Analysis of the Xedni calculus attack (Q1974057)

From MaRDI portal





scientific article; zbMATH DE number 1441591
Language Label Description Also known as
default for all languages
No label defined
    English
    Analysis of the Xedni calculus attack
    scientific article; zbMATH DE number 1441591

      Statements

      Analysis of the Xedni calculus attack (English)
      0 references
      0 references
      0 references
      0 references
      0 references
      20 November 2000
      0 references
      Elliptic curves defined over finite fields provide secure cryptosystems that are currently included in several industrial products. A crucial question hence concerns the security of the elliptic curve discrete logarithm problem (ECDLP). The Xedni attack on ECDLP involves lifting points and the curve from the considered finite field to \({\mathbb Q}\). If the lifted points are linearly dependant, then the ECDLP is solved. This article describes in details the Xedni attack, and provides valuable background (Hasse-Weil \(L\)-function, Taniyama conjecture, conjecture of Birch and Swinnerton-Dyer, heights). It is shown that this attack is asymptotically unlikely succesful. Moreover, even for small base finite fields, this attack fails very often (how often is made precise in the article), so that the Xedni calculus is impractical for the fields used in elliptic curve cryptography.
      0 references
      elliptic curves
      0 references
      rank
      0 references
      Xedni calculus attack
      0 references
      discrete logarithm problem
      0 references

      Identifiers

      0 references
      0 references
      0 references
      0 references
      0 references