Skip to main content

Cycles, Randomness, Discrete Logarithms, and Key Exchange

  • Chapter
  • First Online:
Fundamentals of Cryptography

Part of the book series: Undergraduate Topics in Computer Science ((UTICS))

  • 3013 Accesses

Abstract

With symmetric cryptography, it is necessary for the two parties who wish to communicate to have access to a common key so that one party can encrypt a message and the other party can decrypt the message. This would limit the ability of two parties who have not communicated in the past to engage in the kind of secure communication necessary for electronic commerce, for example. In this chapter we describe how number-theoretic constructs that create seemingly-random sequences of integers can be used to allow two parties to exchange information that would allow them to agree upon a common cryptographic key, even if no other communication has taken place between them. This exchange of key information can be done by exponentiation modulo a large prime number, in a manner similar to that of RSA encryption, or using elliptic curve groups in the same fashion. We will also cover the basics of the index calculus method that can be used, although with difficulty, to attack this kind of key exchange.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. T. Elgamal, A subexponential-time algorithm for computing discrete logarithms over \(GF(p^{2})\). IEEE Trans. Inf. Theory 473–481 (1985)

    Google Scholar 

  2. D.M. Gordon, Discrete logarithms in \(G F (p)\) using the number field sieve. SIAM J. Discrete Math. 6, 124–138 (1993)

    Article  MathSciNet  Google Scholar 

  3. D.M. Gordon, K.S. McCurley, Computation of discrete logarithms in fields of characteristic two. Crypto 91 rump session paper (1991)

    Google Scholar 

  4. J.M. Pollard, Monte Carlo methods for index computation mod p. Math. Comput. 918–924 (1978)

    Google Scholar 

  5. D. Weber, An implementation of the general number field sieve to compute discrete logarithms mod p. Proc. Eurocrypt 95, 95–105 (1995)

    MATH  Google Scholar 

  6. D. Weber, Computing discrete logarithms with the general number field sieve. Proceedings, ANTS II (1996)

    Google Scholar 

  7. D. Weber, Computing discrete logarithms with quadratic number rings, in Advances in Cryptology - EUROCRYPT ’98, vol. 1403, Lecture Notes in Computer Science, ed. by K. Nyberg (1998), pp. 171–183

    Google Scholar 

  8. D. Coppersmith, A.M. Odlyzko, R. Schroeppel, Discrete logarithms in \(GF(p)\). Algorithmica 1–15 (1986)

    Google Scholar 

  9. B.A. LaMacchia, A.M. Odlyzko, Computation of discrete logarithms in prime fields. Des. Codes Cryptogr. 1, 47–62 (1991)

    Google Scholar 

  10. A.M. Odlyzko, Discrete logarithms in finite fields and their cryptographic significance, in Advances in Cryptology - EUROCRYPT ’84, vol. 209, Lecture Notes in Computer Science, ed. by T. Beth, N. Cot, I. Ingemarsson (1985), pp. 224–314

    Google Scholar 

  11. J.H. Silverman, The Xedni calculus and the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 20, 5–40 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Duncan Buell .

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Buell, D. (2021). Cycles, Randomness, Discrete Logarithms, and Key Exchange. In: Fundamentals of Cryptography. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-73492-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-73492-3_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-73491-6

  • Online ISBN: 978-3-030-73492-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics