Analysis of the Xedni calculus attack (Q1974057)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Analysis of the Xedni calculus attack |
scientific article |
Statements
Analysis of the Xedni calculus attack (English)
0 references
20 November 2000
0 references
Elliptic curves defined over finite fields provide secure cryptosystems that are currently included in several industrial products. A crucial question hence concerns the security of the elliptic curve discrete logarithm problem (ECDLP). The Xedni attack on ECDLP involves lifting points and the curve from the considered finite field to \({\mathbb Q}\). If the lifted points are linearly dependant, then the ECDLP is solved. This article describes in details the Xedni attack, and provides valuable background (Hasse-Weil \(L\)-function, Taniyama conjecture, conjecture of Birch and Swinnerton-Dyer, heights). It is shown that this attack is asymptotically unlikely succesful. Moreover, even for small base finite fields, this attack fails very often (how often is made precise in the article), so that the Xedni calculus is impractical for the fields used in elliptic curve cryptography.
0 references
elliptic curves
0 references
rank
0 references
Xedni calculus attack
0 references
discrete logarithm problem
0 references