Cryptology ePrint Archive: Report 2019/533

Stopping time signatures for some algorithms in cryptography

Percy Deift and Stephen D. Miller and Thomas Trogdon

Abstract: We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms. Recent work of Deift, Menon, Olver, Pfrang, and Trogdon has shown that certain numerical algorithms applied to large random matrices exhibit a characteristic distribution of running times, which depends only on the algorithm but are independent of the choice of probability distributions for the matrices. Different algorithms often exhibit different running time distributions, and so the histograms for these running time distributions provide a "time-signature" for the algorithms, making it possible, in many cases, to distinguish one algorithm from another. In this paper we extend this analysis to cryptographic algorithms, and present examples of such algorithms with time-signatures that are indistinguishable, and others with time-signatures that are clearly distinct.

Category / Keywords: foundations / foundations, number theory, discrete logarithm problem, elliptic curve cryptosystem

Date: received 20 May 2019

Contact author: miller at math rutgers edu

Available format(s): PDF | BibTeX Citation

Version: 20190522:073539 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]