10.12.2012 Views

Prime Numbers

Prime Numbers

Prime Numbers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

394 Chapter 8 THE UBIQUITY OF PRIME NUMBERS<br />

(x0,y0) =[u1]P +[u2]Q;<br />

v = x0 mod r;<br />

if(v == R) Bob accepts signature;<br />

else Bob rejects signature;<br />

This algorithm is modeled on an older DSA standard, and amounts to the<br />

natural elliptic-curve variant of DSA. Modern details and issues are discussed<br />

in [Johnson et al. 2001]. The hash value h(M) is, technically speaking,<br />

supposed to be effected via another standard, the SHA-1 hash function [Juriˇsić<br />

and Menezes 1997]. Those authors also discuss the interesting issue of security.<br />

They conclude that a 1024-bit DSA system is about as secure as a 160-bit<br />

ECDSA system. If valid, such an observation shows once again that, on our<br />

current knowledge, the EDL problem is about as hard as a computational<br />

number-theoretical problem can be.<br />

The current record for an EDL computation pertains to the “Certicom<br />

Challenge,” for which an EDL was solved in 2002 by C. Monico et al. for<br />

an elliptic curve over Fp with p being a 109-bit prime. The next challenge<br />

of this type on the list is a 131-bit prime, but under current knowledge of<br />

EDL difficulty, the 131-bit case is perhaps two thousand times harder than<br />

the 109-bit case.<br />

Incidentally, there is a different way to effect a signature scheme with<br />

elliptic curves, which is the El Gamal scheme. We do not write out the<br />

algorithm—it is less standard than the above ECDSA scheme (but no less<br />

interesting))—but the essentials lie in Algorithm 8.1.10. Also, the theoretical<br />

ideas are found in [Koblitz 1987].<br />

We have mentioned, in connection with RSA encryption, the practical<br />

expedient of using the sophisticated methods (RSA, ECC) for a key exchange,<br />

then using the mutually understood key in a rapid block cipher, such as DES,<br />

say. But there is another fascinating way to proceed with a kind of “direct”<br />

ECC scheme, based on the notion of embedding plaintext as points on elliptic<br />

curves. In this fashion, all encryption/decryption proceeds with nothing but<br />

elliptic algebra at all phases.<br />

Theorem 8.1.9 (Plaintext-embedding theorem). For prime p > 3 let E<br />

denote an elliptic curve over Fp, with governing cubic<br />

y 2 = x 3 + ax + b.<br />

Let X be any integer in [0,p− 1]. Then X is either an x-coordinate of some<br />

point on E, or on the twist curve E ′ whose governing cubic is gy 2 = x 3 +ax+b,<br />

for some g with g<br />

p = −1. Furthermore,ifp≡ 3(mod4), and we assign<br />

s = X 3 + aX + b mod p,<br />

Y = s (p+1)/4 mod p,<br />

then (X, Y ) is a point on either E,E ′ , respectively, as<br />

Y 2 ≡ s, −s (mod p),

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!