Abstract

Elliptic Curve Factorization Method (ECM) is the general-purpose factoring method used in the digital computer era. It is based on the medium length of the modulus; ECM is an efficient algorithm when the length of modulus is between 40 and 50 digits. In fact, the main costs for each iteration are modular inverse, modular multiplication, modular square and greatest common divisor. However, when compared to modular multiplication and modular square, the costs of modular inverse and greatest common divisor are very high. The aim of this paper is to improve ECM in order to reduce the costs to compute both of modular inverse and greatest common divisor. The proposed method is called Fast Elliptic Curve Factorization Method (F-ECM). For every two adjacent points on the curve, only one modular inverse and one greatest common divisor will be computed. That means it implies that the costs in both of them can be split in half. Furthermore, the length of modulus in the experiment spans from 30 to 65 bits. The experimental results show that F-ECM can finish the task faster than ECM for all cases of the modulus. Furthermore, the computation time is reduced by 30 to 38 percent.

Highlights

  • RSA [1] is one of the most well-known cryptography algorithms in the digital computer era. It is classified as asymmetric key cryptography or public key cryptography [2]. This algorithm which was proposed in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman, can be used to secure secret information transferred via an unsecure channel as well as sign digital signatures

  • The other group is known as general-purpose factoring, and the algorithms are based on the length of the modulus

  • Elliptic Curve Factorization Method (ECM) requires a large number of modular inverses and greatest common divisors, which are known as the expensive costs

Read more

Summary

Introduction

RSA [1] is one of the most well-known cryptography algorithms in the digital computer era It is classified as asymmetric key cryptography or public key cryptography [2]. Assuming that two strong prime factors and 1024 bits of the modulus are selected, none of proposed integer factorization algorithms can break RSA in polynomial time by using the digital computer. ECM requires a large number of modular inverses and greatest common divisors, which are known as the expensive costs. That is, it takes a significant amount of time to finish the task. The proposed method is known as the Fast Elliptic Curve Factorization Method (F-ECM).

Overviews of RSA and ECC
Elliptic Curve Cryptography
Overviews of Integer Factorization Algorithms
Special-Purpose Factoring
General-Purpose Factoring
Overviews of Quantum Computer and Shor’s Factoring
The Proposed Method
Loop Analysis
Experimental Results
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.