Generación de curvas elípticas con buenas propiedades criptográficas sobre campos primos

Autores/as

  • Yessica Caridad Castaño Sainz Instituto de Criptografía, Universidad de la Habana, La Habana
  • Claudia Espinosa Contreras Empresa de Tecnologías para la Defensa (XETID)
  • Huber Martínez Rodríguez Departamento de Matemática, Facultad de Ciencias Informáticas, Universidad de Ciego de Ávila https://orcid.org/0000-0002-2452-7574

Palabras clave:

parámetros de definición de curvas elípticas, requisitos de seguridad, requisitos técnicos

Resumen

En este trabajo se presentan las funcionalidades del paquete implementado en SAGE, ECDP Generator, el cual permite generar parámetros de definición de curvas elípticas utilizando los métodos pseudoaleatorio y pseudoaleatorio verificable para las formas de Weierstrass, Edwards y torcida de Edwards y evaluar la seguridad de diferentes juegos de parámetros. Para ello se analizaron los requisitos de seguridad que una curva elíptica debe satisfacer para ser utilizada en sistemas criptográficos teniendo en cuenta los requisitos adoptados por los diferentes estándares y las discusiones sobre la estandarización de nuevas curvas elı ́pticas. Se analizan requisitos técnicos que propician implementaciones eficientes y en el caso de la forma de Edwards (torcida de Edwards) completitud en las operaciones de grupo. Se presentan algoritmos para verificar las condiciones del discriminante y el número de clases que constituyen las restricciones más complejas.

Descargas

Los datos de descargas todavía no están disponibles.

Citas

ECC Brainpool. ECC Brainpool Standard Curves and Curve Generation, 2005.

Accredited Standards Committee X9. American national standard X9.63-2001. Public key cryptography for the financial services industry: key agreement and key transport using elliptic curve cryptography, 2001.

Accredited Standards Committee X9.American national standard X9.62-1999. Public key cryptography for the financial services industry: the elliptic curve digital signature algorithm (ECDSA). Technical report, 1999.

ANSI ANSI. X9. 62: 2005: Public key cryptography for the financial services industry. The elliptic curve digital signature algorithm (ECDSA), 2005.

Diego F. Aranha, Paulo S. L. M. Barreto, C. C. F. Pereira Geovandro, and Jefferson E. Ricardini. A note on high-security general-purpose elliptic curves. IACR Cryptology ePrint Archive, 2013:647, 2013.

Naomi Benger, Joop van de Pol, Nigel P. Smart, and Yuval Yarom. .ooh aah... just a little bit”: A small amount of side channel can go a long way. In Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings, pages 75–92, 2014.

Daniel J. Bernstein. Curve25519: New diffie-hellman speed records. In Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pages 207–228, 2006.

Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, and Christiane Peters. Twisted edwards curves. In Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings [8], pages 389–405.

Daniel J. Bernstein and Tanja Lange. Explicit-formulas database. http://hyperelliptic.org/EFD/. Accessed: 2017-03-16.

Daniel J. Bernstein and Tanja Lange. Faster addition and doubling on elliptic curves. IACR Cryptology ePrint Archive, 2007:286, 2007.

Daniel J. Bernstein and Tanja Lange. Safecurves: choosing safe curves for elliptic-curve cryptography. http://safecurves.cr.yp.to, 19 January 2014. accedido 23 de Diciembre de 2016.

Joppe W. Bos, Craig Costello, Patrick Longa, and Michael Naehrig. Selecting elliptic curves for cryptography: an efficiency and security analysis. J. Cryptographic Engineering, 6(4):259–286, 2016.

Colin Boyd, Paul Montague, and Khanh Nguyen. Elliptic curve based password authenticated key exchange protocols. In Information Security and Privacy, pages 487–501. Springer, 2001.

’Eric Brier and Marc Joye. Fast Point Multiplication on Elliptic Curves Through Isogenies. In M. Fossorier, T. Høholdt, and A. Poli, Eds., Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, vol. 2643 of Lecture Notes in Computer Science, pp. 43-50, SpringerVerlag, 2003.

Certicom Research. SEC 1: Elliptic curve cryptography, version 1.0, 2000.

Certicom Research. SEC 2: Recommended elliptic curve domain parameters, version 1.0, 2000.

Certicom Research. SEC 1: Elliptic curve cryptography, version 2.0, 2009.

Certicom Research. Standards for Efficient Cryptography 2 (SEC 2): Recommended Elliptic Curve Domain Parameters. Technical report, Certicom Corp, 2010.

Chae Hoon Lim and Pil Joong Lee. A key recovery attack on discrete log based schemes using a prime order subgroup. In Burton S. Kaliski Jr., editor, Advances in cryptology crypto 97, 17th annual international cryptology conference, santa barbara, california, usa., volume 1294 of Lecture Notes in Computer Science, pages 379392. Springer Berlin, Heidelberg, 1997.

Craig Costello, Patrick Longa, and Michael Naehrig. A brief discussion on selecting new elliptic curves. Technical report, Microsoft Research, 2014.

D. Shumow and N. Ferguson. On the possibility of a back door in the NIST SP800-90 dual ec prng. http://rump2007.cr.yp.to/15-shumow.pdf, 2007.

William Dupuy and Sébastien Kunz-Jacques. Resistance of randomized projective coordinates against power analysis. In Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, pages 1–14, 2005.

Benoit Feix, Myl` ene Roussellet, and Alexandre Venelli. Side-Channel Analysis on Blinded Regular Scalar Multiplications, pages 3–20. Springer International Publishing, Cham, 2014.

Jean-Pierre Flori, Jérome Plut, Jean-René Reinhard, and Martin Ekera. Diversity and transparency for ECC. IACR Cryptology ePrint Archive, 2015:659, 2015.

Louis Goubin. A refined power-analysis attack on elliptic curve cryptosystems. In International Workshop on Public Key Cryptography, pages 199–211. Springer, 2003.

Mike Hamburg. Ed448-goldilocks, a new elliptic curve. IACR Cryptology ePrint Archive, 2015:625, 2015.

Ming-Deh A. Huang and Wayne Raskind. Signature calculus and discrete logarithm problems. In Algorithmic Number Theory, 7th International Symposium, ANTSVII, Berlin, Germany, July 23-28, 2006, Proceedings, pages 558–572, 2006.

Burton S. Kaliski Jr. A pseudo-random bit generator based on elliptic logarithms. In Advances in Cryptology - CRYPTO ’86, Santa Barbara, California, USA, 1986, Proceedings, volume 263 of Lecture Notes in Computer Science, pages 84–103. Springer, 1986.

Burton Stephen Kaliski. Elliptic curves and cryptography: A pseudorandom bit generator and other tools. PhD thesis, Massachusetts Institute of Technology, 1988.

Cameron F. Kerry, Acting Secretary, and Charles Romine Director. Fips pub 186-4 federal information processing standards publication digital signature standard (dss), 2013.

A. Langley, M. Hamburg, and S. Turner. Elliptic Curves for Security. RFC 7748, RFC Editor, January 2016.

Manfred Lochter and Johannes Merkle. Elliptic Curve Cryptography (CCE) Brainpool Standard Curves and Curve Generation. RFC 5639 (Informational), 2010.

Manfred Lochter, Johannes Merkle, and Jöne-Marc Schmidt. Requirements for Elliptic Curves for HighAssurance Applications. Torsten Schütze, 2015.

Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, and Torsten Schütze. Requirements for standard elliptic curves. IACR Cryptology ePrint Archive, 2014:832, 2014.

P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization. Mathematics of computation, 48(177):243–264, 1987.

National Institute of Standards and Technology. FIPS 186-2. Digital Signature Standard. Technical report, NIST, 2000.

Yasuyuki Sakai and Kouichi Sakurai. Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves, pages 169–180. Springer Berlin Heidelberg, Berlin, Heidelberg, 2005.

Stale Zerener Haugnæss. On the Generation of Strong Elliptic Curves: For Cryptographic Applications. Master’s thesis, University of Oslo, 2015.

The New York Times. Government announces steps to restore confidence on encryption standards. https://bits.blogs.nytimes.com/2013/09/10/governmentannounces-steps-to-restore-confidence-on-encryptionstandards/? r=1, 10 September 2013.

Joop van de Pol, Nigel P. Smart, and Yuval Yarom. Just a little bit more. In Topics in Cryptology - CT-RSA 2015, The Cryptographer’s Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings, pages 3–21, 2015.

Yasuyuki Sakai and Kouichi Sakurai. Simple power analysis on fast modular reduction with generalized Mersenne prime for elliptic curve cryptosystems. IEICE Transactions, 89-A(1):231-237, 2006.

Yessica Caridad Castaño Sainz. Generación de curvas elípticas con buenas propiedades criptográficas sobre campos finitos primos. Master’s thesis, Universidad de la Habana, January 2018.

Descargas

Publicado

2024-03-26 — Actualizado el 2019-06-27

Versiones

Cómo citar

[1]
Castaño Sainz, Y.C. et al. 2019. Generación de curvas elípticas con buenas propiedades criptográficas sobre campos primos. Ciencias matemáticas. 33, 1 (jun. 2019), 18–27.

Número

Sección

Artículo Original