4

I've previously asked questions on BN pairing parameters. Here's one more.

In the BN construction, one is working in a subgroup of a curve over an extension field $\mathbf{F}_{p^{12}}$ for some prime $p$. Now, in the scheme I'm looking at, they suggest selecting parameters so that $p$ will end up being a $256$-bit prime. Hence, the total field size will be around $2^{3072}$. The article claims this scheme has security equivalent to RSA 3072-bits.

Now, one can optimize the BN implementation by doing some of the calculations on the "sextic twist" since it turns out that there exists another curve over $\mathbf{F}_{p^2}$ which has a subgroup isomorphic to the subgroup of the original curve over the full field. I'm wondering, couldn't an attacker also use this to his advantage and to optimize his attack?

After all, the field now only has $p^2$ elements – so I'm wondering of the security really is still $p^{12}$ compared to RSA… or stated differently, why bother with such a high embedding degree when there's an isomorphic group over a much smaller field extension? Or is the attack that implies the equivalence to RSA 3072 bit not possible on the sextic twist, and that's why the full security is retained?

Patriot
  • 3,162
  • 3
  • 20
  • 66
Morty
  • 639
  • 4
  • 13

1 Answers1

3

A current conservative estimate of the security level of a BN curve with an extension field size of 3072 bits, taking into account the Kim-Barbulescu attacks, is $2^{110}$. See the paper http://eprint.iacr.org/2016/1102.pdf and the discussion of it at https://github.com/zcash/zcash/issues/714#issuecomment-263007229 . An earlier discussion of these attacks is https://ellipticnews.wordpress.com/2016/05/02/kim-barbulescu-variant-of-the-number-field-sieve-to-compute-discrete-logarithms-in-finite-fields/ .

On the specific question about the sextic twist, $\mathbb{G}_2$ is still an elliptic curve group, not the multiplicative group of a finite field. So index calculus attacks, including variants of TNFS based on Kim and Barbulescu's work, do not apply directly to it. [Edit: added "directly", since that was the gist of the question. You can of course attack $\mathbb{G}_2$ via the extension, but the $2^{110}$ cost estimate takes that into account.]

Note: When performing square-root discrete logarithm attacks such as Pollard rho directly on $\mathbb{G}_1$ or $\mathbb{G}_2$, there is a slight speed-up due to automorphisms of the curve. For BN pairings there are automorphism groups of order 6. A conservative estimate of the available improvement to Pollard rho for a group of prime order $q$ in that case is that the attack cost is $\sqrt{\frac{\pi q}{12}}$, as compared to $\sqrt{\frac{\pi q}{4}}$ using only the negation map. That is, the maximum speed-up is only a factor of $\sqrt{3} ≈ 1.732$ for a given success probability.