Unknown

Dataset Information

0

Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016.


ABSTRACT: Wang et al. proposed a method for obtaining elliptic curves with embedding degree 1 for securing critical infrastructures, and presented several elliptic curves generated by their method with torsion points of 160 bits and 189 bits orders. They also presented some experimental results and claimed that their implementation of an elliptic curve generated with their method is faster than an implementation for embedded devices presented by Bertoni et al. In this paper, we point out that the security and efficiency claims given by Wang et al. are flawed. Specifically, we show that it is possible to solve finite field discrete logarithm problems defined over their elliptic curves in practice. On the elliptic curves with torsion points of 160 bits orders generated by Wang et al., their instances of finite field discrete logarithm problems are solved in around 4 hours by using a standard desktop PC. On the torsion points of 189 bits orders, their instances are solved in around 10 days by using two standard desktop PCs. The hardness of the finite field discrete logarithm problems is one of the most important bases of security; therefore, their elliptic curves should not be used for cryptographic purposes.

SUBMITTER: Teruya T 

PROVIDER: S-EPMC6380619 | biostudies-literature | 2019

REPOSITORIES: biostudies-literature

altmetric image

Publications

Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016.

Teruya Tadanori T  

PloS one 20190219 2


Wang et al. proposed a method for obtaining elliptic curves with embedding degree 1 for securing critical infrastructures, and presented several elliptic curves generated by their method with torsion points of 160 bits and 189 bits orders. They also presented some experimental results and claimed that their implementation of an elliptic curve generated with their method is faster than an implementation for embedded devices presented by Bertoni et al. In this paper, we point out that the security  ...[more]

Similar Datasets

| S-EPMC5001717 | biostudies-literature
| S-EPMC5931451 | biostudies-literature
2018-11-01 | MSV000083090 | MassIVE
| S-EPMC3419720 | biostudies-literature
| S-EPMC8216542 | biostudies-literature
| S-EPMC5480091 | biostudies-other
2013-05-01 | GSE42724 | GEO
2013-05-01 | E-GEOD-42724 | biostudies-arrayexpress
| S-EPMC6786606 | biostudies-literature
| S-EPMC5657850 | biostudies-literature