-
Notifications
You must be signed in to change notification settings - Fork 125
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Please support curves over extension Fields in attacks/ecc/smart_attack.py ! #22
Comments
Are you referring to prime power fields (Section 6.2 of that paper)? Do you have an anomalous curve over a prime power (with n > 1) field? |
@jvdsn yes I am refering to prime power. The paper contains a step by step example for such curve. |
Sure, it explains how to perform the attack, but I'd need to have a curve to test it on. It's not trivial to generate anomalous curves over prime power fields if n > 1. |
@jvdsn I may have an imperfect idea. What about a supersingular curves in their extension degree?. For example bn254 has embedding degree 12. Then create 2 points in extension power 12 of and move them to the underlying common suborder/subgroup between the 1 of the curve and the 1 of the underlying finite field. This means only a part of the order is common to both the curve and it s finite field, but it s where the solution is lying. |
What's the specification of bn254? I'm seeing conflicting information. Regardless, bn254 doesn't seem to be anomalous so I'm not sure how Smart's attack could be applied to it. |
@jvdsn yes, the regular curve isn t anomalous but it s degree 12 extension field is partially anomalous. See https://neuromancer.sk/std/bn/bn254 for it s definition. Don t hesitate to ask me anything else. |
Let’s have the following curve
and determine the discrete logarithm between those 2 points
Given the prime |
@ytrezq have you tried executing that code? The line |
It depends on the SageMath version. Please try |
Good day. Does it work for secp256k1 ? Thank you |
@Hurd8x secp256k1 is a secure prime curve which means no effective attack is known if used correctly. However, feel free to explore adapting https://www.iacr.org/archive/pkc2016/96140156/96140156.pdf to the existing inneficient index calculus methods for prime curves you can find on https://scholar.google.com. Or find a way to apply Pohlig Hellman to the method described in https://eprint.iacr.org/2024/1321 since order−1 has small factors in the case of secp256k1. You may acheive a research breakthrough. |
Thank you. |
Added in ff1b5b7. I can't promise it'll be particularly fast but it works in polynomial time. |
Does it works with my example curve here? |
No, it won't, because your curve is not anomalous |
It’s perfectly possible to use Nigel’s Smart algorithm for anomalous curves over extension fields. The problem is I failed to understand this paper myself enough to implement the variant that works in extension fields.
The text was updated successfully, but these errors were encountered: