Skip to main content
Log in

Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Considering potential attacks from cloud-computing and quantum-computing, it is becoming necessary to provide higher security elliptic curves. The hidden Markov models are introduced for designing the trace-vector computation algorithm to accelerate the search for elliptic curve (EC) base-points. We present a new algorithm for secure Koblitz EC generation based on evolutionary cryptography theory. The algorithm is tested by selecting a secure Koblitz EC over the field F(22000), with experiments showing that both the base field and base point of the secure curve generated exceed the parameter range for Koblitz curves recommended by NIST. The base fields generated go beyond 1900 bits, which is higher than the 571 bits recommended by NIST. We also find new secure curves in the range F(2163)—F(2571) recommended by NIST. We perform a detailed security analysis of those secure curves, showing that those we propose satisfy the same security criteria as NIST.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zhang H G, Feng X T, Tan Z P. Evolutionary cryptography and the evolutionary design for DES. J Commun, 2002, 5: 57–64

    Google Scholar 

  2. Meng Q S, Zhang H G, Wang Z Y, et al. Designing bent functions using evolving method. Acta Electron Sin, 2004, 11: 1901–1903

    Google Scholar 

  3. Wang Z Y, Li B, Zhang H G. Research on security of Hash functions. Comput Engin Appl, 2005, 12: 18–19

    Google Scholar 

  4. Wang Z Y, Li L, Zhang H G. Automatic design approach of security protocols. Comput Engin Appl, 2005, 12: 16–17

    Google Scholar 

  5. Chen L J, Zhao Y, Zhang H G. Cryptanalysis for stream cipher based on evolutionary computation. Comput Appl, 2008, 8: 1912–1915

    Google Scholar 

  6. Zhang H G, Wang C, Shi X Y, et al. Fast Generating Algorithm for ECC Secure Cure Based on Evolutionary Computation. China Patent, 200910200504. 2010-5-26

  7. Wang C, Zhang H G, Liu L L. The experiment of Koblitz elliptic curves generating based on evolutionary cryptography theory and verifying the parameters recommended by NIST. China Commun, 2011, 8: 41–49

    Google Scholar 

  8. Dustin O. Securing elasticity in the cloud. Commun ACM, 2010, 53: 46–51

    Google Scholar 

  9. NIST. Digital Signature Standard. Federal Information Processing Standards Publication, 2000

  10. Brown M, Hankerson D, Lopez J, et al. Software implementation of the NIST elliptic curves over prime fields. In: Topics in Cryptology — CT-RSA 2001, Proceedings Lecture Notes in Computer Science, 2001. 250–265

  11. Guneysu T, Paar C. Ultra High Performance ECC over NIST Primes on Commercial FPGAs. In: Lecture Notes in Computer Science. Berlin/Heidelberg: Springer, 2008. 62–78

    Google Scholar 

  12. Schoof R. Elliptic curves over finite fields and the computation of square roots mod P. Math Comput, 1985, 44: 483–494

    MathSciNet  MATH  Google Scholar 

  13. Elkies N D. Elliptic and modular curves over finite fields and related computational issues. Comput Perspect Number Theory, 1998, 7: 21–76

    MathSciNet  Google Scholar 

  14. Satoh T. The canonical lift of an ordinary elliptic curve over a finite field and its point counting. J Raman Math Soc, 2000, 15: 483

    MathSciNet  Google Scholar 

  15. Satoh T. On p-adic point counting algorithms for elliptic curves over finite fields. In: Algorithmic number theory, 5th international symposium, ANTS-V, Sydney, 2002. LNCS 2369. 43–66

  16. Fouquet M, Gaudry P, Harley R. An extension of Satoh’s algorithm and its implementation. Raman Math Soc, 2000, 15: 281

    MathSciNet  MATH  Google Scholar 

  17. Satoh T, Skjernaa B, Taguchi Y. Fast computation of canonical lifts of elliptic curves and its application to point counting. Finite Field Their Appl, 2003, 9: 98–101

    MathSciNet  Google Scholar 

  18. Satoh T. On p-adic point counting algorithms for elliptic curves over finite fields. In: Algorithmic number theory, 5th international symposium, ANTS-V, Sydney, 2002. LNCS 2369. 43–66

  19. Gaudry P. A comparison and a combination of SST and AGM algorithms for counting points of elliptic curves in characteristic 2. In: Asiacrypt 2002. LNCS 2501. 311

  20. Dorigo M, Maniezzo V, Colorni A. Introduction to natural algorithms. Rivista Inform, 1994, 24: 179–197

    Google Scholar 

  21. Colorni A, Dorigo M, Maniezzo V. An investigation of some properties of an ant algorithm. In: Proceedings of the Parallel Problem Solving from Nature Conference (PPSN 92). Elsevier Publishing, 1992. 509–520

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chao Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, C., Zhang, H. & Liu, L. Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models. Sci. China Inf. Sci. 55, 911–920 (2012). https://doi.org/10.1007/s11432-012-4552-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-012-4552-4

Keywords