On the Use of Weber Polynomials in Elliptic Curve Cryptography

In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Complex Multiplication method which typically uses the roots of Hilbert or Weber polynomials. The former generate the EC directly, but have high computational demands, while the latter are faster to construct but they do not lead, directly, to the desired EC. In this paper we present in a simple and unifying manner a complete set of transformations of the roots of a Weber polynomial to the roots of its corresponding Hilbert polynomial for all discriminant values on which they are defined. Moreover, we prove a theoretical estimate of the precision required for the computation of Weber polynomials. Finally, we experimentally assess the computational efficiency of the Weber polynomials along with their precision requirements for various discriminant values and compare the results with the theoretical estimates. Our experimental results may be used as a guide for the selection of the most efficient curves in applications residing in resource limited devices such as smart cards that support secure and efficient Public Key Infrastructure (PKI) services.

[1]  Reinhard Schertz,et al.  Weber's class invariants revisited , 2002 .

[2]  L. G. Lidia,et al.  A library for computational number theory , 1997 .

[3]  E. Kaltofen,et al.  Explicit Construction of the Hilbert Class Fields of Imaginary Quadratic Fields by Integer Lattice Reduction , 1991 .

[4]  Sachar Paulus,et al.  On the Generation of Cryptographically Strong Elliptic Curves , 1997 .

[5]  T. Valente A distributed approach to proving large numbers prime , 1992 .

[6]  E. T. An Introduction to the Theory of Numbers , 1946, Nature.

[7]  Horst G. Zimmer,et al.  Constructing elliptic curves with given group order over large finite fields , 1994, ANTS.

[8]  E. Wright,et al.  An Introduction to the Theory of Numbers , 1939 .

[9]  Nigel P. Smart,et al.  Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .

[10]  Christos D. Zaroliagis,et al.  On the Efficient Generation of Elliptic Curves over Prime Fields , 2002, CHES.

[11]  Erkay Savas,et al.  Generating Elliptic Curves of Prime Order , 2001, CHES.

[12]  Christof Paar,et al.  Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.

[13]  Jeffrey Shallit,et al.  Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.

[14]  Harald Baier,et al.  Efficient Construction of Cryptographically Strong Elliptic Curves , 2000, INDOCRYPT.

[15]  Andreas Enge,et al.  Comparing Invariants for Class Fields of Imaginary Quadratic Fields , 2002, ANTS.

[16]  Bimal Roy,et al.  Progress in Cryptology —INDOCRYPT 2000 , 2002, Lecture Notes in Computer Science.

[17]  Hans Eberle,et al.  Generic implementations of elliptic curve cryptography using partial reduction , 2002, CCS '02.

[18]  Erich Kaltofen,et al.  An improved Las Vegas primality test , 1989, ISSAC '89.

[19]  F. Morain,et al.  Computing the cardinality of CM elliptic curves using torsion points , 2002, math/0210173.

[20]  Harald Baier,et al.  Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography , 2002 .

[21]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[22]  David Naccache,et al.  Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .

[23]  Vom Fachbereich Informatik Ecient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography , 2002 .