Index Calculus Method based on Smooth Numbers of ±1 over Zp
نویسندگان
چکیده
The Index Calculus Method (ICM) is the most effective method to solve the Discrete Logarithm Problem (DLP). Many public key cryptosystems are based on the intractability of DLP. The DLP defined over a prime field Zp of random prime (p) is considered in the present study. The paper presents a variant of ICM on integer field when the factors of the group are known and small. This is achieved through the properties of Smooth numbers of ±1 over Z∗ p . The ICM has two steps, such as a precomputation and an individual logarithm computation. The pre-computation step is to compute the logarithms of a subset of a group and the individual logarithm step is to find the DLP using the pre-computed logarithms. The algorithm presented in the paper for ICM is a combination of PohligHellman, which is the popular attack on the groups of order with all small factors and the traditional ICM. In the present study we show the substantial performance improvement of ICM for the problems of size upto ≈ 150 bits on Pentium 4 machine. The analysis presented in the paper is considered as useful to recover ephemeral keys used in the cryptosystems like text book El Gamal and Chang and Chang three party password key exchange protocol to name a few. One way of recovering the ephemeral key is to solve the DLP. Since the ephemeral keys are dynamic and change for every session, once the discrete logarithms of a subset of a group is known, the DLP for the ephemeral key can be obtained by using the individual logarithm step. Therefore, the ephemeral keys are recovered by using the individual logarithm step proposed in the present study.
منابع مشابه
A Proposed Preference Index For Ranking Fuzzy Numbers Based On $alpha$-Optimistic Values
In this paper, we propose a novel method for ranking a set of fuzzy numbers. In this method a preference index is proposed based on $alpha$-optimistic values of a fuzzy number. We propose a new ranking method by adopting a level of credit in the ordering procedure. Then, we investigate some desirable properties of the proposed ranking method.
متن کاملA Compromise Ratio Ranking Method of Triangular Intuitionistic Fuzzy Numbers\ and Its Application to MADM Problems
Triangular intuitionistic fuzzy numbers (TIFNs) is a special case of intuitionistic fuzzy (IF) set and the ranking of TIFNs is an important problem. The aim of this paper is to develop a new methodology for ranking TIFNs by using multiattribute decision making methods (MADM). In this methodology, the value and ambiguity indices of TIFNs may be considered as the attributes and the TIFNs in compa...
متن کاملComparison of Topological Indices Based on Iterated ‘Sum’ versus ‘Product’ Operations
The Padmakar-Ivan (PI) index is a first-generation topological index (TI) based on sums over all edges between numbers of edges closer to one endpoint and numbers of edges closer to the other endpoint. Edges at equal distances from the two endpoints are ignored. An analogous definition is valid for the Wiener index W, with the difference that sums are replaced by products. A few other TIs are d...
متن کاملNon-Newtonian Fuzzy numbers and related applications
Although there are many excellent ways presenting the principle of the classical calculus, the novel presentations probably leads most naturally to the development of the non-Newtonian calculus. The important point to note is that the non-Newtonian calculus is a self-contained system independent of any other system of calculus. Since this self-contained work is intended for a wide audience, inc...
متن کاملA General Polynomial Sieve
An important component of the index calculus methods for finding discrete logarithms is the acquisition of smooth polynomial relations. Gordon and McCurley (1992) developed a sieve to aid in finding smooth Coppersmith polynomials for use in the index calculus method. We discuss their approach and some of the difficulties they found with their sieve. We present a new sieving method that can be a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 15 شماره
صفحات -
تاریخ انتشار 2013