On the Static Diffie-Hellman Problem on Elliptic Curves over - - PowerPoint PPT Presentation

on the static diffie hellman problem on elliptic curves
SMART_READER_LITE
LIVE PREVIEW

On the Static Diffie-Hellman Problem on Elliptic Curves over - - PowerPoint PPT Presentation

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields Robert Granger


slide-1
SLIDE 1

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

Robert Granger

rgranger@computing.dcu.ie Claude Shannon Institute, UCD and DCU, Ireland

Workshop on Elliptic Curve Computation, October 18-22, 2010

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-2
SLIDE 2

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Outline

1

Motivation - Exotic Security Assumptions in Cryptography The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

2

Main Algorithm and Results Algorithm Overview Potentially Vulnerable Curves Simulation results

3

Oracle-assisted Static DHP for binary curves

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-3
SLIDE 3

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Provable Security 101

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-4
SLIDE 4

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Provable Security 101

Cryptographic protocols require security assurances established via a reductionist security argument — also known as a proof of security

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-5
SLIDE 5

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Provable Security 101

Cryptographic protocols require security assurances established via a reductionist security argument — also known as a proof of security These take the form ‘If one can break the protocol in some way, then one can solve a related computational problem’, which is assumed to be hard

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-6
SLIDE 6

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Provable Security 101

Cryptographic protocols require security assurances established via a reductionist security argument — also known as a proof of security These take the form ‘If one can break the protocol in some way, then one can solve a related computational problem’, which is assumed to be hard In an ideal world:

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-7
SLIDE 7

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Provable Security 101

Cryptographic protocols require security assurances established via a reductionist security argument — also known as a proof of security These take the form ‘If one can break the protocol in some way, then one can solve a related computational problem’, which is assumed to be hard In an ideal world: Such assumptions should be as hard to solve as the underlying primitive, such as the RSA function or the DLP

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-8
SLIDE 8

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Provable Security 101

Cryptographic protocols require security assurances established via a reductionist security argument — also known as a proof of security These take the form ‘If one can break the protocol in some way, then one can solve a related computational problem’, which is assumed to be hard In an ideal world: Such assumptions should be as hard to solve as the underlying primitive, such as the RSA function or the DLP There should be an equivalence result, so that if one breaks the hard problem, one can also break the protocol

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-9
SLIDE 9

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Is Cryptography always ideal?

In ‘Another look at non-standard discrete log and Diffie-Hellman problems’ (2007), Koblitz and Menezes studied a set of problems in the Jacobian of small genus hyperelliptic curves

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-10
SLIDE 10

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Is Cryptography always ideal?

In ‘Another look at non-standard discrete log and Diffie-Hellman problems’ (2007), Koblitz and Menezes studied a set of problems in the Jacobian of small genus hyperelliptic curves Delayed Target DLP/DHP , One-More DLP/DHP , and DLP1/DHP1 - DLP/DHP being well-studied

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-11
SLIDE 11

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Is Cryptography always ideal?

In ‘Another look at non-standard discrete log and Diffie-Hellman problems’ (2007), Koblitz and Menezes studied a set of problems in the Jacobian of small genus hyperelliptic curves Delayed Target DLP/DHP , One-More DLP/DHP , and DLP1/DHP1 - DLP/DHP being well-studied Some are equivalent to breaking protocols, some are not

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-12
SLIDE 12

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Is Cryptography always ideal?

In ‘Another look at non-standard discrete log and Diffie-Hellman problems’ (2007), Koblitz and Menezes studied a set of problems in the Jacobian of small genus hyperelliptic curves Delayed Target DLP/DHP , One-More DLP/DHP , and DLP1/DHP1 - DLP/DHP being well-studied Some are equivalent to breaking protocols, some are not Using ‘Index Calculus’ or generic arguments showed that some are easier than DLP - hardness separation

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-13
SLIDE 13

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Is Cryptography always ideal?

In ‘Another look at non-standard discrete log and Diffie-Hellman problems’ (2007), Koblitz and Menezes studied a set of problems in the Jacobian of small genus hyperelliptic curves Delayed Target DLP/DHP , One-More DLP/DHP , and DLP1/DHP1 - DLP/DHP being well-studied Some are equivalent to breaking protocols, some are not Using ‘Index Calculus’ or generic arguments showed that some are easier than DLP - hardness separation Argued that problems which are either interactive or have complicated inputs yield weaknesses

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-14
SLIDE 14

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Is Cryptography always ideal?

In ‘Another look at non-standard discrete log and Diffie-Hellman problems’ (2007), Koblitz and Menezes studied a set of problems in the Jacobian of small genus hyperelliptic curves Delayed Target DLP/DHP , One-More DLP/DHP , and DLP1/DHP1 - DLP/DHP being well-studied Some are equivalent to breaking protocols, some are not Using ‘Index Calculus’ or generic arguments showed that some are easier than DLP - hardness separation Argued that problems which are either interactive or have complicated inputs yield weaknesses Security assurances provided by such protocols should be reassessed/are difficult to assess

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-15
SLIDE 15

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Diffie-Hellman Key Agreement

Let G be a cyclic group of prime order r with generator g.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-16
SLIDE 16

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Diffie-Hellman Key Agreement

Let G be a cyclic group of prime order r with generator g. Alice chooses x

R

← − Zr, computes gx and sends to Bob

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-17
SLIDE 17

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Diffie-Hellman Key Agreement

Let G be a cyclic group of prime order r with generator g. Alice chooses x

R

← − Zr, computes gx and sends to Bob Bob chooses y

R

← − Zr, computes gy and sends to Alice

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-18
SLIDE 18

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Diffie-Hellman Key Agreement

Let G be a cyclic group of prime order r with generator g. Alice chooses x

R

← − Zr, computes gx and sends to Bob Bob chooses y

R

← − Zr, computes gy and sends to Alice Alice computes (gy)x, Bob computes (gx)y to give shared secret gxy

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-19
SLIDE 19

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Diffie-Hellman Key Agreement

Let G be a cyclic group of prime order r with generator g. Alice chooses x

R

← − Zr, computes gx and sends to Bob Bob chooses y

R

← − Zr, computes gy and sends to Alice Alice computes (gy)x, Bob computes (gx)y to give shared secret gxy A fundamental security requirement of DH Key Agreement is that the Computational Diffie-Hellman problem should be hard: Definition (CDH): Given g and random gx and gy, find gxy

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-20
SLIDE 20

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static Diffie-Hellman Problem (Static DHP)

Suppose in DH Key Agreement Alice repeatedly reuses x = d.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-21
SLIDE 21

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static Diffie-Hellman Problem (Static DHP)

Suppose in DH Key Agreement Alice repeatedly reuses x = d. Definition (Static DHPd): Given fixed g and gd, and random gy, find gdy

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-22
SLIDE 22

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static Diffie-Hellman Problem (Static DHP)

Suppose in DH Key Agreement Alice repeatedly reuses x = d. Definition (Static DHPd): Given fixed g and gd, and random gy, find gdy Set of problem instances in Static DHP is a tiny subset of CDH problem instances

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-23
SLIDE 23

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static Diffie-Hellman Problem (Static DHP)

Suppose in DH Key Agreement Alice repeatedly reuses x = d. Definition (Static DHPd): Given fixed g and gd, and random gy, find gdy Set of problem instances in Static DHP is a tiny subset of CDH problem instances Not a priori clear that these instances should be hard, even if CDH is hard

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-24
SLIDE 24

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static Diffie-Hellman Problem (Static DHP)

Suppose in DH Key Agreement Alice repeatedly reuses x = d. Definition (Static DHPd): Given fixed g and gd, and random gy, find gdy Set of problem instances in Static DHP is a tiny subset of CDH problem instances Not a priori clear that these instances should be hard, even if CDH is hard Can arise as an efficiency measure during multiple DH key agreements

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-25
SLIDE 25

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static Diffie-Hellman Problem (Static DHP)

Suppose in DH Key Agreement Alice repeatedly reuses x = d. Definition (Static DHPd): Given fixed g and gd, and random gy, find gdy Set of problem instances in Static DHP is a tiny subset of CDH problem instances Not a priori clear that these instances should be hard, even if CDH is hard Can arise as an efficiency measure during multiple DH key agreements Also arises in textbook El Gamal encryption, Ford-Kaliski key retrieval, and Chaum-Van Antwerpen’s undeniable signatures

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-26
SLIDE 26

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Static DHPd example: textbook El Gamal

Alice has public key gd. To encrypt a message m, Bob picks a random x

R

← − Zr and computes c = (c1, c2) = (gx, mgdx)

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-27
SLIDE 27

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Static DHPd example: textbook El Gamal

Alice has public key gd. To encrypt a message m, Bob picks a random x

R

← − Zr and computes c = (c1, c2) = (gx, mgdx) To decrypt Alice computes m = c2/cd

1 . So if one can

compute gdx for any gx one can decrypt

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-28
SLIDE 28

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Static DHPd example: textbook El Gamal

Alice has public key gd. To encrypt a message m, Bob picks a random x

R

← − Zr and computes c = (c1, c2) = (gx, mgdx) To decrypt Alice computes m = c2/cd

1 . So if one can

compute gdx for any gx one can decrypt Furthermore, in a chosen-ciphertext attack an adversary has access to a decryption oracle

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-29
SLIDE 29

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Static DHPd example: textbook El Gamal

Alice has public key gd. To encrypt a message m, Bob picks a random x

R

← − Zr and computes c = (c1, c2) = (gx, mgdx) To decrypt Alice computes m = c2/cd

1 . So if one can

compute gdx for any gx one can decrypt Furthermore, in a chosen-ciphertext attack an adversary has access to a decryption oracle If adversary chooses c = (gx, c2) the decryption oracle returns m = c2/gdx

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-30
SLIDE 30

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Static DHPd example: textbook El Gamal

Alice has public key gd. To encrypt a message m, Bob picks a random x

R

← − Zr and computes c = (c1, c2) = (gx, mgdx) To decrypt Alice computes m = c2/cd

1 . So if one can

compute gdx for any gx one can decrypt Furthermore, in a chosen-ciphertext attack an adversary has access to a decryption oracle If adversary chooses c = (gx, c2) the decryption oracle returns m = c2/gdx Adversary computes gdx = c2/m, which solves the Static DHPd for instance gx, hence the adversary has access to a Static DHPd oracle

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-31
SLIDE 31

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Static DHPd oracle

Definition (Static DHPd oracle). Let G be a cyclic group of prime order r, written additively. For a fixed base element P ∈ G and a fixed element Q ∈ G let d ∈ Zr be such that Q = dP. Then a Static DHPd oracle (wrt G) computes the function δ : G → G where: δ(X) = dX.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-32
SLIDE 32

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Static DHPd oracle

Definition (Static DHPd oracle). Let G be a cyclic group of prime order r, written additively. For a fixed base element P ∈ G and a fixed element Q ∈ G let d ∈ Zr be such that Q = dP. Then a Static DHPd oracle (wrt G) computes the function δ : G → G where: δ(X) = dX. Likewise, a Static DHPd algorithm is said to be oracle-assisted if during an initial learning phase, it can make a number of Static DHPd queries, after which, given a previously unseen challenge element X, it outputs dX.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-33
SLIDE 33

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static DHP - inception and 1st result

Introduced by Brown and Gallant in 2004, who gave a reduction from the DLP for d to the Static DHPd

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-34
SLIDE 34

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static DHP - inception and 1st result

Introduced by Brown and Gallant in 2004, who gave a reduction from the DLP for d to the Static DHPd Hence if the DLP for d is hard, then so is the Static DHPd

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-35
SLIDE 35

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static DHP - inception and 1st result

Introduced by Brown and Gallant in 2004, who gave a reduction from the DLP for d to the Static DHPd Hence if the DLP for d is hard, then so is the Static DHPd Equivalently, given access to a Static DHPd oracle, one can find the associated DLP

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-36
SLIDE 36

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static DHP - inception and 1st result

Introduced by Brown and Gallant in 2004, who gave a reduction from the DLP for d to the Static DHPd Hence if the DLP for d is hard, then so is the Static DHPd Equivalently, given access to a Static DHPd oracle, one can find the associated DLP Theorem Let r = uv + 1. Then d can be found with u calls to a Static DHPd oracle, and off-line computational work of about (√u + √v) group operations.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-37
SLIDE 37

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

DLP to Static DHPd reduction

ALGORITHM 1: DLP to Static DHPd reduction INPUT: P, dP ∈ G with G cyclic of prime order and |G| = uv + 1 OUTPUT: d 1. Find a generator g ∈ F×

p

2. Compute w = gu and duP via u calls to oracle 3. Let mv = ⌈√v⌉ 4. Find 0 ≤ u1, v1 < mv such that w−u1duP = wmvv1P 5. Let k0 = mvv1 + u1 so that du = wk0 6. Let mu = ⌈√u⌉ 7. Find 0 ≤ u2, v2 < mu such that g−u2vdP = gk0+muv2vP 8. Return gk0+(muv2+u2)v

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-38
SLIDE 38

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

DLP to Static DHPd reduction

The complexity of the attack is minimised when u ≈ r 1/3

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-39
SLIDE 39

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

DLP to Static DHPd reduction

The complexity of the attack is minimised when u ≈ r 1/3 For the three schemes mentioned, Brown and Gallant showed that a system entity acts as a Static DHPd oracle, transforming their reduction into a DLP solver

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-40
SLIDE 40

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

DLP to Static DHPd reduction

The complexity of the attack is minimised when u ≈ r 1/3 For the three schemes mentioned, Brown and Gallant showed that a system entity acts as a Static DHPd oracle, transforming their reduction into a DLP solver Depending on the factorisation of r − 1, can lead to a real attack which is quicker than solving the DLP

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-41
SLIDE 41

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

DLP to Static DHPd reduction

The complexity of the attack is minimised when u ≈ r 1/3 For the three schemes mentioned, Brown and Gallant showed that a system entity acts as a Static DHPd oracle, transforming their reduction into a DLP solver Depending on the factorisation of r − 1, can lead to a real attack which is quicker than solving the DLP Attack was rediscovered by Cheon in 2006, when the requisite information is provided in the guise of the l-Strong DHP:

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-42
SLIDE 42

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

DLP to Static DHPd reduction

The complexity of the attack is minimised when u ≈ r 1/3 For the three schemes mentioned, Brown and Gallant showed that a system entity acts as a Static DHPd oracle, transforming their reduction into a DLP solver Depending on the factorisation of r − 1, can lead to a real attack which is quicker than solving the DLP Attack was rediscovered by Cheon in 2006, when the requisite information is provided in the guise of the l-Strong DHP: Definition l-Strong Diffie-Hellman problem: Given P and diP in G for i = 1, 2, . . . , l, compute dl+1P.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-43
SLIDE 43

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

DLP to l-Strong DHP reduction

Cheon also formulated an algorithm for the l-Strong DHP when l | (r + 1)

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-44
SLIDE 44

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

DLP to l-Strong DHP reduction

Cheon also formulated an algorithm for the l-Strong DHP when l | (r + 1) Brown-Gallant reduction and Cheon’s algorithm can be seen as using the DLP to DHP reduction due to den Boer, Maurer, Wolf et al, but with limited access to CDH oracle

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-45
SLIDE 45

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

DLP to l-Strong DHP reduction

Cheon also formulated an algorithm for the l-Strong DHP when l | (r + 1) Brown-Gallant reduction and Cheon’s algorithm can be seen as using the DLP to DHP reduction due to den Boer, Maurer, Wolf et al, but with limited access to CDH oracle For the l-Strong DHP , security proofs were in one direction

  • nly, so Cheon’s algorithm does not break any protocols
  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-46
SLIDE 46

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

DLP to l-Strong DHP reduction

Cheon also formulated an algorithm for the l-Strong DHP when l | (r + 1) Brown-Gallant reduction and Cheon’s algorithm can be seen as using the DLP to DHP reduction due to den Boer, Maurer, Wolf et al, but with limited access to CDH oracle For the l-Strong DHP , security proofs were in one direction

  • nly, so Cheon’s algorithm does not break any protocols

For Boneh-Boyen signatures, in 2009 Jao and Yoshida gave a reduction in the reverse direction, thus strengthening the security proof, and giving an attack with complexity O(r 2/5+ǫ) if O(r 1/5+ǫ) signatures queries may be performed

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-47
SLIDE 47

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Delayed Target DHP

Definition A solver is given initial access to a Static DHPd oracle for the element Q = dP ∈ G; when the oracle is removed, the solver is given a random challenge X ∈ G and must solve the CDH for input (Q, X), i.e., output dX.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-48
SLIDE 48

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Delayed Target DHP

Definition A solver is given initial access to a Static DHPd oracle for the element Q = dP ∈ G; when the oracle is removed, the solver is given a random challenge X ∈ G and must solve the CDH for input (Q, X), i.e., output dX. Situation identical to oracle-assisted Static DHP

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-49
SLIDE 49

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Delayed Target DHP

Definition A solver is given initial access to a Static DHPd oracle for the element Q = dP ∈ G; when the oracle is removed, the solver is given a random challenge X ∈ G and must solve the CDH for input (Q, X), i.e., output dX. Situation identical to oracle-assisted Static DHP Described by Freeman, 2005 — ‘Pairing-based identification schemes’

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-50
SLIDE 50

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Delayed Target DHP

Definition A solver is given initial access to a Static DHPd oracle for the element Q = dP ∈ G; when the oracle is removed, the solver is given a random challenge X ∈ G and must solve the CDH for input (Q, X), i.e., output dX. Situation identical to oracle-assisted Static DHP Described by Freeman, 2005 — ‘Pairing-based identification schemes’ Security of scheme equivalent to Delayed Target DHP

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-51
SLIDE 51

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Delayed Target DHP

Definition A solver is given initial access to a Static DHPd oracle for the element Q = dP ∈ G; when the oracle is removed, the solver is given a random challenge X ∈ G and must solve the CDH for input (Q, X), i.e., output dX. Situation identical to oracle-assisted Static DHP Described by Freeman, 2005 — ‘Pairing-based identification schemes’ Security of scheme equivalent to Delayed Target DHP Koblitz-Menezes also studied the Delayed Target DLP

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-52
SLIDE 52

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The oracle-assisted Static DHP/Delayed Target DHP

Koblitz-Menezes used index calculus methodology:

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-53
SLIDE 53

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The oracle-assisted Static DHP/Delayed Target DHP

Koblitz-Menezes used index calculus methodology: Construct a factor base F over which a non-negligible proportion of group elements factor

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-54
SLIDE 54

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The oracle-assisted Static DHP/Delayed Target DHP

Koblitz-Menezes used index calculus methodology: Construct a factor base F over which a non-negligible proportion of group elements factor Call the Static DHPd oracle δ on all f ∈ F

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-55
SLIDE 55

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The oracle-assisted Static DHP/Delayed Target DHP

Koblitz-Menezes used index calculus methodology: Construct a factor base F over which a non-negligible proportion of group elements factor Call the Static DHPd oracle δ on all f ∈ F For a target element X attempt to write random mutiples aX as a sum of elements of F, i.e., aX = P1 + · · · + Pn

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-56
SLIDE 56

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The oracle-assisted Static DHP/Delayed Target DHP

Koblitz-Menezes used index calculus methodology: Construct a factor base F over which a non-negligible proportion of group elements factor Call the Static DHPd oracle δ on all f ∈ F For a target element X attempt to write random mutiples aX as a sum of elements of F, i.e., aX = P1 + · · · + Pn Then dX = (a−1 mod r)(δ(P1) + · · · + δ(Pn))

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-57
SLIDE 57

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The oracle-assisted Static DHP/Delayed Target DHP

Koblitz-Menezes used index calculus methodology: Construct a factor base F over which a non-negligible proportion of group elements factor Call the Static DHPd oracle δ on all f ∈ F For a target element X attempt to write random mutiples aX as a sum of elements of F, i.e., aX = P1 + · · · + Pn Then dX = (a−1 mod r)(δ(P1) + · · · + δ(Pn)) Used for finite fields and small genus hyperelliptic curves — hardness separation from DLP

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-58
SLIDE 58

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static DHP - JLNT

Joux, Naccache and Thomé showed that initial subexponential access to an e-th root oracle in RSA enables later e-th root computations — faster than one can factor the modulus

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-59
SLIDE 59

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static DHP - JLNT

Joux, Naccache and Thomé showed that initial subexponential access to an e-th root oracle in RSA enables later e-th root computations — faster than one can factor the modulus Ports easily over to Static DHPd in finite fields (+Lercier)

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-60
SLIDE 60

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static DHP - JLNT

Joux, Naccache and Thomé showed that initial subexponential access to an e-th root oracle in RSA enables later e-th root computations — faster than one can factor the modulus Ports easily over to Static DHPd in finite fields (+Lercier) The Lqn(1/3,

3

√x) complexities of the JLNT algorithm are variant

  • racle access

learning phase post-learning phase FFS 4/9

  • 4/9

NFS-HD 48/91 384/91 384/91 NFS 4/9 32/9 3

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-61
SLIDE 61

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

The Static DHP - JLNT

Joux, Naccache and Thomé showed that initial subexponential access to an e-th root oracle in RSA enables later e-th root computations — faster than one can factor the modulus Ports easily over to Static DHPd in finite fields (+Lercier) The Lqn(1/3,

3

√x) complexities of the JLNT algorithm are variant

  • racle access

learning phase post-learning phase FFS 4/9

  • 4/9

NFS-HD 48/91 384/91 384/91 NFS 4/9 32/9 3 Observe that each is faster than the DLP in the corresponding fields

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-62
SLIDE 62

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Index calculus example: Delayed Target DHP

Let H(Fq) be a genus g hyperelliptic curve and JacH(Fq) its Jacobian. Let F be a proportion qα of degree one divisors for 0 < α ≤ 1. Call the Static DHPd oracle for Q = dP for all D ∈ F.

  • Prob. random aX factors over F is qg(α−1)/g!

Hence expected number of trials to obtain an F-smooth element aX is qg(1−α)g! Balancing this with the oracle calls gives α = (g + logq g!)/(g + 1) ≈ 1 − 1/(g + 1)

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-63
SLIDE 63

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Index calculus example: Delayed Target DHP

For DLP , there are four basic variants: Gaudry (2000): basic index calculus — O(q2) Harley (2000): reduce factor base — O(q2−2/(g+1)) Thériault (2003): large-prime variation — O(q2−2/(g+1/2)) GTTD (2007): double large-prime variation — O(q2−2/g) The Delayed Target DHP algorithm is O(q1−1/(g+1)) — the square root of Harley’s algorithm: No linear algebra Only one relation so can only balance the two stages

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-64
SLIDE 64

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Index calculus example: Delayed Target DHP

For DLP , there are four basic variants: Gaudry (2000): basic index calculus — O(q2) Harley (2000): reduce factor base — O(q2−2/(g+1)) Thériault (2003): large-prime variation — O(q2−2/(g+1/2)) GTTD (2007): double large-prime variation — O(q2−2/g) The Delayed Target DHP algorithm is O(q1−1/(g+1)) — the square root of Harley’s algorithm: No linear algebra Only one relation so can only balance the two stages Question: For g = 1 have O(q1/2), so can we do better?

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-65
SLIDE 65

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

A contrived example: oracle-assisted pairing inversion

Let G1, G2 and GT be cyclic groups of prime order r, and let e : G1 × G2 − → GT be a non-degenerate bilinear pairing. Verheul considered the consequences of the existence of an efficiently computable, injective homomorphism ψ : GT − → G1 when G1 = G2 If ψ is efficiently computable, can efficiently solve CDH in G1, G2 and GT

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-66
SLIDE 66

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Oracle-assisted pairing inversion

Galbriath, Hess and Vercauteren (2008) considered the following two problems when G1 = G2: Definition The Fixed Argument Pairing Inversion 1 (FAPI-1) problem: Given P1 ∈ G1 and z ∈ GT, find P2 ∈ G2 s.t. e(P1, P2) = z. The Fixed Argument Pairing Inversion 2 (FAPI-2) problem: Given P2 ∈ G2 and z ∈ GT, find P1 ∈ G1 s.t. e(P1, P2) = z. If can solve FAPI-1 and 2, can solve CDH in G1, G2 and GT Given P, aP, bP ∈ G1, fix Q ∈ G2 and let z = e(P, Q). Compute zb = e(bP, Q), FAPI-1(P, zb) = bQ, e(aP, bQ) = zab, then FAPI-2(Q, zab) = abP.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-67
SLIDE 67

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Oracle-assisted pairing inversion

GHV also showed that if one has an efficiently computable homomorphism ψ : G2 → G1 and access to a FAPI-1 oracle, then the same conclusion holds. Some natural questions arise: In this case, what if one only has initial access to a FAPI-1

  • racle? Can one solve further FAPI-1 instances —

Delayed Target FAPI-1 problem Does this problem feature in the security of any protocol? What other security implications are there? Can FAPI-1 and no ψ aid in solving Static DHP?

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-68
SLIDE 68

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Delayed Target FAPI-1 problem

Since GT ⊂ Fpk, natural (only?) idea is to use factor base in Fpk as in JLNT First problem is that in general elements of factor base in Fpk are not in GT. Second problem is that one can’t invert pairing! However, can do the following: Compute Qi = FAPI-1(P, p(pk−1)/r

i

) for each pi ∈ F Want to compute FAPI-1(P, z) for z ∈ GT Write z = pαi

i

where pi ∈ F using JLNT Assuming ((pk − 1)/r, r) = 1, one has FAPI-1(P, z) = (((pk − 1)/r)−1 mod r)

  • αiQi
  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-69
SLIDE 69

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Delayed Target FAPI-1 problem

This solves the FAPI-1 for z since e(P, (((pk − 1)/r)−1 mod r)

  • αiQi)

=

  • e(P, Qi)αi(((pk−1)/r)−1 mod r)

=

  • p(((pk−1)/r)((pk−1)/r)−1 mod r)αi

i

= z Hence can solve any further FAPI-1 problem with the complexity of JLNT Static DHP algorithm For curves with ψ : G2 → G1 can then solve any further CDH in G1, G2 and GT faster than DLP Using DLP to DHP reduction, for suitable parameters can solve DLP faster

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-70
SLIDE 70

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Delayed Target FAPI-1 problem

FAPI-i allows one to use factorisation in an auxilliary group to form a factor base in Gi Only works if can map both ways Assumptions too strong to solve Static DHP but not CDH, so what if no ψ? Can’t solve Static DHP without efficiently computable ψ, as result is in the wrong group Academic anyhow as no known way to implement FAPI-i

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-71
SLIDE 71

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves The Static Diffie-Hellman Problem Other Assumptions A Contrived Example

Delayed Target FAPI-1 problem

FAPI-i allows one to use factorisation in an auxilliary group to form a factor base in Gi Only works if can map both ways Assumptions too strong to solve Static DHP but not CDH, so what if no ψ? Can’t solve Static DHP without efficiently computable ψ, as result is in the wrong group Academic anyhow as no known way to implement FAPI-i Realised that for ECs over extension fields, already have native factorisation via Gaudry/Semaev idea, so can use the Menezes-Koblitz methodology directedly.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-72
SLIDE 72

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Algorithm Overview

Let E : Y 2 = X 3 + aX + b, over a field Fqn with char(Fq) > 3. Let F = {P = (x, y) ∈ E s.t. x ∈ Fq} For all P ∈ F compute δ(P) = dP For a given R ∈ E(Fqn) add random linear combinations Pr

  • f elements of F to R until it can be written

R + Pr = P1 + · · · + Pn Then dR = δ(P1) + · · · + δ(Pn) − δ(Pr)

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-73
SLIDE 73

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Semaev’s summation polynomials

For m ≥ 2 define fm = fm(X1, . . . , Xm) by the following

  • property. Let x1, . . . , xm ∈ Fq, then fm(x1, . . . , xm) = 0 is

equivalent to ∃y1, . . . , ym ∈ Fq | (xi, yi) ∈ E and (x1, y1) + · · · + (xm, ym) = O ∈ E(Fq) f2(X1, X2) = X1 − X2, and f3(X1, X2, X3) = (X1 − X2)2X 2

3 − 2((X1 + X2)(X1X2 + a) + 2b)X3

+((X1X2 − a)2 − 4b(X1 + X2))

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-74
SLIDE 74

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Semaev’s summation polynomials

In general, for any m ≥ 4, and m − 3 ≥ k ≥ 1, fm(X1, . . . , Xm) = ResX(fm−k(X1, . . . , Xm−k−1, X), fk+2(Xm−k, . . . , Xm, X)) Degree of fm in each Xi is 2m−2 for m ≥ 3. If Fq = Fp, natural factor base is {P = (x, y) ∈ E s.t. x < p1/n} However no known way to efficiently find such small roots x1, ..., xm of fm+1(x1, . . . , xm, xR) = 0 corresponding to R = Pi1 + · · · + Pim For m ≥ 5 would give sub-square-root DLP algorithm

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-75
SLIDE 75

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Gaudry’s insight

Let E : Y 2 = X 3 + aX + b, over a field Fqn with char(Fq) > 3 Use a poly basis {tn−1, . . . , t, 1} for Fqn/Fq Define F = {P = (x, y) ∈ E(Fqn) s.t. x ∈ Fq} Note |F| ≈ q Observe that fn+1(x1, . . . , xn, xR) = 0 now has n components: fn+1,0 + fn+1,1t + · · · + fn+1,n−1tn−1 = 0 ∈ Fqn System of n equations over Fq in n variables in Fq Solved via resultants, or Grobner basis computation

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-76
SLIDE 76

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Gaudry’s insight

Decomposition complexity O(Poly(2n(n−1))) Decomposition probability is 1/n! For fixed n, q → ∞, complexity is O(q2), rho is O(qn/2) Using double large-prime variation reduces to O(q2−2/n) Works for all curves over any extension field, even of prime extension degree. Details are computationally more intensive than Weil Descent. Subexponential attack for a large class of fields (Diem) eO((log qn)2/3)

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-77
SLIDE 77

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Algorithm complexity

Heuristic Result 1. For any elliptic curve E(Fqn), by making O(q) queries to a Static DHPd oracle during an initial learning phase, for fixed n > 1 and q → ∞, an adversary can solve any further instance of the Static DHPd in time O(Poly(log q)).

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-78
SLIDE 78

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Algorithm complexity

Heuristic Result 1. For any elliptic curve E(Fqn), by making O(q) queries to a Static DHPd oracle during an initial learning phase, for fixed n > 1 and q → ∞, an adversary can solve any further instance of the Static DHPd in time O(Poly(log q)). Can reduce the factor base à la Koblitz-Menezes:

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-79
SLIDE 79

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Algorithm complexity

Heuristic Result 1. For any elliptic curve E(Fqn), by making O(q) queries to a Static DHPd oracle during an initial learning phase, for fixed n > 1 and q → ∞, an adversary can solve any further instance of the Static DHPd in time O(Poly(log q)). Can reduce the factor base à la Koblitz-Menezes: Heuristic Result 2. For any elliptic curve E(Fqn), by making O(q1−

1 n+1 ) queries to a Static DHPd oracle during an initial

learning phase, for fixed n > 1 and q → ∞, an adversary can solve any further instance of the Static DHPd in time ˜ O(q1−

1 n+1 )

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-80
SLIDE 80

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Algorithm complexity

Heuristic Result 1. For any elliptic curve E(Fqn), by making O(q) queries to a Static DHPd oracle during an initial learning phase, for fixed n > 1 and q → ∞, an adversary can solve any further instance of the Static DHPd in time O(Poly(log q)). Can reduce the factor base à la Koblitz-Menezes: Heuristic Result 2. For any elliptic curve E(Fqn), by making O(q1−

1 n+1 ) queries to a Static DHPd oracle during an initial

learning phase, for fixed n > 1 and q → ∞, an adversary can solve any further instance of the Static DHPd in time ˜ O(q1−

1 n+1 )

Can also obtain subexponential algorithm à la Diem

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-81
SLIDE 81

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

The Galbraith-Lin-Scott Curves

At EUROCRYPT 2009 the use of curves defined over extension fields with degree a power of 2 were proposed. Exploits the existence of efficiently computable homomorphism to enable use of the GLV fast point multiplication method GLV: if ψ is an efficiently computable endomorphism of E then one can compute [n]P = [n0]P + [n1]ψ(P) with |ni| ≈ √#E Over Fp2 method takes about 0.75 the time of the previous best methods Performance over Fp4 currently uninvestigated, but subject to Gaudry’s DLP attack

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-82
SLIDE 82

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

The Oakley key determination protocol curves

‘Well-Known Group’ 3

Group 3 is defined over the field F2155 = F2[ω]/(ω155 + ω62 + 1), by the equation Y 2 + XY = X 3 + β, where β = ω18 +ω17 +ω16 +ω13 +ω12 +ω9 +ω8 +ω7 +ω3 +ω2 +ω +1. #E(F2155) = 12 · r, with r = 3805993847215893016155463826195386266397436443 Subject to several unsuccessful DLP attacks via Weil Descent: Jacobson/Menezes/Stein[01], Gaudry/Hess/Smart[02], Galbraith/Hess/Smart[02], Hess[03].

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-83
SLIDE 83

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

The Oakley key determination protocol curves

‘Well-Known Group’ 4

Group 4 is defined over the field F2185 = F2[ω]/(ω185 + ω69 + 1), by the equation Y 2 + XY = X 3 + β, where β = ω12 + ω11 + ω10 + ω9 + ω7 + ω6 + ω5 + ω3 + 1. #E(F2185) = 4 · r, with r = 12259964326927110866866776214413170562013096\ 250261263279 DLP studied by Maurer/Menezes/Teske[01] and Menezes/Teske/Weng[04], the latter concluding that the fields F25l for l > 37 are ‘weak’ while the security of ECs

  • ver F2185 is questionable
  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-84
SLIDE 84

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Large prime characteristic

For each of n = 2, 3, 4 and 5 we used curves of the form E(Fpn) : y2 = x3 + ax + b, for a and b randomly chosen elements of Fpn, such that #E(Fpn) was a prime of bitlength 256. Implemented in MAGMA (V2.16-5) run on a 3.16 GHz Intel Xeon with 32G RAM Data for testing and decomposing points for elliptic curves over extension fields (times in s): n log p #fn+1 # symfn+1 T(GB) T(roots) 2 128 13 5 0.001 0.009 3 85.3 439 43 0.029 0.027 4 64 54777 1100 5363 3.68

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-85
SLIDE 85

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Large prime characteristic

Upper bounds on attack time

Given data, compute α such that: pn(1−α) · n! · (T(GB) + T(roots)) = pα · T(scalar)

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-86
SLIDE 86

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Large prime characteristic

Upper bounds on attack time

Given data, compute α such that: pn(1−α) · n! · (T(GB) + T(roots)) = pα · T(scalar) Attack time estimates for our implementation (times in s): n α Attack time Pollard rho 2 0.6701 (2/3) 279.8 2111.3 3 0.7645 (3/4) 259.7 2111.4 4 0.8730 (4/5) 250.5 2111.4

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-87
SLIDE 87

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Characteristic two

For each of n = 2, 3, 4 and 5 we used curves of the form E(F2ln) : y2 + xy = x3 + b, (1) for b a randomly chosen element of F2ln, such that #E(F2ln) was a four times a prime of bitlength 256.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-88
SLIDE 88

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves Algorithm Overview Potentially Vulnerable Curves Simulation results

Characteristic two

For each of n = 2, 3, 4 and 5 we used curves of the form E(F2ln) : y2 + xy = x3 + b, (1) for b a randomly chosen element of F2ln, such that #E(F2ln) was a four times a prime of bitlength 256. Data for testing and decomposing points for elliptic curves over binary extension fields and attack time estimates (times in s): n #fn+1 # symfn+1 Time GB α Attack time 2 5 3 0.000 0.6672 280.9 3 24 6 0.005 0.7572 260.0 4 729 39 247 0.8575 250.6 5 148300 638 N/A N/A N/A

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-89
SLIDE 89

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Back to Delayed Target FAPI-1 problem...

Recall that central issue was that there is no known algorithm to invert pairing.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-90
SLIDE 90

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Back to Delayed Target FAPI-1 problem...

Recall that central issue was that there is no known algorithm to invert pairing. For binary curves defined over composite degree extension fields, natural auxiliary group comes from GHS attack

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-91
SLIDE 91

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Back to Delayed Target FAPI-1 problem...

Recall that central issue was that there is no known algorithm to invert pairing. For binary curves defined over composite degree extension fields, natural auxiliary group comes from GHS attack Here, one can invert the GHS homomorphism!

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-92
SLIDE 92

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Back to Delayed Target FAPI-1 problem...

Recall that central issue was that there is no known algorithm to invert pairing. For binary curves defined over composite degree extension fields, natural auxiliary group comes from GHS attack Here, one can invert the GHS homomorphism! Hence can mimic Delayed Target FAPI-1 problem algorithm and apply to this context

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-93
SLIDE 93

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Weil descent (Frey, Hess, Gaudry, Smart, Galbraith, Diem, Scholten,...)

Let E be an elliptic curve over Fqk, with k > 1. Define abelian variety WE of dimension k over Fq with WE(Fq) = E(Fqk). WE is called the Weil restriction of E. Try to find a curve H on WE and map the DLOG φ : E(Fqk) → JacH(Fq). Apply index calculus to JacH(Fq).

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-94
SLIDE 94

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Oracle-assisted Static DHP via GHS attack

In GHS attack elements of E(F2ln)[r] map to Jacobian of hyperelliptic curve H(F2l) of genus at most 2n−1 Let F be the set of degree one divisors in JacH(F2l) Let N = #JacH(F2l) and h = N/r Project each D ∈ F into im(φ) by multiplying by h Compute φ−1(hD) for each D ∈ F Call the Static DHPd oracle on each φ−1(hD) in E(F2ln) For a target X ∈ E(F2ln) take random multiples until φ(aX) = Di ∈ F Then assuming (h, r) = 1 one computes δ(X) = (a−1 mod r)(h−1 mod r)

  • δ(φ−1(hDi))
  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-95
SLIDE 95

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

GHS for ‘Well-Known Group’ 3

We have φ : E(F2155)[r] − → JacH(F231) for hyperelliptic H : Y 2 + h(X) · Y = f(X), with F231 = F2[ω]/(ω31 + ω3 + 1) and h(X) = 289804524X 16 + 607247628X 8 + 1798965180X 4 + 1103766465X 2 + 742287012X, f(X) = 505223067X 33 + 1000507042X 17 + 1992775259X 16 + 1146351457X 9 + 1078048302X 8 + 284388091X 5 + 518998412X 4 + 1875045691X 3 + 2001664187X 2 + 1973705837X, and genus(H) = 16 = 2155/31−1.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-96
SLIDE 96

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Static DHP for ‘Well-Known Group’ 3 via GHS

Using Florian’s LMS J. Comput. Math paper (or a magma computation), one finds N = #JacH(F231) which has bitlength 497 Furthermore (N/r, r) = 1 and so attack can proceed Using Victor Shoup’s Number Theory Library on a 3.16GHz Intel Xeon, testing 1-smoothness of a random multiple of φ(P) takes ≈ 0.690ms Other basic cost is a point addition in the Jacobian; Jacobson estimates this to be < 1/2.3 the cost of smoothness test using NUCOMP Hence expected time to find a relation using a single processor is ≈ 650 years.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-97
SLIDE 97

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

GHS for ‘Well-Known Group’ 4

We have φ : E(F2185)[r] − → JacH(F237) for hyperelliptic H : Y 2 + h(X) · Y = f(X), with F237 = F2[ω]/(ω37 + ω9 + ω2 + ω + 1) and h(X) = 73994877348X 16 + 113350789030X 8 + 86827085475X 4 + 21964938327X 2 + 125543309305X, f(X) = 49045248530X 33 + 40737336296X 17 + 45140903646X 16 + 120039047741X 9 + 105120752497X 8 + 72787224919X 5 + 25040887869X 4 + 72047225547X 3 + 94586877616X 2 + 68639477599X, and genus(H) = 16 = 2185/37−1.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-98
SLIDE 98

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Static DHP for ‘Well-Known Group’ 4 via GHS

N = #JacH(F237) has bitlength 592 Furthermore (N/r, r) = 1 and so attack can proceed Using Victor Shoup’s Number Theory Library on a 3.16GHz Intel Xeon, testing 1-smoothness of a random multiple of φ(P) takes ≈ 0.854ms Other basic cost is a point addition in the Jacobian; Jacobson estimates this to be ≈ 1/2.3 the cost of smoothness test using NUCOMP Hence expected time to find a relation using a single processor is ≈ 810 years.

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-99
SLIDE 99

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Static DHP for E(F2ln) via GHS

Components of learning phase: Construct factor base F of degree 1 divisors: ≈ 2l−1 such divisors ignoring negatives Map each D ∈ F to an element of im(φ) via multiplication by h = #JacH(F2l)/r ≈ 2l((2n−1)!−n) Compute φ−1(hD) for each D ∈ F Call the Static DHPd oracle on each φ−1(hD) in E(F2ln) Expected cost of relation find: Cost of each smoothness test ≈ (128l − 288) F2l multiplications Hence total cost is ≈ (2n−1)! · (128l − 288) F2l multiplications

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-100
SLIDE 100

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Static DHP for E(F2ln) via GHS

Consider asymptotics for fixed n and l → ∞. Write g = 2n−1. For 2l > g! the dominant cost is the oracle calls Hence should reduce F to balance the two stages Let q = 2l and let |Fs| = qα with 0 < α ≤ 1 Probability that a random point decomposes over Fs is qg(α−1)/g! Solving g! · qg(1−α) = qα gives α =

g+logq g! g+1

and so complexity

  • f algorithm is

˜ O(q1−

1 g+1 ).

This is the square-root of the balanced DLP algorithm complexity for fixed genus (Gaudry/Harley)

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-101
SLIDE 101

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Comparison with the Gaudry/Semaev-based method

For fixed n and increasing q first algorithm is asymptotically faster: ˜ O(q1−

1 n+1 ) vs ˜

O(q1−

1 g+1 )

In practice, factorisation is much easier than a decomposition — have a trade-off between factorisation probability and ease of factorisation — so may even be better for n = 2, 3, 4, as well as 5 Method is really tailored for when Gaudry/Semaev decompositions are impractical Limitation: details are only clear in characteristic 2

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-102
SLIDE 102

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Conclusions/Questions

Some problems occurring in security proofs are easier than DLP when index calculus applies

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-103
SLIDE 103

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Conclusions/Questions

Some problems occurring in security proofs are easier than DLP when index calculus applies Elliptic curves defined over extension fields may be unsuitable in some scenarios

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-104
SLIDE 104

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Conclusions/Questions

Some problems occurring in security proofs are easier than DLP when index calculus applies Elliptic curves defined over extension fields may be unsuitable in some scenarios Oracle-assisted pairing inversion seems interesting

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields

slide-105
SLIDE 105

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves

Conclusions/Questions

Some problems occurring in security proofs are easier than DLP when index calculus applies Elliptic curves defined over extension fields may be unsuitable in some scenarios Oracle-assisted pairing inversion seems interesting Further applications of Weil descent yet to be revealed?

  • R. Granger

On the Static DHP on Elliptic Curves over Extension Fields