Abstract
With symmetric cryptography, it is necessary for the two parties who wish to communicate to have access to a common key so that one party can encrypt a message and the other party can decrypt the message. This would limit the ability of two parties who have not communicated in the past to engage in the kind of secure communication necessary for electronic commerce, for example. In this chapter we describe how number-theoretic constructs that create seemingly-random sequences of integers can be used to allow two parties to exchange information that would allow them to agree upon a common cryptographic key, even if no other communication has taken place between them. This exchange of key information can be done by exponentiation modulo a large prime number, in a manner similar to that of RSA encryption, or using elliptic curve groups in the same fashion. We will also cover the basics of the index calculus method that can be used, although with difficulty, to attack this kind of key exchange.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
T. Elgamal, A subexponential-time algorithm for computing discrete logarithms over \(GF(p^{2})\). IEEE Trans. Inf. Theory 473–481 (1985)
D.M. Gordon, Discrete logarithms in \(G F (p)\) using the number field sieve. SIAM J. Discrete Math. 6, 124–138 (1993)
D.M. Gordon, K.S. McCurley, Computation of discrete logarithms in fields of characteristic two. Crypto 91 rump session paper (1991)
J.M. Pollard, Monte Carlo methods for index computation mod p. Math. Comput. 918–924 (1978)
D. Weber, An implementation of the general number field sieve to compute discrete logarithms mod p. Proc. Eurocrypt 95, 95–105 (1995)
D. Weber, Computing discrete logarithms with the general number field sieve. Proceedings, ANTS II (1996)
D. Weber, Computing discrete logarithms with quadratic number rings, in Advances in Cryptology - EUROCRYPT ’98, vol. 1403, Lecture Notes in Computer Science, ed. by K. Nyberg (1998), pp. 171–183
D. Coppersmith, A.M. Odlyzko, R. Schroeppel, Discrete logarithms in \(GF(p)\). Algorithmica 1–15 (1986)
B.A. LaMacchia, A.M. Odlyzko, Computation of discrete logarithms in prime fields. Des. Codes Cryptogr. 1, 47–62 (1991)
A.M. Odlyzko, Discrete logarithms in finite fields and their cryptographic significance, in Advances in Cryptology - EUROCRYPT ’84, vol. 209, Lecture Notes in Computer Science, ed. by T. Beth, N. Cot, I. Ingemarsson (1985), pp. 224–314
J.H. Silverman, The Xedni calculus and the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 20, 5–40 (2000)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Buell, D. (2021). Cycles, Randomness, Discrete Logarithms, and Key Exchange. In: Fundamentals of Cryptography. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-73492-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-73492-3_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73491-6
Online ISBN: 978-3-030-73492-3
eBook Packages: Computer ScienceComputer Science (R0)