On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics

Naoki Hashizume, Fumiyuki Momose, and Jinhui Chao

Abstract

In this paper, we present algorithms for implementation of the GHS attack to Elliptic curve cryptosystems (ECC). In particular, we consider two large classes of elliptic curves over cubic extension fields of odd characteristics which have weak covering curves against GHS attack, whose existence have been shown recently. We show an algorithm to find definition equation of the covering curve and an algorithm to transfer DLP of the elliptic curve to Jacobian of the covering curve. An algorithm to test if the covering curve is hyperelliptic is also shown in the appendix.

Available format(s)
Publication info
Published elsewhere. Unknown where it was published
Keywords
Public-key cryptosystemelliptic curve cryptosystemcryptoanalysisnumber theory
Contact author(s)
jchao @ ise chuo-u ac jp
History
Short URL
https://ia.cr/2008/215

CC BY

BibTeX

@misc{cryptoeprint:2008/215,
author = {Naoki Hashizume and Fumiyuki Momose and Jinhui Chao},
title = {On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics},
howpublished = {Cryptology ePrint Archive, Paper 2008/215},
year = {2008},
note = {\url{https://eprint.iacr.org/2008/215}},
url = {https://eprint.iacr.org/2008/215}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.