Paper 2024/1767

ECPM Cryptanalysis Resource Estimation

Dedy Septono Catur Putranto, Pusan National University
Rini Wisnu Wardhani, Pusan National University
Jaehan Cho, Pusan National University
Howon Kim, Pusan National University
Abstract

Elliptic Curve Point Multiplication (ECPM) is a key component of the Elliptic Curve Cryptography (ECC) hierarchy protocol. However, the specific estimation of resources required for this process remains underexplored despite its significance in the cryptanalysis of ECC algorithms, particularly binary ECC in GF (2𝑚). Given the extensive use of ECC algorithms in various security protocols and devices, it is essential to conduct this examination to gain valuable insights into its cryptanalysis, specifically in terms of providing precise resource estimations, which serve as a solid basis for further investigation in solving the Elliptic Curve Discrete Logarithm Problem. Expanding on several significant prior research, in this work, we refer to as ECPM cryptanalysis, we estimate quantum resources, including qubits, gates, and circuit depth, by integrating point addition (PA) and point-doubling (PD) into the ECPM scheme, culminating in a Shor’s algorithm-based binary ECC cryptanalysis circuit. Focusing on optimizing depth, we elaborate on and implement the most efficient PD circuit and incorporate optimized Karatsuba multiplication and FLT-based inversion algorithms for PA and PD operations. Compared to the latest PA-only circuits, our preliminary results showcase significant resource optimization for various ECPM implementations, including single-step ECPM, ECPM with combined or selective PA/PD utilization, and total−step ECPM (2𝑛 PD+2 PA).

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
ECCECPMPoint AdditionPoint DoublingQuantum Cryptanalysis
Contact author(s)
dedy septono @ pusan ac kr
rini wisnu @ pusan ac kr
chojh0208 @ pusan ac kr
howonkim @ pusan ac kr
History
2024-10-30: approved
2024-10-30: received
See all versions
Short URL
https://ia.cr/2024/1767
License
Creative Commons Attribution-NonCommercial-NoDerivs
CC BY-NC-ND

BibTeX

@misc{cryptoeprint:2024/1767,
      author = {Dedy Septono Catur Putranto and Rini Wisnu Wardhani and Jaehan Cho and Howon Kim},
      title = {{ECPM} Cryptanalysis Resource Estimation},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1767},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1767}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.