Authors :
Pagilla Manohar Reddy
Volume/Issue :
Volume 8 - 2023, Issue 5 - May
Google Scholar :
https://bit.ly/3TmGbDi
Scribd :
https://tinyurl.com/mryecdhx
DOI :
https://doi.org/10.5281/zenodo.8093123
Abstract :
This paper presents a summary of the various
attacks that have been discovered on the implementation
of Elliptic Curve Cryptography (ECC) in SageMath, a
widely used open-source mathematics software. ECC is a
popular method for providing secure communication
and is used in a variety of applications, such as secure
key exchange, digital signatures, and more. However, the
implementation of ECC in real life has been found to
have several vulnerabilities that could potentially be
exploited by attackers. This paper will look at the
various attacks that have been found and how they affect
the safety of ECC-based systems.
Keywords :
Discrete Log Problem, Elliptic Curve, Cryptography, Pohlig Hellman, Singular Curve, Smart Attack, P-Adic, Hensel Lifting, Weil Pairing, Tate Pairing, Frey-Rück Attack, Supersingular Curves, MOV Attack, ECDLP, Lattice, Nonce, Digital Signatures.
This paper presents a summary of the various
attacks that have been discovered on the implementation
of Elliptic Curve Cryptography (ECC) in SageMath, a
widely used open-source mathematics software. ECC is a
popular method for providing secure communication
and is used in a variety of applications, such as secure
key exchange, digital signatures, and more. However, the
implementation of ECC in real life has been found to
have several vulnerabilities that could potentially be
exploited by attackers. This paper will look at the
various attacks that have been found and how they affect
the safety of ECC-based systems.
Keywords :
Discrete Log Problem, Elliptic Curve, Cryptography, Pohlig Hellman, Singular Curve, Smart Attack, P-Adic, Hensel Lifting, Weil Pairing, Tate Pairing, Frey-Rück Attack, Supersingular Curves, MOV Attack, ECDLP, Lattice, Nonce, Digital Signatures.