2018
DOI: 10.3934/amc.2018044
|View full text |Cite
|
Sign up to set email alerts
|

Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields

Abstract: Since 2013 there have been several developments in algorithms for computing discrete logarithms in small-characteristic finite fields, culminating in a quasi-polynomial algorithm. In this paper, we report on our successful computation of discrete logarithms in the cryptographically-interesting characteristic-three finite field F 3 6•509 using these new algorithms; prior to 2013, it was believed that this field enjoyed a security level of 128 bits. We also show that a recent idea of Guillevic can be used to com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 28 publications
0
10
0
Order By: Relevance
“…The case of characteristic three finite fields, which held a lot of promise for pairing based cryptography, faired not much better. In the period from 2010 to 2016 the record advanced from a 676-bit field, up to 4841 [1].…”
Section: Pairing Based Cryptographymentioning
confidence: 99%
“…The case of characteristic three finite fields, which held a lot of promise for pairing based cryptography, faired not much better. In the period from 2010 to 2016 the record advanced from a 676-bit field, up to 4841 [1].…”
Section: Pairing Based Cryptographymentioning
confidence: 99%
“…Remark 4.1. As was pointed out to us by F. Rodríguez-Henríquez [56,3], the elements of the form x i R(x) where R itself is of degree ≤ n 2 − d/n 1 are evenly interesting because the discrete logarithm of x i can be deduced from the discrete logarithm of x, which is known after linear algebra.…”
Section: Application To Small Characteristic Finite Fields and Cryptmentioning
confidence: 99%
“…Remark 4.3. Other improvements are possible [56,3], for instance computing F p gcd(n 1 ,d) -linear combinations over a small number of rows corresponding to polynomials of almost the same degree. The resulting polynomial will have degree increased by one or two, which does not significantly affect its B 1 -smoothness probability in practice for cryptographic sizes.…”
Section: Application To Small Characteristic Finite Fields and Cryptmentioning
confidence: 99%
See 1 more Smart Citation
“…However in certain cases this is not possible, so that efficient symmetric pairings are still desired. The earliest "fast" symmetric pairings are now completely broken since they used supersingular curves over fields of characteristic 2 or 3: the target group is then a sugroup of F 2 4n or F 3 6m , and the quasi-polynomial-time algorithm [6] is particularly devastating [20,1]. Since this algorithm does not apply to large characteristic, three constructions of supersingular curves survived.…”
Section: Pairing-friendly Curves Of Small Embedding Degreementioning
confidence: 99%