For example, let
be the elliptic curve given by
over the field
. We have
If
If
has order
or
or is a product of
reasonably small primes, then there are some methods for attacking the
discrete log problem on
, which are beyond the scope of this book.
It is thus important to be able to compute
efficiently, in order to verify that the elliptic curve one wishes to
use for a cryptosystem doesn't have any obvious vulnerabilities. The
naive algorithm to compute
is to try each value of
and count how often
is a perfect square
mod
, but this is of no use when
is large enough to be useful
for cryptography. Fortunately, there is an algorithm due to Schoof,
Elkies, and Atkin for computing
efficiently
(polynomial time in the number of digits of
), but this
algorithm is beyond the scope of this book.
In Section 3.1.1 we discussed the discrete log problem in
. There are general attacks called ``index calculus
attacks'' on the discrete log problem in
that are slow,
but still faster than the known algorithms for solving the discrete
log in a ``general'' group (one with no extra structure). For most
elliptic curves, there is no known analogue of index calculus attacks
on the discrete log problem. At present it appears that given
the
discrete log problem in
is much harder than the discrete
log problem in the multiplicative group
. This suggests
that by using an elliptic curve-based cryptosystem instead of one
based on
one gets equivalent security with much smaller
numbers, which is one reason why building cryptosystems using elliptic
curves is attractive to some cryptographers. For example, Certicom,
a company that strongly supports elliptic curve cryptography, claims:
``[Elliptic curve crypto] devices require less storage, less power, less memory, and less bandwidth than other systems. This allows you to implement cryptography in platforms that are constrained, such as wireless devices, handheld computers, smart cards, and thin-clients. It also provides a big win in situations where efficiency is important.''
For an up-to-date list of elliptic curve discrete log challenge
problems that Certicom sponsors, see [#!certicom:challenge!#]. For
example, in April 2004 a specific cryptosystem was cracked that was
based on an elliptic curve over
, where
has
bits.
The first unsolved challenge problem involves an elliptic curve over
, where
has
bits, and the next challenge after
that is one in which
has
bits. Certicom claims at
[#!certicom:challenge!#] that the
-bit challenge problem is
computationally infeasible.
William 2007-06-01