While Bristol's answer solves the problem of finding any 112-bit curve, it's not actually a proper alternative to Ed25519 in the sense that it isn't a (twisted) Edwards curve.
I state again, agreeing the common consensus in this thread, that it is pointless from a security perspective to pursue 112-bit curves. But sometimes you do want your demo code to be available in those “rogue states”. Or your legal department makes you, anyway.
Disclaimer: I am not a lawyer. This is not legal advice on how to properly comply with all or any applicable laws, including the Wassenaar agreement and its transformation(s) in applicable jurisdiction(s).
Finding a curve
I'm not aware of any such curve already having been specified, but [1] specifies a validation program written in Magma for their curves of varying levels. They do not specify a 112-bit curve in their paper, but their Magma script can be repurposed to generate a curve at the 112-bit “security” level by picking a suitable prime and incrementing $d$ by one until a curve checks out.
Following the strategy outlined in [1] to pick a prime $p$ as close as possible to $2^{112}$ and adapting their code, you get the Edwards curve $x^2+y^2=1-1260x^2y^2$ over $\mathbb{F}_{2^{111}-37}$:
- field prime $p = 2^{111}-37$, observing that $p \equiv 3 \pmod 4$ and $37 < 111$
- curve parameters $a=1$, $d=-1260$
- prime group order $r=649037107316853431433280197358493$; the curve has cofactor $h=4$, so the full group size is $4r=2596148429267413725733120789433972$, which is indeed less than $2^{112}$ as required by the Wassenaar agreement
- $\rho$ “security” of $2^{54.3}$
- base point $y$-coordinate $y=8$ (if you are contemplating use of Decaf or Ristretto, instead use base point at $s=14$)
(Aside: A suitable Montgomery curve can be found with the same code for $p=2^{112}-75$ at $A=160072$.)
I must stress that 112-bit “security” is uncomfortably thin, having been broken in an academic setting using with a cluster of PS3s; the whole thing just took a few months of number crunching in 2009.[2] At the time of writing, this was over a decade ago. Access to number-crunching GPUs is now widespread. If you rely on this for anything but the demo mentioned in the question, your system is probably going to be broken by literal brute force by any reasonably motivated attacker (quite possibly including a bunch of students their pooling free cloud provider student credit together).
It is unlikely to find an actually secure alternative in the elliptic curve space – it is likely intended that only cryptography that is reasonably breakable by nation-state actors is excluded from any kind of restrictions entirely.
Instantiating EdDSA
Ed25519 is an instantiation of EdDSA.[3] The parametrization of EdDSA is described more closely in [4]. The following parameters would work for the curve described above:
- $q$ is $p$ above
- $b = 112$ (rounding up $p$ to the nearest byte)
- $H$ is instantiated as either SHA-224, SHA-512/224 or SHA3-224 (you may need avoid BLAKE2 because its native support for being used as a MAC introducing a component with a [long] key again; at least the Wassenaar agreement itself doesn't seem to care about hash functions)
- $c = 2$ (because cofactor $h=4$, $c$ being $\log_2 h$)
- $n = b-1 = 111$
- $a$ and $d$ as per the curve noted above
- $B$ as either of the possible points that are valid for the $y$-coordinate for the base point above or the Decaf/Ristretto point at $s$ above if using Decaf/Ristretto
- $\ell$ is $r$ above
(Note that [3] requires you to use domain separation strings and the dom2()
function since you instantiate EdDSA as not-Ed25519.)
References
[1] Diego F. Aranha, Paulo S. L. M. Barreto, Geovandro C. C. F. Pereira, Jefferson E. Ricardini. A note on high-security general-purpose elliptic curves, 2013 (version 20190123:033905).
[2] Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Kenstra, Peter L. Montgomery. On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography, 2009.
[3] S. Josefsson, I. Liusvaara. Edwards-Curve Digital Signature Algorithm (EdDSA), RFC 8032, 2017.
[4] Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang. EdDSA for more curves, 2015.