Paper 2024/1298

Point (de)compression for elliptic curves over highly $2$-adic finite fields

Dmitrii Koshelev, University of Lleida
Abstract

This article addresses the issue of efficient and safe (de)compression of $\mathbb{F}_{\!q}$-points on an elliptic curve $E$ over a highly $2$-adic finite field $\mathbb{F}_{\!q}$ of characteristic $5$ or greater. The given issue was overlooked by cryptography experts, probably because, until recently, such fields were not in trend. Therefore, there was no difficulty (with rare exceptions) in finding a square $\mathbb{F}_{\!q}$-root. However, in our days, fields with large $2$-adicities have gained particular popularity in the ZK (zero-knowledge) community, despite the fact that $\sqrt{\cdot} \in \mathbb{F}_{\!q}$ should be computed via more sophisticated square-root algorithms such as (Cipolla-Lehmer-)Müller's one. The article explains why the classical $x$-coordinate (de)compression method based on Müller's algorithm often contains Achilles' heel to successfully perform a novel fault attack, which also fits the definition of a (D)DoS attack. In a nutshell, the trouble stems from the non-deterministic initialization of Müller's algorithm. Moreover, the article suggests a countermeasure, namely an alternative (still simple) (de)compression method that completely prevents the discovered attack whenever the curve $E/\mathbb{F}_{\!q}$ is of even order. In particular, all twisted Edwards (i.e., Montgomery) curves are relevant. The decompression stage of the new method equally suffers from one square-root extraction in $\mathbb{F}_{\!q}$. But the corresponding quadratic residue is inherently equipped with additional information, providing an opportunity to launch Müller's algorithm immediately from its main deterministic part. In turn, the compression stage of the new method remains (almost) free as well as for the $x$-coordinate method.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
Müller's algorithm(D)DoS attackselliptic curve cryptographyhighly $2$-adic finite fieldspoint (de)compression
Contact author(s)
dimitri koshelev @ gmail com
History
2024-08-20: approved
2024-08-19: received
See all versions
Short URL
https://ia.cr/2024/1298
License
No rights reserved
CC0

BibTeX

@misc{cryptoeprint:2024/1298,
      author = {Dmitrii Koshelev},
      title = {Point (de)compression for elliptic curves over highly $2$-adic finite fields},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1298},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1298}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.