At 03:28 PM 4/17/00 -0400, Perry E. Metzger wrote:
>
>Anyone know anything about this?

Hi Perry,

        This brief compilation might help.  This has been an impressive
achievement.

        The comments of Harley and Morain in the InRIA press release, below,
are striking, given Certicom's historic committment to particular (as
opposed to random) Elliptic Curves.  Other vendors (e.g., my friends at RSA)
sell ECC with random Elliptic Curves only, and have long argued that ECC
with particular curves is an unnecessarily risk.  Individual critics like
Len Adleman have been even more pointed in their remarks.
        
        Surete,
                        _Vin

---------------------------------

        From the Elliptic Curve Discrete Logrithm (ECDL) Project webpage:

<http://cristal.inria.fr/~harley/ecdl/>

        The biggest public-key crypto crack ever has just finished! Certicom
have confirmed that the solution is correct.

        There is press coverage by Slashdot, National Post, ZDNet, Impress
(Japanese), Developer.com, Yahoo, Crypto-News (French), Punto Informatico
 (Italian).  [Links off the ECDL Project Website]  More soon!

--------------------------------

A useful fact-sheet.
<http://cristal.inria.fr/~harley/ecdl7/factsheet.html>
--------------------------------

 A technical FAQ. 
<http://cristal.inria.fr/~harley/ecdl7/FAQ.html>>

Index

1. Why is this interesting? Is it all about cracking a code?
2. What is a discrete logarithm?
3. Remind me what a finite group is.
4. What is an elliptic curve and what is the group of points on it?
5. What is a finite field?
6. What is the ECC2K-108 problem?
7. What algorithm can we use to solve ECDL problems like ECC2K-108?
8. What are the iterations in "iterations per second"?
9. What are distinguished points?
10. What are the initial and current expectations?
11. How hard is the ECC2K-108 problem anyway?
12. How can I participate?

------------------------------------------------------------

>From the 4K Associates Press Release <http://www.4K-Associates.com/Press.html>

PARIS -- 13th April 2000 -- Irish mathematician Robert Harley and three
colleagues at INRIA, the French National Institute for Research in Computer
Science and Control, announced the solution to the most difficult public key
cryptographic challenge ever solved after a huge calculation on close to
10000 computers throughout the Internet. The challenge, called ECC2K-108,
was set by Canadian cryptographic company Certicom in 1997 to encourage
researchers to test the security of cryptography based on elliptic curves. 

   This extraordinary achievement demonstrates the high level of security
that ECC (elliptic-curve cryptography) can offer with much shorter keys than
RSA. It also highlights the relative weakness of some curves with special
properties and confirms that for optimal security one should pick random
curves with no special characteristics.

<snip>
----------------------------------------

>From the InRIA press release at:
http://www.inria.fr/Presse/pre67-eng.html

<snip>

        Arjen Lenstra, vice president at Citibank's Corporate Technology
Office in
 New York and a participant in the project, noted "The amount of computation
 we did is more than what is needed to crack a secret-key system like DES and
 enough to crack a public-key system like RSA of at least 600 bits". 

        Harley remarked "Even so, it was only about one tenth of what should 
normally be required for a 109-bit curve. That's because Certicom chose a 
particular curve with  some useful properties but we used those same 
properties to speed up our algorithm". 

        He went on to say "This underlines the danger in adopting particular 
curves and the need to pick random ones with no special characteristics. I'm 
concerned about Koblitz curves and complex-multiplication curves, which 
some  people advocate using in order to avoid the point-counting problem".

        François Morain, Professor of Computer Science at École Polytechnique, 
explained:

        "To use a curve for ECC one first has to calculate the number of
points on it,
 which is quite a difficult task. To improve security one should use arbitrary 
curves picked at random and change them frequently, but currently most 
cryptosystems use fixed curves chosen to have particular properties which 
make it easy to compute the cardinality. These very properties could one day 
endanger them, as happened with super-singular curves. There have been 
dramatic improvements in point-counting algorithms and good 
implementations are now becoming available. Recent progress should soon 
undermine any remaining argument in favour of special curves". 

<snip>
----------------------------------------

>From the Cericom Press Release at:
http://www.certicom.com/news/00/apr1700.html

        Hayward, Calif., April 17, 2000 - Dr. Scott Vanstone, Chief
Cryptographer 
for Certicom Corp., is pleased to announce that a team of researchers led by 
Robert Harley, Damien Doligez, Daniel de Rauglaudre and Xavier Leroy of 
INRIA (France) have solved Certicom's ECC2K-108 Challenge. For this 
achievement, Certicom is pleased to award them a cash prize of $10,000.

<snip>

        The method Harley's team used for solving ECC2K-108 is well known, 
having been  introduced independently by Certicom researchers and Harley's 
team in 1998. Although the effort therefore provides no fundamental 
advances, it is nonetheless an impressive computational achievement that 
demonstrates the strength of distributed computer networks. 

<snip>

        Harley's team's effort also supports Certicom's recommendation that
keys of at least 160 bit ECC encryption should be deployed in practice.
Solving a 163-bit ECC challenge is estimated to require about 100 million
times the work expended to solve  the 108-bit challenge.
<snip>
-------------------------------------------------------

 The ECC2K-108 Timeline:

April 4th:
- Solved! We got the matching points. 

March 22nd:
- N.A.P.L.M. virtual pilots merged with the INRIA team - competition is
heating up at the top! 

March 17th:
- St. Patrick's day: join us for a virtual pint! 

March 9th:
- We passed the 50% chance-of-having-finished mark last night. There's no
sign of matching points just yet though...

February 26th:
- Version 1.1.1 of the 32-bit code is out. Main difference: it's slightly
faster. 

February 21st:
- HTTP connections with our server failed briefly this weekend. Some people
may have points that were not sent.
Grep your ecdl.log file for "send by hand". See here for details. 

February 16th:
- Apache is going from strength to strength. Read all about it at the
Netcraft Web Server Survey. 

January 16th:
- Distributed.net just announced that they found the CS-Cipher key.
Congratulations, guys! 

January 11th:
- There are now more than 1000 people participating. We have found 300000
points using over 3500 machines! 

January 1st:
- Happy new year to everybody!
- OK, so there was no Y2K disaster. Now let's switch those machines back on
and get the daily rate back up again... 

December 31st, midday:
- Happy new year to ECDL-ers in New Zealand!
- Let's see what this Y2K thingie does to our statistics. Not the "bug" of
course, but people turning off machines to
"solve" it. 

December 25th:
- We have more than 100000 points already.
- Merry Christmas everybody! 

December 21st:
- Passed 5% and we're accelerating fast!
- Watch out Debian: here comes No Team Yet, the team of people who aren't in
any team. =:-) 

December 13th:
- Version 1.1.0 ready for the big time.
- We now need as much publicity as we can get.
- If you are reading this and can do something about it, then please help! 

December 10th:
- Windows port with nice installer. 

December 7th:
- HTTP mode added. 

December 3rd:
- Version 1.0.0 announced on ecdl-announce. 

December 1st:
- Call for testers of version 0.99.0. 


Reply via email to