Discrete Logarithms Aurore Guillevic, François Morain
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Solving the Discrete Logarithms in Quasi-Polynomial Time
Solving the discrete logarithms in quasi-polynomial time Ivo Kubjas 1 Introduction 1.1 Discrete logarithm The discrete logarithm problem is analogous to the problem of finding logarithm in finite groups. Definition 1 (Discrete logarithm). Discrete logarithm of h to the base g is x such that gx = h: We denote the discrete logarithm as logg(h) = x. The discrete logarithm has similar algebraic properties as for logarithm in reals. 0 0 Namely, logg(hh ) = logg(h) + logg(h ). The discrete logarithm problem is also randomly self-reducible. This means that there are no “difficult” problems. If there would be an element h in the group for which the logarithm is hard to solve, then it is possible to take 1 ≤ x? ≤ q, where q is the order ? of the group. Now, instead of finding the logarithm of h, we find the logarithm of hgx ? and subtract x? from the result. We know that if x? is chosen uniformly, then also gx is ? uniformly distributed in the group and hgx is uniformly distributed. Thus the difficult problem is reduced to solving the discrete logarithm for an average element in the group. Random self-reducibility allows for \easy" problems in the same group. 1.2 The difficulty of computing discrete logarithm Naturally, a question of why computing discrete logarithms is more difficult than comput- ing logarithms arises. For example, there exists a simple algorithm to compute logarithms in reals. Algorithm 1 (Finding logarithm). Let the base be b. We find the logarithm to the base 2 and convert the logarithm to required base in the final step. -
Improvements in Computing Discrete Logarithms in Finite Fields
ISSN (Print): 2476-8316 ISSN (Online): 2635-3490 Dutse Journal of Pure and Applied Sciences (DUJOPAS), Vol. 5 No. 1a June 2019 Improvements in Computing Discrete Logarithms in Finite Fields 1*Ali Maianguwa Shuaibu, 2Sunday Babuba & 3James Andrawus 1, 2,3 Department of Mathematics, Federal University Dutse, Jigawa State Email: [email protected] Abstract The discrete logarithm problem forms the basis of numerous cryptographic systems. The most efficient attack on the discrete logarithm problem in the multiplicative group of a finite field is via the index calculus. In this paper, we examined a non-generic algorithm that uses index calculus. If α is a generator × × for 퐹푝 then the discrete logarithm of 훽 ∈ 퐹푝 with respect to 훼 is also called the index of 훽 (with respect to 훼), whence the term index calculus. This algorithm depends critically on the distribution of smooth numbers (integers with small prime factors), which naturally leads to a discussion of two algorithms for factoring integers that also depend on smooth numbers: the Pollard 푝 − 1method and the elliptic curve method. In conclusion, we suggest improved elliptic curve as well as hyperelliptic curve cryptography methods as fertile ground for further research. Keywords: Elliptic curve, Index calculus, Multiplicative group, Smooth numbers Introduction 푥 It is known that the logarithm 푙표푔푏 푎 is a number x such that 푏 = 푎, for given numbers a and b. Similarly, in any group G, powers 푏푘 can be defined for all integers 푘, and 푘 the discrete logarithm푙표푔푏 푎 is an integer k such that 푏 = 푎. In number theory,푥 = 푥 푖푛푑푟푎(푚표푑 푚) is read as the index of 푎 to the base r modulo m which is equivalent to 푟 = 푎(푚표푑 푚) if r is the primitive root of m and greatest common divisor, 푔푐푑( 푎, 푚) = 1. -
The Index Calculus Method Using Non-Smooth Polynomials
MATHEMATICS OF COMPUTATION Volume 70, Number 235, Pages 1253{1264 S 0025-5718(01)01298-4 Article electronically published on March 7, 2001 THE INDEX CALCULUS METHOD USING NON-SMOOTH POLYNOMIALS THEODOULOS GAREFALAKIS AND DANIEL PANARIO Abstract. We study a generalized version of the index calculus method for n the discrete logarithm problem in Fq ,whenq = p , p is a small prime and n !1. The database consists of the logarithms of all irreducible polynomials of degree between given bounds; the original version of the algorithm uses lower bound equal to one. We show theoretically that the algorithm has the same asymptotic running time as the original version. The analysis shows that the best upper limit for the interval coincides with the one for the original version. The lower limit for the interval remains a free variable of the process. We provide experimental results that indicate practical values for that bound. We also give heuristic arguments for the running time of the Waterloo variant and of the Coppersmith method with our generalized database. 1. Introduction Let G denote a group written multiplicatively and hgi the cyclic subgroup gen- erated by g 2 G.Giveng and y 2hgi,thediscrete logarithm problem for G is to find the smallest integer x such that y = gx.Theintegerx is called the discrete logarithm of y in the base g, and is written x =logg y. The main reason for the intense current interest on the discrete logarithm prob- lem (apart from being interesting on a purely mathematical level) is that the se- curity of many public-key cryptosystems depends on the assumption that finding discrete logarithms is hard, at least for certain groups. -
History of the Numerical Methods of Pi
History of the Numerical Methods of Pi By Andy Yopp MAT3010 Spring 2003 Appalachian State University This project is composed of a worksheet, a time line, and a reference sheet. This material is intended for an audience consisting of undergraduate college students with a background and interest in the subject of numerical methods. This material is also largely recreational. Although there probably aren't any practical applications for computing pi in an undergraduate curriculum, that is precisely why this material aims to interest the student to pursue their own studies of mathematics and computing. The time line is a compilation of several other time lines of pi. It is explained at the bottom of the time line and further on the worksheet reference page. The worksheet is a take-home assignment. It requires that the student know how to construct a hexagon within and without a circle, use iterative algorithms, and code in C. Therefore, they will need a variety of materials and a significant amount of time. The most interesting part of the project was just how well the numerical methods of pi have evolved. Currently, there are iterative algorithms available that are more precise than a graphing calculator with only a single iteration of the algorithm. This is a far cry from the rough estimate of 3 used by the early Babylonians. It is also a different entity altogether than what the circle-squarers have devised. The history of pi and its numerical methods go hand-in-hand through shameful trickery and glorious achievements. It is through the evolution of these methods which I will try to inspire students to begin their own research. -
Index Calculus in the Trace Zero Variety 3
INDEX CALCULUS IN THE TRACE ZERO VARIETY ELISA GORLA AND MAIKE MASSIERER Abstract. We discuss how to apply Gaudry’s index calculus algorithm for abelian varieties to solve the discrete logarithm problem in the trace zero variety of an elliptic curve. We treat in particular the practically relevant cases of field extensions of degree 3 or 5. Our theoretical analysis is compared to other algorithms present in the literature, and is complemented by results from a prototype implementation. 1. Introduction Given an elliptic curve E defined over a finite field Fq, consider the group E(Fqn ) of rational points over a field extension of prime degree n. Since E is defined over Fq, the group E(Fqn ) contains the subgroup E(Fq) of Fq-rational points of E. Moreover, it contains the subgroup Tn of − points P E(F n ) whose trace P + ϕ(P )+ ... + ϕn 1(P ) is zero, where ϕ denotes the Frobenius ∈ q homomorphism on E. The group Tn is called the trace zero subgroup of E(Fqn ), and it is the group of Fq-rational points of the trace zero variety relative to the field extension Fqn Fq. In this paper, we study the hardness of the DLP in the trace zero variety. Our| interest in this question has several motivations. First of all, supersingular trace zero varieties can achieve higher security per bit than supersingular elliptic curves, as shown by Rubin and Silverberg in [RS02, RS09] and by Avanzi and Cesena in [AC07, Ces10]. Ideally, in pairing-based proto- F∗ cols the embedding degree k is such that the DLP in Tn and in qkn have the same complexity. -
Integer Factorization and Computing Discrete Logarithms in Maple
Integer Factorization and Computing Discrete Logarithms in Maple Aaron Bradford∗, Michael Monagan∗, Colin Percival∗ [email protected], [email protected], [email protected] Department of Mathematics, Simon Fraser University, Burnaby, B.C., V5A 1S6, Canada. 1 Introduction As part of our MITACS research project at Simon Fraser University, we have investigated algorithms for integer factorization and computing discrete logarithms. We have implemented a quadratic sieve algorithm for integer factorization in Maple to replace Maple's implementation of the Morrison- Brillhart continued fraction algorithm which was done by Gaston Gonnet in the early 1980's. We have also implemented an indexed calculus algorithm for discrete logarithms in GF(q) to replace Maple's implementation of Shanks' baby-step giant-step algorithm, also done by Gaston Gonnet in the early 1980's. In this paper we describe the algorithms and our optimizations made to them. We give some details of our Maple implementations and present some initial timings. Since Maple is an interpreted language, see [7], there is room for improvement of both implementations by coding critical parts of the algorithms in C. For example, one of the bottle-necks of the indexed calculus algorithm is finding and integers which are B-smooth. Let B be a set of primes. A positive integer y is said to be B-smooth if its prime divisors are all in B. Typically B might be the first 200 primes and y might be a 50 bit integer. ∗This work was supported by the MITACS NCE of Canada. 1 2 Integer Factorization Starting from some very simple instructions | \make integer factorization faster in Maple" | we have implemented the Quadratic Sieve factoring al- gorithm in a combination of Maple and C (which is accessed via Maple's capabilities for external linking). -
11.6 Discrete Logarithms Over Finite Fields
Algorithms 61 11.6 Discrete logarithms over finite fields Andrew Odlyzko, University of Minnesota Surveys and detailed expositions with proofs can be found in [7, 25, 26, 28, 33, 34, 47]. 11.6.1 Basic definitions 11.6.1 Remark Discrete exponentiation in a finite field is a direct analog of ordinary exponentiation. The exponent can only be an integer, say n, but for w in a field F , wn is defined except when w = 0 and n ≤ 0, and satisfies the usual properties, in particular wm+n = wmwn and (for u and v in F )(uv)m = umvm. The discrete logarithm is the inverse function, in analogy with the ordinary logarithm for real numbers. If F is a finite field, then it has at least one primitive element g; i.e., all nonzero elements of F are expressible as powers of g, see Chapter ??. 11.6.2 Definition Given a finite field F , a primitive element g of F , and a nonzero element w of F , the discrete logarithm of w to base g, written as logg(w), is the least non-negative integer n such that w = gn. 11.6.3 Remark The value logg(w) is unique modulo q − 1, and 0 ≤ logg(w) ≤ q − 2. It is often convenient to allow it to be represented by any integer n such that w = gn. 11.6.4 Remark The discrete logarithm of w to base g is often called the index of w with respect to the base g. More generally, we can define discrete logarithms in groups. -
Daniel Shanks 1917-1996
comm-shanks.qxp 3/24/98 9:49 AM Page 813 Daniel Shanks (1917–1996) H. C. Williams Daniel Shanks was born on January 17, 1917, in versity (as all the city of Chicago, where he was raised and universities will) where in 1937 he received his B.S. in physics from insisted that he the University of Chicago. In 1940 he worked as complete all a physicist at the Aberdeen Proving Grounds, their degree re- moving the following year to the position of quirements be- physicist at the Naval Ordinance Laboratory, a fore being position he retained until 1950. In 1951 his post awarded the de- at the NOL changed to that of mathematician, gree. At the time and during the years from 1951 to 1957 he Dan was raising headed the Numerical Analysis Section and then a young family the Applied Mathematics Laboratory. He left the and working full NOL in 1957 to become consultant and senior time, so it was research scientist in the Computation and Math- not until 1954 ematics Department at the Naval Ship R&D Cen- that he obtained ter at the David Taylor Model Basin. In 1976 his degree. His after support for independent work had con- thesis was pub- siderably diminished, he decided to retire, spend- lished in 1955 in ing a year as a guest worker at the National Bu- the Journal of reau of Standards. He joined the Department of Mathematics and Mathematics at the University of Maryland as an Physics and was adjunct professor in 1977 and remained there entitled “Non- until his death on September 6, 1996. -
Schaaf, William L., E. Stanford Univ., Calif. School Mathematics Study Mathesatics Education
DOCUMENT RES093 20 179 694 SE 028 692 MOOR Schaaf, William L., E. TITLE Reprint Series: Computation of Pi. RS-7. INSTITUTION Stanford Univ., Calif. School Mathematics Study Group. SPONS AGENCY National Scir-ece Foundation, Washington. D.C. PUB DATE 67 NOTE 37p.: For re.v...ed documents, see SE 028 676-690 EDRS PRICE BF01/PCO2 Plus Postage. DESCRIPTCRS Curriculum: *Enrichment: *History: *Instruction: Mathesatics Education: *Number Concepts: Secondary Education: *Secondary School Mathematics: Supplementary Reading Materials IDENTIFIERS *School Mathematics Study Group; *Summation (Mathematics) ABSTRACT This is one in a series of SMSG supplementary and enrichment pamphlets for high school students. This series makes available expository articles which appeared in a variety of mat-liatical periodicals. Topics covered include: (1) the latest aim'. 2i: (2)a series useful in the computation of pi:(3) an ENIAC detwination of pl and e to more than 2,000 decimal places:(4) the evolution of extended decimal approximatOns to pi: and (5) the calculation of pi to 100,265 decimal places. (MP) *********************************************************************** Reproductions supplied by EDRS are the best that can be made frOm the original document. *********************************************************************** "PERMISSION TO REPRODUCE THIS DEPANTMEdT OF NEAL Too u MATERIAL HAS BEEN GRANTED BY ki7UCATION*ELF *NE NATIONAL INSTITUTE OF EDUCATION th t Pt40- I .... , A 4rt 0 WOM h ,AP`A' ,44 ()NS .4 . A. I %t t 444 NI Phil A %A. TO THE EDUCATIONAL RESOURCES f.(J6 INFORMATION CENTER (ERIC)." a O.D 4 REPRINT SERIES Computation OfTr Edited by William L. Schaaf THE OHIO STATE UNIVERSITY CENTER FOTI F.fi!';!:?,E P.7 !"7731.1113 EBUCATION Arps ftili - aarth Hi is Street Columbus, Ohio 43210 3 4 e 1967by The Board of Trustees of the Le lend Stanford junior University All rights reamed Printed in the United Statesof America Financial support for the School Mathematics Study Group has been provided by the National Science Foundation. -
INDEX CALCULUS in the TRACE ZERO VARIETY 1. Introduction
INDEX CALCULUS IN THE TRACE ZERO VARIETY ELISA GORLA AND MAIKE MASSIERER Abstract. We discuss how to apply Gaudry's index calculus algorithm for abelian varieties to solve the discrete logarithm problem in the trace zero variety of an elliptic curve. We treat in particular the practically relevant cases of field extensions of degree 3 or 5. Our theoretical analysis is compared to other algorithms present in the literature, and is complemented by results from a prototype implementation. 1. Introduction Given an elliptic curve E defined over a finite field Fq, consider the group E(Fqn ) of rational points over a field extension of prime degree n. Since E is defined over Fq, the group E(Fqn ) contains the subgroup E(Fq) of Fq-rational points of E. Moreover, it contains the subgroup Tn of n−1 points P 2 E(Fqn ) whose trace P + '(P ) + ::: + ' (P ) is zero, where ' denotes the Frobenius homomorphism on E. The group Tn is called the trace zero subgroup of E(Fqn ), and it is the group of Fq-rational points of the trace zero variety relative to the field extension Fqn jFq. In this paper, we study the hardness of the DLP in the trace zero variety. Our interest in this question has several motivations. First of all, supersingular trace zero varieties can achieve higher security per bit than supersingular elliptic curves, as shown by Rubin and Silverberg in [RS02, RS09] and by Avanzi and Cesena in [AC07, Ces10]. Ideally, in pairing-based proto- ∗ cols the embedding degree k is such that the DLP in Tn and in Fqkn have the same complexity. -
The Past, Evolving Present and Future of Discrete Logarithm
The Past, evolving Present and Future of Discrete Logarithm Antoine Joux, Andrew Odlyzko and Cécile Pierrot Abstract The first practical public key cryptosystem ever published, the Diffie-Hellman key exchange algorithm, relies for its security on the assumption that discrete logarithms are hard to compute. This intractability hypothesis is also the foundation for the security of a large variety of other public key systems and protocols. Since the introduction of the Diffie-Hellman key exchange more than three decades ago, there have been substantial algorithmic advances in the computation of discrete logarithms. However, in general the discrete logarithm problem is still considered to be hard. In particular, this is the case for the multiplicative group of finite fields with medium to large characteristic and for the additive group of a general elliptic curve. This paper presents a current survey of the state of the art concerning discrete logarithms and their computation. 1 Introduction 1.1 The Discrete Logarithm Problem Many popular public key cryptosystems are based on discrete exponentiation. If G is a multi- plicative group, such as the group of invertible elements in a finite field or the group of points on an elliptic curve, and g is an element of G, then gx is the discrete exponentiation of base g to the power x. This operation shares basic properties with ordinary exponentiation, for example gx+y = gx · gy. The inverse operation is, given h in G, to determine a value of x, if it exists, such that h = gx. Such a number x is called a discrete logarithm of h to the base g, since it shares many properties with the ordinary logarithm. -
Cover and Decomposition Index Calculus on Elliptic Curves Made Practical
Cover and Decomposition Index Calculus on Elliptic Curves made practical Application to a previously unreachable curve over Fp6 Antoine Joux1 and Vanessa Vitse2 1 DGA and Universit´ede Versailles Saint-Quentin, Laboratoire PRISM, 45 avenue des Etats-Unis,´ F-78035 Versailles cedex, France [email protected] 2 Universit´ede Versailles Saint-Quentin, Laboratoire PRISM, 45 avenue des Etats-Unis,´ F-78035 Versailles cedex, France [email protected] Abstract. We present a new \cover and decomposition" attack on the elliptic curve discrete logarithm problem, that combines Weil descent and decomposition-based index calculus into a single discrete logarithm algorithm. This attack applies, at least theoretically, to all composite degree extension fields, and is particularly well-suited for curves defined 3 over Fp6 . We give a real-size example of discrete logarithm computations on a curve over a 151-bit degree 6 extension field, which would not have been practically attackable using previously known algorithms. Key words: elliptic curve, discrete logarithm, index calculus, Weil descent, decomposition attack 1 Introduction Elliptic curves are used in cryptography to provide groups where the discrete logarithm problem is thought to be difficult. We recall that given a finite group G (written additively) and two elements P; Q 2 G, the discrete logarithm problem (DLP) consists in computing, when it exists, an integer x such that Q = xP . When elliptic curves are used in cryptographic applications, the DLP is usually considered to be as difficult as in a generic group of the same size [31]. As a consequence, for a given security level, the key size is much smaller than for other popular cryptosystems based on factorization or discrete logarithms in finite fields.