Abstract
Considering potential attacks from cloud-computing and quantum-computing, it is becoming necessary to provide higher security elliptic curves. The hidden Markov models are introduced for designing the trace-vector computation algorithm to accelerate the search for elliptic curve (EC) base-points. We present a new algorithm for secure Koblitz EC generation based on evolutionary cryptography theory. The algorithm is tested by selecting a secure Koblitz EC over the field F(22000), with experiments showing that both the base field and base point of the secure curve generated exceed the parameter range for Koblitz curves recommended by NIST. The base fields generated go beyond 1900 bits, which is higher than the 571 bits recommended by NIST. We also find new secure curves in the range F(2163)—F(2571) recommended by NIST. We perform a detailed security analysis of those secure curves, showing that those we propose satisfy the same security criteria as NIST.
Similar content being viewed by others
References
Zhang H G, Feng X T, Tan Z P. Evolutionary cryptography and the evolutionary design for DES. J Commun, 2002, 5: 57–64
Meng Q S, Zhang H G, Wang Z Y, et al. Designing bent functions using evolving method. Acta Electron Sin, 2004, 11: 1901–1903
Wang Z Y, Li B, Zhang H G. Research on security of Hash functions. Comput Engin Appl, 2005, 12: 18–19
Wang Z Y, Li L, Zhang H G. Automatic design approach of security protocols. Comput Engin Appl, 2005, 12: 16–17
Chen L J, Zhao Y, Zhang H G. Cryptanalysis for stream cipher based on evolutionary computation. Comput Appl, 2008, 8: 1912–1915
Zhang H G, Wang C, Shi X Y, et al. Fast Generating Algorithm for ECC Secure Cure Based on Evolutionary Computation. China Patent, 200910200504. 2010-5-26
Wang C, Zhang H G, Liu L L. The experiment of Koblitz elliptic curves generating based on evolutionary cryptography theory and verifying the parameters recommended by NIST. China Commun, 2011, 8: 41–49
Dustin O. Securing elasticity in the cloud. Commun ACM, 2010, 53: 46–51
NIST. Digital Signature Standard. Federal Information Processing Standards Publication, 2000
Brown M, Hankerson D, Lopez J, et al. Software implementation of the NIST elliptic curves over prime fields. In: Topics in Cryptology — CT-RSA 2001, Proceedings Lecture Notes in Computer Science, 2001. 250–265
Guneysu T, Paar C. Ultra High Performance ECC over NIST Primes on Commercial FPGAs. In: Lecture Notes in Computer Science. Berlin/Heidelberg: Springer, 2008. 62–78
Schoof R. Elliptic curves over finite fields and the computation of square roots mod P. Math Comput, 1985, 44: 483–494
Elkies N D. Elliptic and modular curves over finite fields and related computational issues. Comput Perspect Number Theory, 1998, 7: 21–76
Satoh T. The canonical lift of an ordinary elliptic curve over a finite field and its point counting. J Raman Math Soc, 2000, 15: 483
Satoh T. On p-adic point counting algorithms for elliptic curves over finite fields. In: Algorithmic number theory, 5th international symposium, ANTS-V, Sydney, 2002. LNCS 2369. 43–66
Fouquet M, Gaudry P, Harley R. An extension of Satoh’s algorithm and its implementation. Raman Math Soc, 2000, 15: 281
Satoh T, Skjernaa B, Taguchi Y. Fast computation of canonical lifts of elliptic curves and its application to point counting. Finite Field Their Appl, 2003, 9: 98–101
Satoh T. On p-adic point counting algorithms for elliptic curves over finite fields. In: Algorithmic number theory, 5th international symposium, ANTS-V, Sydney, 2002. LNCS 2369. 43–66
Gaudry P. A comparison and a combination of SST and AGM algorithms for counting points of elliptic curves in characteristic 2. In: Asiacrypt 2002. LNCS 2501. 311
Dorigo M, Maniezzo V, Colorni A. Introduction to natural algorithms. Rivista Inform, 1994, 24: 179–197
Colorni A, Dorigo M, Maniezzo V. An investigation of some properties of an ant algorithm. In: Proceedings of the Parallel Problem Solving from Nature Conference (PPSN 92). Elsevier Publishing, 1992. 509–520
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, C., Zhang, H. & Liu, L. Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models. Sci. China Inf. Sci. 55, 911–920 (2012). https://doi.org/10.1007/s11432-012-4552-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-012-4552-4