Ñîâðåìåííûå èíôîðìàöèîííûå òåõíîëîãèè/4. Èíôîðìàöèîííàÿ áåçîïàñíîñòü

 

Serdyukov Sergey D.
Novosibirsk State University, Russia
Modern Cryptography:  Comparative Analysis of Asymmetric Cryptosystems Elliptical Curve Cryptography and RSA,

Their Advantages and Disadvantages

 

In today's world there is a pointed question about computer security due to the rapid growth of networking and the Internet. Cryptography is one of the main tools in the field of information security. However it has its own problems like any other area.

Four experts on computer security Alex Stamos, Tom Ritter, Thomas Ptacek and Javed Samuel made a disquieting statement during the summer computer security conference Black Hat USA 2013. They said that existing cryptosystems are in dangerous, because of mathematical problems’ solving progress. Therefore we have to abandon existing SSL-certificates in favor of modern cryptographic systems.

There was a lot of cyber-attack this year such as BEAST, CRIME, and Lucky13. It shows us a need in improvement of cryptographic schemes. The industry must be able to anticipate the future types of attacks before they occur, but there are many factors that impede progress. The inefficiency of crypto-ecosystem between suppliers of cryptographic tools, suppliers of certificates and browser vendors ensure the preservation of the current state of affairs. In addition, it is very difficult to move at a rapid pace of development of modern science for industry participants.

Asymmetric cryptosystems are based on two keys: first one is needed to encrypt data; second one is needed to decrypt data. It is possible because of properties of one-way functions. It is assumed that some of the mathematical operation is quite complex and can be implemented in a time growing exponentially with a linear increase in the dimension of the problem. However the existence of such functions is an unproven hypothesis. Their existence proves that complexity classes P and NP are not equal. Modern asymmetric cryptography is based on assumption that one-way functions are exist [1].

There were obtained algorithms for discrete logarithm. In fact these algorithms are of limited use. And at this moment there are not ways to use it in practical cryptography. There is a possibility that in the future there will be a polynomial solution of this problem, which would mean collapse of existing cryptography. This is indicated by the publication of the French scientist Antoine Joux, who published two articles which suggest that such a solution can be found soon. Joux applied the known techniques that have not been used for the solution of this problem. Collapse might occur soon, while alternative and more sophisticated systems are not widely spread.

The most common asymmetric algorithm – RSA – relies on the complexity of two problems: integer factorization and discrete logarithm. Modern mathematics does not have simple polynomial solutions, but quick progress in this area over the last six months causes fear after the decades of research.

The attacks on the discrete logarithm and integer factorization in RSA follow almost the same steps in terms of the polynomial selection, sifting and linear algebra. The fourth step (the calculation of square roots) is very fast, which is very dangerous for the discrete logarithm problem.

It was offered to use cryptography based on elliptic curves over finite fields (Elliptical curve cryptography). Elliptical curve cryptography is similar to other asymmetric algorithms: there is an assumption about the complexity of the mathematical problem, in this case – the discrete logarithm in the group of points on elliptic curves. In contrast to the relatively similar problems integer factorization and discrete logarithm, the positive result in one of them does not threaten the elliptical curve cryptography [1].

On the other hand there are certain difficulties in the translation to Elliptical curve cryptography. Much of the technology is patented by BlackBerry and patent issues led some manufacturers to give up their support. Protocols which use elliptical curve cryptography are not supported widely enough. Certification centers don't provide certificates of elliptical curve cryptography.

Advantages of elliptical curve cryptography:

1)           Much shorter key length compared to the “classical” asymmetric cryptography.

2)           The speed of the algorithm based on elliptical curve cryptography is much higher than the “classical” ones. This is explained both size of field and use binary finite field’s structure which is convenient to computer.

3)           Asymmetric cryptography algorithms on elliptic curves can be used in smart cards and other devices with limited computing resources due to the small length of the key and high-speed operation.

All advantages of elliptical curve cryptography follow from one particular fact – the shorter key length.

Disadvantages of elliptical curve cryptography:

1)           There are not sub-exponential algorithms for discrete logarithm on elliptical curve. However if such algorithms will appear, it will be the collapse of elliptical cryptosystems.

2)           Elliptical curve cryptography is very complex and includes set of subtlety. During the mass transition to elliptic cryptography there will be a lot of bugs and vulnerability, which are could be used by malefactors.

Based on the above analysis, we can conclude that the mass transition to an elliptical cryptography is not necessary. Today it is enough to use the RSA. Progress in solving mathematical problems is, but it is not too dangerous to the existing cryptosystems as it was told by experts. However it would be great to start support elliptical cryptography now, because there is a risk and we have to be ready to make the transition without significant problems at every moment.

 

Bibliography:

1. Applied Cryptography. Second Edition. Bruce Schneier. John Wiley & Sons, 1996. - 784 pages.