Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Computational hardness of IFP and ECDLP
Yasuda M., Shimoyama T., Kogure J., Izu T. Applicable Algebra in Engineering, Communication and Computing27 (6):493-521,2016.Type:Article
Date Reviewed: Apr 6 2017

It is generally recognized that elliptic curve cryptography (ECC) can attain the same level of security as RSA with a shorter key length. This paper offers practical evidence of this claim. For both RSA and ECC, security depends on the intractability of a mathematical problem, namely the discrete logarithm problem for ECC (ECDLP) and the integer factorization problem (IFP) for RSA. To compare these two methods, the authors estimate the complexity of each one, in terms of the number of flops needed to solve an N-bit ECDLP or IFP problem in one year.

The fastest known algorithm for solving IFP is the general number field sieve (GNFS) method. For this method, the authors calculate complexities by estimating the values of the constants given in the formula for asymptotic complexity. Estimates are given for both limited and unlimited memory size. The fastest known method for solving ECDLP is the Pollard rho method. This is a probabilistic method in which a certain pseudo-random sequence is generated until a repetition (“collision”) is found. For this method, the authors estimate the number of iterations necessary for a collision to take place with 99 percent certainty.

Based on these estimates, the authors compare the strengths of IFP and ECDLP. A table is given listing the bit sizes of ECDLP and IFP that provide the same level of strength. For example, a 1024-bit IFP has approximately the same security as that of the 137-bit ECDLP over either prime or binary fields or for Koblitz curves.

This paper contains few new theoretic results, but contains many interesting estimates and comparisons of IFP and ECDLP, results due to the authors as well as to other sources, and should be of interest to both students and practitioners of public key cryptography. An extensive list of 53 references is given.

Reviewer:  D. Bollman Review #: CR145175 (1706-0385)
Bookmark and Share
 
Public Key Cryptosystems (E.3 ... )
 
 
Elliptic Equations (G.1.8 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Public Key Cryptosystems": Date
Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)211990. Type: Proceedings
Sep 1 1991
Public-key cryptography
Salomaa A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9783540528319)
Feb 1 1992
Computation of discrete logarithms in prime fields
LaMacchia B., Odlyzko A. Designs, Codes and Cryptography 1(1): 47-62, 1991. Type: Article
Apr 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy