Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem

Author:

Güneysu Tim1,Paar Christof1,Pelzl Jan1

Affiliation:

1. Horst-Görtz Institute for IT Security, Ruhr University of Bochum, Germany

Abstract

The resistance against powerful index-calculus attacks makes Elliptic Curve Cryptosystems (ECC) an interesting alternative to conventional asymmetric cryptosystems, like RSA. Operands in ECC require significantly less bits at the same level of security, resulting in a higher computational efficiency compared to RSA. With growing computational capabilities and continuous technological improvements over the years, however, the question of the security of ECC against attacks based on special-purpose hardware arises. In this context, recently emerged low-cost FPGAs demand for attention in the domain of hardware-based cryptanalysis: the extraordinary efficiency of modern programmable hardware devices allow for a low-budget implementation of hardware-based ECC attacks---without the requirement of the expensive development of ASICs. With focus on the aspect of cost-efficiency, this contribution presents and analyzes an FPGA-based architecture of an attack against ECC over prime fields. A multi-processing hardware architecture for Pollard's Rho method is described. We provide results on actually used key lengths of ECC (128 bits and above) and estimate the expected runtime for a successful attack. As a first result, currently used elliptic curve cryptosystems with a security of 160 bit and above turn out to be infeasible to break with available computational and financial resources. However, some of the security standards proposed by the Standards for Efficient Cryptography Group (SECG) become subject to attacks based on low-cost FPGAs.

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science

Reference23 articles.

1. Blake I. Seroussi G. and Smart N. 1999. Elliptic Curves in Cryptography. Cambridge University Press.]] Blake I. Seroussi G. and Smart N. 1999. Elliptic Curves in Cryptography . Cambridge University Press.]]

2. Certicom. 1997. Certicom ECC Challenge. http://www.certicom.com.]] Certicom. 1997. Certicom ECC Challenge. http://www.certicom.com.]]

3. Certicom research. 2000a. Standards for Efficient Cryptography---SEC 1: Elliptic Curve Cryptography v1.0. http://www.secg.org/secg_docs.htm.]] Certicom research. 2000a. Standards for Efficient Cryptography---SEC 1: Elliptic Curve Cryptography v1.0. http://www.secg.org/secg_docs.htm.]]

4. Certicom research. 2000b. Standards for Efficient Cryptography---SEC 1: Recommended Elliptic Curve Domain Parameters v1.0. http://www.secg.org/secg_docs.htm.]] Certicom research. 2000b. Standards for Efficient Cryptography---SEC 1: Recommended Elliptic Curve Domain Parameters v1.0. http://www.secg.org/secg_docs.htm.]]

5. An FPGA implementation of a GF(p) ALU for encryption processors;Daly A.;Elsevier Microproces. Microsyst.,2004

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Efficient many-core architecture design for cryptanalytic collision search on FPGAs;Journal of Information Security and Applications;2018-08

2. Code-based cryptography on reconfigurable hardware: tweaking Niederreiter encryption for performance;Journal of Cryptographic Engineering;2013-03-14

3. Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware;Cryptographic Hardware and Embedded Systems – CHES 2012;2012

4. MicroEliece: McEliece for Embedded Devices;Lecture Notes in Computer Science;2009

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3