Analysis of the Xedni calculus attack (Q1974057)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Analysis of the Xedni calculus attack |
scientific article; zbMATH DE number 1441591
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Analysis of the Xedni calculus attack |
scientific article; zbMATH DE number 1441591 |
Statements
Analysis of the Xedni calculus attack (English)
0 references
20 November 2000
0 references
Elliptic curves defined over finite fields provide secure cryptosystems that are currently included in several industrial products. A crucial question hence concerns the security of the elliptic curve discrete logarithm problem (ECDLP). The Xedni attack on ECDLP involves lifting points and the curve from the considered finite field to \({\mathbb Q}\). If the lifted points are linearly dependant, then the ECDLP is solved. This article describes in details the Xedni attack, and provides valuable background (Hasse-Weil \(L\)-function, Taniyama conjecture, conjecture of Birch and Swinnerton-Dyer, heights). It is shown that this attack is asymptotically unlikely succesful. Moreover, even for small base finite fields, this attack fails very often (how often is made precise in the article), so that the Xedni calculus is impractical for the fields used in elliptic curve cryptography.
0 references
elliptic curves
0 references
rank
0 references
Xedni calculus attack
0 references
discrete logarithm problem
0 references
0 references
0.84360325
0 references
0.8410489
0 references
0.83333254
0 references
0.83264613
0 references
0 references
0.81752986
0 references
0.8154461
0 references
0 references