 is an elliptic curve over
 is an elliptic curve over 
 and
 and 
 .  Given a multiple
.  Given a multiple  of
 of  , the elliptic curve
    discrete log problem is to find
, the elliptic curve
    discrete log problem is to find 
 such that
 such that  .
.
For example, let  be the elliptic curve given by
 be the elliptic curve given by 
 over the field
over the field 
 .  We have
.  We have
 
If
 and
 and  , then
, then  , so
, so  is a solution to the discrete logarithm problem.
is a solution to the discrete logarithm problem.
If 
 has order
 has order  or
 or  or is a product of
reasonably small primes, then there are some methods for attacking the
discrete log problem on
 or is a product of
reasonably small primes, then there are some methods for attacking the
discrete log problem on  , which are beyond the scope of this book.
It is thus important to be able to compute
, which are beyond the scope of this book.
It is thus important to be able to compute 
 efficiently, in order to verify that the elliptic curve one wishes to
use for a cryptosystem doesn't have any obvious vulnerabilities.  The
naive algorithm to compute
efficiently, in order to verify that the elliptic curve one wishes to
use for a cryptosystem doesn't have any obvious vulnerabilities.  The
naive algorithm to compute 
 is to try each value of
 is to try each value of
 and count how often
 and count how often  is a perfect square
mod
 is a perfect square
mod  , but this is of no use when
, but this is of no use when  is large enough to be useful
for cryptography.  Fortunately, there is an algorithm due to Schoof,
Elkies, and Atkin for computing
 is large enough to be useful
for cryptography.  Fortunately, there is an algorithm due to Schoof,
Elkies, and Atkin for computing 
 efficiently
(polynomial time in the number of digits of
 efficiently
(polynomial time in the number of digits of  ), but this
algorithm is beyond the scope of this book.
), but this
algorithm is beyond the scope of this book.
In Section 3.1.1 we discussed the discrete log problem in
 .  There are general attacks called ``index calculus
attacks'' on the discrete log problem in
.  There are general attacks called ``index calculus
attacks'' on the discrete log problem in 
 that are slow,
but still faster than the known algorithms for solving the discrete
log in a ``general'' group (one with no extra structure).  For most
elliptic curves, there is no known analogue of index calculus attacks
on the discrete log problem.  At present it appears that given
 that are slow,
but still faster than the known algorithms for solving the discrete
log in a ``general'' group (one with no extra structure).  For most
elliptic curves, there is no known analogue of index calculus attacks
on the discrete log problem.  At present it appears that given  the
discrete log problem in
 the
discrete log problem in 
 is much harder than the discrete
log problem in the multiplicative group
 is much harder than the discrete
log problem in the multiplicative group 
 .  This suggests
that by using an elliptic curve-based cryptosystem instead of one
based on
.  This suggests
that by using an elliptic curve-based cryptosystem instead of one
based on 
 one gets equivalent security with much smaller
numbers, which is one reason why building cryptosystems using elliptic
curves is attractive to some cryptographers.  For example, Certicom, 
a company that strongly supports elliptic curve cryptography, claims:
 one gets equivalent security with much smaller
numbers, which is one reason why building cryptosystems using elliptic
curves is attractive to some cryptographers.  For example, Certicom, 
a company that strongly supports elliptic curve cryptography, claims:
``[Elliptic curve crypto] devices require less storage, less power, less memory, and less bandwidth than other systems. This allows you to implement cryptography in platforms that are constrained, such as wireless devices, handheld computers, smart cards, and thin-clients. It also provides a big win in situations where efficiency is important.''
For an up-to-date list of elliptic curve discrete log challenge
problems that Certicom sponsors, see [#!certicom:challenge!#].  For
example, in April 2004 a specific cryptosystem was cracked that was
based on an elliptic curve over 
 , where
, where  has
 has  bits.
The first unsolved challenge problem involves an elliptic curve over
 bits.
The first unsolved challenge problem involves an elliptic curve over
 , where
, where  has
 has  bits, and the next challenge after
that is one in which
 bits, and the next challenge after
that is one in which  has
 has  bits.  Certicom claims at
[#!certicom:challenge!#] that the
 bits.  Certicom claims at
[#!certicom:challenge!#] that the  -bit challenge problem is
computationally infeasible.
-bit challenge problem is
computationally infeasible.
William 2007-06-01