[Resource Topic] 2024/1298: Point (de)compression for elliptic curves over highly $2$-adic finite fields

Welcome to the resource topic for 2024/1298

Title:
Point (de)compression for elliptic curves over highly 2-adic finite fields

Authors: Dmitrii Koshelev

Abstract:

This article addresses the issue of efficient and safe (de)compression of \mathbb{F}_{\!q}-points on an elliptic curve E over a highly 2-adic finite field \mathbb{F}_{\!q} of characteristic 5 or greater. The given issue was overlooked by cryptography experts, probably because, until recently, such fields were not in trend. Therefore, there was no difficulty (with rare exceptions) in finding a square \mathbb{F}_{\!q}-root. However, in our days, fields with large 2-adicities have gained particular popularity in the ZK (zero-knowledge) community, despite the fact that \sqrt{\cdot} \in \mathbb{F}_{\!q} should be computed via more sophisticated square-root algorithms such as (Cipolla-Lehmer-)Müller’s one. The article explains why the classical x-coordinate (de)compression method based on Müller’s algorithm often contains Achilles’ heel to successfully perform a novel fault attack, which also fits the definition of a (D)DoS attack. In a nutshell, the trouble stems from the non-deterministic initialization of Müller’s algorithm.

Moreover, the article suggests a countermeasure, namely an alternative (still simple) (de)compression method that completely prevents the discovered attack whenever the curve E/\mathbb{F}_{\!q} is of even order. In particular, all twisted Edwards (i.e., Montgomery) curves are relevant. The decompression stage of the new method equally suffers from one square-root extraction in \mathbb{F}_{\!q}. But the corresponding quadratic residue is inherently equipped with additional information, providing an opportunity to launch Müller’s algorithm immediately from its main deterministic part. In turn, the compression stage of the new method remains (almost) free as well as for the x-coordinate method.

ePrint: https://eprint.iacr.org/2024/1298

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .