Selmer-Inspired Elliptic Curve Generation
By: Awnon Bhowmik
Potential Business Impact:
Makes secret codes more trustworthy and understandable.
Elliptic curve cryptography (ECC) is foundational to modern secure communication, yet existing standard curves have faced scrutiny for opaque parameter-generation practices. This work introduces a Selmer-inspired framework for constructing elliptic curves that is both transparent and auditable. Drawing from $2$- and $3$-descent methods, we derive binary quartics and ternary cubics whose classical invariants deterministically yield candidate $(c_4,c_6)$ parameters. Local solubility checks, modeled on Selmer admissibility, filter candidates prior to reconciliation into short-Weierstrass form over prime fields. We then apply established cryptographic validations, including group-order factorization, cofactor bounds, twist security, and embedding-degree heuristics. A proof-of-concept implementation demonstrates that the pipeline functions as a retry-until-success Las Vegas algorithm, with complete transcripts enabling independent verification. Unlike seed-based or purely efficiency-driven designs, our approach embeds arithmetic structure into parameter selection while remaining compatible with constant-time, side-channel resistant implementations. This work broadens the design space for elliptic curves, showing that descent techniques from arithmetic geometry can underpin trust-enhancing, standardization-ready constructions.
Similar Papers
Mage: Cracking Elliptic Curve Cryptography with Cross-Axis Transformers
Cryptography and Security
Cracks secret codes using smart computer programs.
Optimizing Scalar Selection in Elliptic Curve Cryptography Using Differential Evolution for Enhanced Security
Cryptography and Security
Makes secret codes harder to break.
ECCFROG522PP: An Enhanced 522-bit Weierstrass Elliptic Curve
Cryptography and Security
Makes computer codes much safer and easier to check.