 6 over the base field. In this new class group the DLP can be attacked with the index calculus methods. This leads to a reduction of the bit length 1/6th.

Notes

[edit]
  1. ^ Frey, Gerhard; Lange, Tanja (2005). "Mathematical Background of Public Key Cryptography" (PDF). Seminaires & Congres. 11: 41–73.
  2. ^ a b c Lange, Tanja (2003). "Trace Zero Subvariety for Cryptosystems". Cryptology ePrint Archive.
  3. ^ a b c Avanzi, Roberto M.; Cesena, Emanuele (2008). "Trace Zero Varieties over Fields of Characteristic 2 for Cryptographic Applications" (PDF). Algebraic Geometry and Its Applications: 188–215. doi:10.1142/9789812793430_0010. ISBN 978-981-279-342-3.
  4. ^ Diem, Claus; Scholten, Jasper. An Attack on a Trace-Zero Cryptosystem. CiteSeerX 10.1.1.295.9027.

References

[edit]
{{bottomLinkPreText}} {{bottomLinkText}}
Trace zero cryptography
Listen to this article

This browser is not supported by Wikiwand :(
Wikiwand requires a browser with modern capabilities in order to provide you with the best reading experience.
Please download and use one of the following browsers:

This article was just edited, click to reload
This article has been deleted on Wikipedia (Why?)

Back to homepage

Please click Add in the dialog above
Please click Allow in the top-left corner,
then click Install Now in the dialog
Please click Open in the download dialog,
then click Install
Please click the "Downloads" icon in the Safari toolbar, open the first download in the list,
then click Install
{{::$root.activation.text}}

Install Wikiwand

Install on Chrome Install on Firefox
Don't forget to rate us

Tell your friends about Wikiwand!

Gmail Facebook Twitter Link

Enjoying Wikiwand?

Tell your friends and spread the love:
Share on Gmail Share on Facebook Share on Twitter Share on Buffer

Our magic isn't perfect

You can help our automatic cover photo selection by reporting an unsuitable photo.

This photo is visually disturbing This photo is not a good choice

Thank you for helping!


Your input will affect cover photo selection, along with input from other users.

X

Get ready for Wikiwand 2.0 ๐ŸŽ‰! the new version arrives on September 1st! Don't want to wait?