Asiacrypt 2016

Asiacrypt was held in Hanoi this year and was extremely well organised. There were quite a few papers about elliptic curves, and related areas such as post-quantum cryptography. It is worth noting that the talks were all streamed online and should eventually be able to be viewed on the IACR youtube channel.

The three invited talks were:

  • Nadia Heninger “The Reality of Cryptographic Deployments on the Internet”.

    Nadia described several bad implementations of finite field Diffie-Hellman key exchange, surveying work of several recent papers by many authors. She commented that finite field Diffie-Hellman is prevalent in practice partly due to concerns that elliptic curves might have US government trapdoors.

  • Hoeteck Wee “Advances in Functional Encryption”

    Hoeteck gave a wonderfully clear overview of functional encryption.

  • Neal Koblitz “Cryptography in Vietnam in the French and American Wars”

    Neal gave a fascinating historical talk, based on recent research by himself, the general chair Hieu Phan and others, and drawing on historical resources from museums in Hanoi and the writings of historians and former government employees. Neal emphasized the mathematical and cryptographical ingenuity of the Vietnamese people, as well as powerfully evoking the horrors of war and the heroism of certain individuals (both Vietnamese and American).

The best paper award went to Ilaria Chillotti, Nicolas Gama, Mariya Georgieva and Malika Izabachène for “Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds”, which shows that homomorphic encryption (in this case the GSW scheme with packed ciphertexts, together with a bunch of clever new ideas) is gradually becoming closer to practicality. Here is a photo of the best paper award authors with the two program chairs (Tsyoshi Takagi on the left and Jung Hee Cheon on the right).

Some papers related to discrete logarithms and elliptic curves included:

  • Palash Sarkar and Shashank Singh “A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm”.

    This work is relevant for assessing the security of pairing based cryptography, more details on this application can be found here.

  • Steven D. Galbraith, Christophe Petit, Barak Shani and Yan Bo Ti “On the Security of Supersingular Isogeny Cryptosystems”

    The paper contains several results about the (potentially post-quantum) isogeny-based key exchange and encryption protocols of De Feo, Jao and Plut.

  • There was an entire session about ABE and IBE, containing papers that use pairings:
    • Nuttapong Attrapadung “Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings”
    • Junqing Gong, Xiaolei Dong, Jie Chen and Zhenfu Cao “Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting”
    • Melissa Chase, Mary Maller and Sarah Meiklejohn “Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions”
    • Shuichi Katsumata and Shota Yamada “Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps”

  • Paz Morillo, Carla Ràfols and Jorge L. Villar “The Kernel Matrix Diffie-Hellman Assumption”

    This talk is about relations between variants of the Diffie-Hellman problem.

  • Ted Chinburg, Brett Hemenway, Nadia Heninger and Zachary Scherr “Cryptographic applications of capacity theory: On the optimality of Coppersmith’s method for univariate polynomials”

    Ted Chinburg delivered a clear and interesting survey of “capacity theory” (a branch of arithmetic geometry/algebraic number theory) that is relevant to the analysis of Coppersmith’s technique for finding small solutions to polynomial equations. The authors hope these ideas will be useful in other contexts in cryptography/cryptanalysis.

Regarding the increased focus on post-quantum crypto there were talks on multivariate crypto (more efficient Multi-quadratic-polynomial signatures), lattices (Vadim Lyubashevsky presented a result about signatures based on ring-SIS in *any* ring and urged the audience to work on a much harder but more interesting problem relating to LWE in any ring) and code-based crypto (an adaptive attack on a decoding algorithm).

The rump session was chaired by me, and was thankfully short. The best and most entertaining talk was given by Pierre Karpman and Jerome Plut. The social activities included a Water Puppet show and a Vietnamese banquet with traditional music.

— Steven Galbraith

Posted in Uncategorized | Leave a comment

New ECDLP record

A tweet today suggests the ECDLP computation started in the Faster discrete logarithms on FPGAs paper by Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe and Ralf Zimmermann may have finally completed. See the below link for the tweet:

UPDATED Sunday December 4: More detailed explanation on NMBRTHRY list.

UPDATED December 30: The eprint paper has been updated.

Posted in Uncategorized | Leave a comment

ECC 2016, İzmir

The 20th Elliptic Curve Cryptography workshop was held in İzmir, Turkey, from the 5th to the 7th of September this year. Many international colleagues unfortunately couldn’t be there this year: you all missed out. The conference was extremely well organized (special shout-out to the excellent Yaşar Geek Squad!), and almost all of the talks are online…  With video!  So rather than me writing about what was said and done, you can go and check it out for yourself.

It’s remarkable that this workshop has been running successfully for 20 years now: elliptic curve cryptography has come a long way.  It was great to be there to celebrate a milestone of sorts:


Happy 20th birthday, ECC Workshop…  (Photo: Peter Stevenhagen)


The famous Geek Squad of Izmir, who made everything happen. (Photo: Gamze Orhon)



Did I mention how well-organised it all was?  Here’s one of the lecture theatres during a break.

–Ben Smith

Posted in Uncategorized | Leave a comment

Twelfth Algorithmic Number Theory Symposium, Kaiserslautern, 2016

The Algorithmic Number Theory Symposium (ANTS-XII) took place at the Technical University of Kaiserslautern from August 29 to September 2, 2016.

Apart from the excellent invited lectures, the most memorable event of the conference was the late-night walk through the forest, illuminated by hand-held flaming torches, from the conference dinner at Bremerhof.

The Selfridge Prize was presented to J. Steffen Müller (Oldenburg) for the paper “Computing canonical heights on elliptic curves in quasi-linear time” by J. Steffen Müller and Michael Stoll.

The published papers are available in the LMS Journal of Computational Mathematics. Sadly this will be the final year that the proceedings appear in this journal, since the journal is being closed down.

There were relatively few papers with major relevance to ECC, but the following papers may be of some interest to readers of this blog:

  • Chris Peikert “Finding Short Generators of Ideals, and Implications for Cryptography“. This was an overview of the work presented in his paper with Cramer, Ducas and Regev.
  • Gary McGuire, Henriette Heer and Oisin Robinson “JKL-ECM: An implementation of ECM using Hessian curves”. The paper was about choosing elliptic curves in Hessian form with large torsion groups for the elliptic curve factoring method.
  • Jung Hee Cheon, Jinhyuck Jeong and Changmin Lee “An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without an encoding of zero”. This paper is another nail in the coffin of multilinear maps.
  • Francois Morain, Charlotte Scribot and Benjamin Smith “Computing cardinalities of Q-curve reductions over finite fields”. This was about a variant of the SEA method that is suitable for counting points on special curves with an endomorphism of a special type. Such curves are suitable for fast implementations of ECC, and so the method in this paper helps to speed up parameter generation when using such curves.
  • Luca Defeo, Jerome Plût, Eric Schost and Cyril Hugounenq “Explicit isogenies in quadratic time in any characteristic”. The paper is about a Couveignes-type method for computing an explicit isogeny between two curves. This is a useful ingredient in point counting algorithms. The new method is appropriate when working in characteristic p that is neither “large” nor “very small”.
  • Jean-François Biasse, Claus Fieker and Michael Jacobson “Fast heuristic algorithms for computing relations in the class group of a quadratic order with applications to isogeny evaluation”. This paper is about the problem of “smoothing” an isogeny by reducing the ideal corresponding to it in the ideal class group of the order. It introduces some nice techniques that had not been used in this context previously.

The rump session contained a number of jokes about Australia and New Zealand. Aurore Guillevic mentioned some recent DLP records (mostly already mentioned on this blog). Rump session slides will be available eventually here.

The 2018 edition of the ANTS conference is expected to take place in Madison, Wisconsin.

— Steven Galbraith

Posted in Uncategorized | Leave a comment

CRYPTO and CHES 2016, Santa Barbara, CA, USA

Like every three years since 2010, CRYPTO and CHES this year were jointly held at the University of California Santa Barbara on the third week of August, and featured the usual chocolate strawberries, beach barbecue and India pale ale.

The scientific programs of both conferences overlapped somewhat (the CRYPTO program ran from Monday through Thursday morning, while CHES ran from Wednesday to Friday with optional tutorials on Tuesday), and CRYPTO now has parallel sessions, so attendees to both conferences effectively had to choose between three parallel tracks. Yet you could probably attend all the talks related to elliptic curve cryptography, as there just weren’t that many.

At CRYPTO, the two most relevant presentations were given in the Algorithmic Number Theory session on Wednesday morning:

  • Taechan Kim presented his paper with Razvan Barbulescu, “Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case”, about which Aurore Guillevic wrote an extensive survey on this blog a few months ago. The paper obtains a better complexity for the discrete logarithm problem in some composite degree extensions of finite fields, and although Taechan spent a good part of his talk trying to downplay the concrete impact, it actually translates to a significant reduction in the security of the most popular pairing-friendly elliptic curves. In particular, after this attack, 256-bit Barreto-Naehrig curves no longer offer 128 bits of security, but perhaps closer to 96 or so.
  • Craig Costello presented his paper with Patrick Longa and Michael Naehrig, “Efficient Algorithms for Supersingular Isogeny Diffie-Hellman”, which uses a number of clever tricks to implement the postquantum-secure isogeny-based key exchange protocol of De Feo, Jao and Plût significantly more efficiently than what previously thought possible. Although SIDH still lags behind other popular postquantum constructions based e.g. on lattices by several orders of magnitude in terms of performance, it uses comparatively short keys, can be combined with classical ECDH very cheaply, and in any case is based on a very different type of security assumption that may look more appealing to the algebraic geometrically inclined.

Other papers related to elliptic curves include:

  • “Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming” by Masayuki Abe, Fumitaka Hoshino and Miyako Ohkubo, which explains how to algorithmically convert pairing-based protocols using symmetric pairings to the asymmetric setting at a minimal overhead using integer linear programming techniques;
  • the CRYPTO best paper, “Breaking the Circuit Size Barrier for Secure Computation Under DDH“ by Elette Boyle, Niv Gilboa and Yuval Ishai, which is not elliptic curve crypto per se, but relies on an interesting observation regarding discrete logarithms. The idea is that if two parties hold a secret sharing of a small value z in the exponent, i.e. g^{z_1} and g^{z_2} with z_2-z_1=z, they can derive from that an additive secret sharing of z itself without any interaction. To do so, they agree on a polynomially dense subset X of distinguished points in the group, and count how many steps it takes to reach an element of X from their respective share. If z is small enough compared to the relative density of X, they should reach the same element of X with good probability, and in that case, if it took x_1 (resp. x_2) steps for the first (resp. second) party, we have g^{z_1+x_1} = g^{z_2+x_2}, hence x_2-x_1 = z_2-z_1 = z: x_1,x_2 is a secret sharing of z obtained without interaction!

At CHES, on the other hand, there were several interesting papers about the implementation of elliptic and hyperelliptic curve cryptography on various platforms.

  • On desktop CPUs: the paper by Thomaz Oliveira, Julio López and Francisco Rodríguez-Henríquez, “Software Implementation of Koblitz Curves over Quadratic Fields”. Usual Koblitz curves are defined over \mathbb{F}_2 and use the fast Frobenius endomorphism (x,y)\mapsto (x^2,y^2) instead of doublings to speed up scalar multiplication. This paper instead investigates curves defined over \mathbb{F}_4 together with the corresponding, slightly less fast Frobenius (x,y)\mapsto (x^4,y^4), and shows that the quadratic extension structure of the corresponding fields yields interesting performance benefits. The authors obtain a constant time scalar multiplication in under 70k cycles on Haswell and 52k cycles on Skylake at the 128-bit security level, which is quite respectable, even though they have to rely on a suboptimal field size of close to 300 bits to find a curve with a sufficiently large prime subgroup.
  • On embedded CPUs: the paper by Leijla Batina, Joost Renes, Peter Schwabe and Benjamin Smith, “µKummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers”. It is well-known that Kummer surfaces support a notion of scalar multiplication, but not point addition directly because it is not compatible with quotienting by [-1]. As a result, they would only be used for protocols like Diffie-Hellman, and not for e.g. signatures, which require point additions. However, Chung, Costello and Smith recently observed that you can simply lift back to the actual Jacobian after carrying out your fast variable base point multiplication on the Kummer, and doing so is likely to be faster than doing everything in a Jacobian, especially if you want constant time arithmetic. This CHES paper is a concrete demonstration of that idea on constrained software platforms (AVR ATmega and ARM Cortex M0), where the authors break earlier speed records for (H)ECC by wide margins.
  • In hardware: the paper by Kimmo Järvinen, Andrea Miele, Reza Azarderakjsh and Patrick Longa, “FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields”. FourQ is a very nice curve introduced by Costello and Longa at last year’s ASIACRYPT, which currently holds essentially all of the speed records on desktop CPUs for constant-time scalar multiplication (both fixed and variable base) by a comfortable margin. This CHES paper implements it on FPGA, and finds that it also performs faster than other implementations over large characteristic fields (although not nearly as fast as comparable binary field designs).

The CHES rump session also featured some annoucements of note, including a concrete complexity estimate by Francisco Rodríguez-Henríquez and his colleagues of the quasilinear attack on discrete logs in the formerly 128-bit secure field \mathbb{F}_{3^{6\cdot 509}} that used to be recommended for pairings (answer: if everybody in the world was working on it 8 hours per day, 1000 \mathbb{F}_{3^6} multiplications per hour, it would only take about 10 months!). The annoucement that personally got me the most excited is an improved implementation result for the binary curve GLS254 on desktop CPUs due to Thomaz Oliveira, Diego Aranha, Julio López and Francisco Rodríguez-Henríquez, who adapted techniques from the quadratic Koblitz paper above to blow up the competition again with that curve: at 48k cycles on Haswell and 38k cycles on Skylake for 128-bit secure scalar multiplication, it is even faster than Kummers and FourQ!

— Mehdi Tibouchi

Posted in Uncategorized | 1 Comment

eprint 2016/704

Nicolas Courtois has recently uploaded to eprint the paper High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem of over 80 pages about ECDLP.

The paper is written in an unusual style. It is a bit like a research notebook, containing sketches of ideas, rather than a polished mathematics paper.

The paper is mainly about the point decomposition problem, which is the fundamental problem behind all recent work on index calculus algorithms (see: these blog
posts). Precisely this problem is: Given a point R and a factor base F write R = P_1 + ... + P_M for P_i \in F.

The standard approach these days is to use summation polynomials: We find solutions x_1,\dots, x_M to the Semaev summation polynomial S_{M+1}( x_1, \dots, x_M, x(R)) = 0 and then compute the corresponding points. Currently these methods have not had any practical impact on the security of elliptic curve cryptography.

The preprint contains several ideas, whose relevance and impact are yet to be fully determined.

One idea is a way to generate a lot of equations without adding too many new variables. Courtois chooses K random elliptic curve points S_1,...,S_K (where K is any natural number) and defines new variables
Z_{i,j} = x( P_i + S_j )
for 1 \le i \le M, 1 \le j \le K.
Courtois then notes that if j_1,...,j_M \in \{1,...,K\} and R = P_1 + ... + P_M then
R + \sum_{i=1}^M S_{j_i} = (P_1 + S_{j_1}) + ... + (P_M + S_{j_M})
Hence we have
S_{M+1} \left( R + \sum_{i=1}^M S_{j_i}, Z_{1,j_1}, ..., Z_{M, j_M} \right) = 0.
There are K^M choices for (j_1,...,j_M), so we get a system of K^M equations in the KM variables Z_{i,j}. On the one hand, we now have a greatly over-determined system, and so it should be easier to solve than traditional systems. On the other hand, the system has too many solutions as the variables Z_{i,j} are unconstrained.

Hence the next problem is to add constraints to the system to reduce the number of solutions. If one can find suitable constraints then one should be able to define a corresponding notion of factor base. Some ideas are sketched in the paper, in particular in Section 18.2, but I have not yet formed an opinion about well these ideas will work. The paper only considers elliptic curves over prime fields \mathbb{F}_p, but similar ideas might be used for curves over other fields.

There are several other ideas in the paper, including some new polynomial equations that might be used to play a similar role to the summation polynomials.

Overall, the paper contains some interesting ideas that are not yet fully developed. Currently the paper does not describe a complete index calculus algorithm and it is difficult for me to determine whether or not the methods are likely to lead to an improvement over existing techniques. No precise complexity statements are made in the paper.

I hope that other researchers will investigate these ideas. I look forward to following the development of work on this topic.

— Steven Galbraith

Posted in Uncategorized | Leave a comment

Upcoming conferences and recent announcements

  • The list of speakers for the ECC 2016 conference is at

    Here are the speakers:

    • Benjamin Smith, “Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes” and “μKummer: efficient hyperelliptic signatures and key exchange on microcontrollers”
    • Cyril Hugounenq, “Explicit isogenies in quadratic time in any characteristic”
    • Daniel Genkin, “ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs” and “ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels” and “CacheBleed: A Timing Attack on OpenSSL Constant Time RSA”
    • Jens Groth, “On the Size of Pairing-based Non-interactive Arguments”
    • Maike Massierer, “Computing L-series of geometrically hyperelliptic curves of genus three”
    • Mehmet Sabır Kiraz, “Pairings and Cloud Security”
    • Pascal Sasdrich, “Implementing Curve25519 for Side-Channel–Protected Elliptic Curve Cryptography”
    • Patrick Longa, “Efficient algorithms for supersingular isogeny Diffie-Hellman”
    • Razvan Barbulescu, “Extended Tower Number Field Sieve: A New Complexity for Medium Prime Case”
    • Sebastian Kochinke, “Computing discrete logarithms with special linear systems”
    • Shashank Singh, “A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm”
    • Shoukat Ali, “A new algorithm for residue multiplication modulo $2^{521}-1$”
    • Tung Chou, “The Simplest Protocol for Oblivious Transfer” and “Sandy2x: new Curve25519 speed records”

    The conference organisers wish to reassure conference attendees that it is safe to come to Turkey for the conference: “The life in Izmir is just as usual: sunny and slow-going. We are preparing for ECC and we would like to serve our guests in the best way we can.”

  • The schedule for the Algorithmic Number Theory conference (ANTS) is at

  • Aurore Guillevic, François Morain and Emmanuel Thomé recently announced a solution to an ECDLP instance on a 170-bit pairing-friendly curve with embedding degree 3.
    In other words, they solved a DLP in a finite field \mathbb{F}_{p^3}^* of size around 510 bits. You can read further details here and here.

  • Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata and Colin Stahlke have reported a new DLP computation using the number field sieve in a 768-bit field \mathbb{F}_{p}^*. The details are here.

— Steven Galbraith

Posted in Uncategorized | Leave a comment