Analysis Of Attack Methods Based on Elliptic Curve Discrete Logarithm Problem

Authors

  • Xiao Ni

DOI:

https://doi.org/10.54097/05cst997

Keywords:

elliptic curve cryptography, elliptic curve, discrete logarithm Problem, elliptic curve discrete logarithm problem.

Abstract

With growing public concern about information security issues, cryptography is becoming increasingly essential not only in the military sector, but also in daily life. Numerous cryptographic techniques have been invented during past hundreds of years.  Elliptic Curve Cryptography (ECC) is one of the most modern and efficient cryptography methods. Therefore, research on exploring advantages and disadvantages is necessary in order to make the best use of ECC. This paper aims to briefly introduce Elliptic Curve (EC) and how it can be applied to ECC. Moreover, this paper indicates the mathematical principle Elliptic Curve Discrete Logarithm Problem (ECDLP) behind Elliptic Curve cryptography: how it is different from traditional Discrete Logarithm Problem (DLP) and the difficulty to solve ECDLP which protects ECDLP from various attacks. Most importantly, several potential attacks against ECC such as Exhaustive Search and Pollard’s Rho algorithm are listed and discussed, which lead to reflections on the security issues of ECC and prospects for possible developments in the future.

Downloads

Download data is not yet available.

References

[1] Adeniyi, A. E., Jimoh, R. G., Awotunde, J. (2024). A review on elliptic curve cryptography algorithm for Internet of Things: Categorization, application areas, and security. Application Areas, and Security. DOI: https://doi.org/10.2139/ssrn.4683742

[2] Ahlswede, R. (2016). Elliptic Curve Cryptosystems. In: Ahlswede, A., Althöfer, I., Deppe, C., Tamm, U. (eds) Hiding Data - Selected Topics. Foundations in Signal Processing, Communications and Networking, vol 12. Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-31515-7

[3] Yan, Y. (2022, December). The overview of elliptic curve cryptography (ECC). In Journal of Physics: Conference Series (Vol. 2386, No. 1, p. 012019). IOP Publishing. DOI: https://doi.org/10.1088/1742-6596/2386/1/012019

[4] Hankerson, D., Menezes, A. (2025). Elliptic curve cryptography. In Encyclopedia of Cryptography, Security and Privacy (pp. 783-784). Cham: Springer Nature Switzerland. DOI: https://doi.org/10.1007/978-3-030-71522-9_245

[5] Miller, V. S., Koblitz, N. (1985). As cited in Discrete Logarithm Problem – Cryptographic Pairings Efficiency: DLP Security.

[6] Smith-Tone, D. (2023). NIST Special Publication 800-186: Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters. National Institute of Standards and Technology.

[7] Silverman, J. H. (2009). The arithmetic of elliptic curves (Vol. 106, pp. xx+-513). New York: Springer. DOI: https://doi.org/10.1007/978-0-387-09494-6

[8] Galbraith, S. D., Gaudry, P. (2015). Recent progress on the elliptic curve discrete logarithm problem. IACR Cryptology ePrint Archive, Paper 2015/1022. DOI: https://doi.org/10.1007/s10623-015-0146-7

[9] Jindal, A., Jatain, A., Bajaj, S. B. (2023, October). Method for Solving the ECDLP. In Proceedings of International Conference on Paradigms of Communication, Computing and Data Analytics: PCCDA 2023 (p. 275). Springer Nature. DOI: https://doi.org/10.1007/978-981-99-4626-6_23

[10] Sadkhan, S. B. (2021, February). A Proposed Developments of Pollards Rho Method for Attacking the ECDLP. In 2021 7th International Engineering Conference “Research & Innovation amid Global Pandemic"(IEC) (pp. 151-155). IEEE. DOI: https://doi.org/10.1109/IEC52205.2021.9476119

[11] Josodipuro, M. J., Saputra, K. V. I., Lukas, S. (2022, September). Statistical Analysis of Pollard's Rho Attack on Elliptic Curve Cryptography. In 2022 1st International Conference on Technology Innovation and Its Applications (ICTIIA) (pp. 1-6). IEEE. DOI: https://doi.org/10.1109/ICTIIA54654.2022.9936026

[12] Nickerson, D. (2020). Collision detection and Pollard's rho.

[13] Lv, M., Sun, H., Xin, J., Zheng, N. (2020). Efficient repair analysis algorithm exploration for memory with redundancy and in-memory ECC. IEEE Transactions on Computers, 70(5), 775-788. DOI: https://doi.org/10.1109/TC.2020.2996747

[14] Kang, M., Park, D. (2021). Lightweight Microcontroller with Parallelized ECC-Based Code Memory Protection Unit for Robust Instruction Execution in Smart Sensors. Sensors, 21(16), 5508. DOI: https://doi.org/10.3390/s21165508

[15] Dossou-Yovo, V., Nitaj, A., Togbé, A. (2022, October). Finding Points on Elliptic Curves with Coppersmith’s Method. In International Conference on Algebraic Informatics (pp. 69-80). Cham: Springer International Publishing. DOI: https://doi.org/10.1007/978-3-031-19685-0_6

[16] Katti, J. (2015). Attacks on Elliptic Curve Cryptography Discrete Logarithm Problem (EC-DLP). International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, 3(4), 1–5. DOI: https://doi.org/10.17148/IJIREEICE.2015.3428

Downloads

Published

13-03-2026

Issue

Section

Articles

How to Cite

Ni, X. (2026). Analysis Of Attack Methods Based on Elliptic Curve Discrete Logarithm Problem. Academic Journal of Science and Technology, 19(3), 275-280. https://doi.org/10.54097/05cst997