Font Size: a A A

New applications of elliptic curves and function fields in cryptography

Posted on:1998-09-24Degree:Ph.DType:Thesis
University:University of Waterloo (Canada)Candidate:Zuccherato, Robert JosephFull Text:PDF
GTID:2468390014975493Subject:Mathematics
Abstract/Summary:
Public key cryptography based on elliptic curves over finite fields was proposed by Miller and Koblitz in 1985. Elliptic curves over finite fields have been used to implement the Diffie-Hellman key passing scheme and the ElGamal, Schnorr and NIST signature schemes. Elliptic curves have also been used over the ring ;The continued fraction expansion and infrastructure for quadratic congruence function fields of odd characteristic have been well studied. Recently, these ideas have even been used to produce cryptosystems. Much less is known concerning the continued fraction expansion and infrastructure for quadratic function fields of even characteristic. In the second part of this thesis we will explore these ideas, and show that the situation is very similar to the odd characteristic case. This exploration will result in a method for computing the regulator for quadratic function fields of characteristic 2. We will also be able to show that cryptosystems proposed for the infrastructure of function fields of odd characteristic can be implemented in even characteristic and give a possible attack. Most importantly we will be able to show that the elliptic curve discrete logarithm problem is equivalent to a discrete logarithm problem in the infrastructure of certain quadratic function fields. This is a modification of a result by Stein for fields of odd characteristic.
Keywords/Search Tags:Fields, Elliptic curves, Odd characteristic, Continued fraction expansion, Discrete logarithm problem
Related items