RUS  ENG
Full version
JOURNALS // Moscow Mathematical Journal // Archive

Mosc. Math. J., 2002 Volume 2, Number 4, Pages 693–715 (Mi mmj69)

This article is cited in 7 papers

Good and bad uses of elliptic curves in cryptography

N. I. Koblitz

University of Washington

Abstract: In the first part of this article I describe the construction of cryptosystems using elliptic curves, discuss the Elliptic Curve Discrete Logarithm Problem (upon which the security of all elliptic curve cryptosystems rests), and survey the different types of elliptic curves that can be chosen for cryptographic applications. In the second part I describe three unsuccessful approaches to breaking various cryptosystems by means of liftings to global elliptic curves. I explain how the failure of these attacks is caused by fundamental properties of the global curves.

Key words and phrases: Public key cryptography, elliptic curve cryptography, discrete logarithm, digital signature, global elliptic curve, index calculus, canonical height, torsion group, uniform boundedness.

MSC: Primary 14G50, 11G05, 94A60; Secondary 11T71, 14H52

Received: February 22, 2002

Language: English

DOI: 10.17323/1609-4514-2002-2-4-693-715



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024