RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Joint RISC/Intercity Seminar on Computational Number-Theory in Connection with Cryptography
Date:October 19
Location:CWI, Room Z009
Schedule: 
12:00-13:00Ronald van Luijk (Simon Fraser University, Canada):
Explicit twisting of Jacobians of dimension 2
Abstract: In order to bound the rank of the group of rational points A(k) on an abelian variety A over a number field k, one often does a 2-descent to bound the order of the finite group A(k)/2A(k). This group injects into H^1(k,A[2]), where A[2] denotes the group of 2-torsion points. The elements of this galois cohomological group correspond to certain twists of A, which are varieties over k that become isomorphic to A over the algebraic closure of k. Such a twist is in the image of A(k)/2A(k) if and only if it contains a rational point. In this talk I will first explain how twists correspond to cocyles. then I will show how to find explicit equations of these twists as the intersection of 72 quadrics in P^15 in the case that A is the Jacobian of a curve of genus 2.
14:00-15:00Alexander May (Bochum University, Germany):
Using LLL-Reduction for Solving RSA and Factorization Problems: A survey
Abstract: This talk addresses the problem of inverting the RSA function and the problem of factorizing integers. We relax these problems in several ways and show that the relaxations lead to polynomial time solvable problems. In this approach, we model the relaxed problems as polynomial equations which have roots of small size. The roots are then found by a method originally introduced by D. Coppersmith in 1996, which in turn is based on the famous LLL lattice reduction algorithm.
We also present a novel application for RSA with so-called small CRT exponents. Namely, we show that the factorization of an RSA modulus N=pq can be found in polynomial time provided that RSA is used with a secret exponent d such that both d (mod p-1) and d (mod q-1) are smaller than N^0.073. The existence of such a polynomial time attack answers a long-standing open problem by Wiener.
15:15-16:15David Freeman (Berkeley, CA, USA):
Constructing abelian varieties for pairing-based cryptography
Abstract: In recent years, the Weil and Tate pairings on abelian varieties over finite fields have been used to construct a vast number of new and useful cryptosystems. The abelian varieties used in these systems must have small embedding degree with respect to a large prime-order subgroup. Such ``pairing-friendly'' abelian varieties are rare and thus require specific constructions.
In this talk we describe our two recent contributions to the catalogue of pairing-friendly abelian varieties: ordinary elliptic curves of prime order with embedding degree 10, and ordinary abelian surfaces over $\mathbb{F}_q$ having arbitrary embedding degree with respect to a prime subgroup of order roughly $q^{1/4}$. Both results require finding curves with complex multiplication by a specified CM field; making this step feasible while maintaining the pairing-friendly property is the difficult part of such constructions.
0.01165s c