Analysis of the Xedni calculus attack (Q1974057)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Analysis of the Xedni calculus attack
scientific article

    Statements

    Analysis of the Xedni calculus attack (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    20 November 2000
    0 references
    Elliptic curves defined over finite fields provide secure cryptosystems that are currently included in several industrial products. A crucial question hence concerns the security of the elliptic curve discrete logarithm problem (ECDLP). The Xedni attack on ECDLP involves lifting points and the curve from the considered finite field to \({\mathbb Q}\). If the lifted points are linearly dependant, then the ECDLP is solved. This article describes in details the Xedni attack, and provides valuable background (Hasse-Weil \(L\)-function, Taniyama conjecture, conjecture of Birch and Swinnerton-Dyer, heights). It is shown that this attack is asymptotically unlikely succesful. Moreover, even for small base finite fields, this attack fails very often (how often is made precise in the article), so that the Xedni calculus is impractical for the fields used in elliptic curve cryptography.
    0 references
    elliptic curves
    0 references
    rank
    0 references
    Xedni calculus attack
    0 references
    discrete logarithm problem
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references