DocumentCode
2804587
Title
The discrete logarithm problem in cyclic subgroups of not necessary cyclic groups
Author
Popescu, Pantelimon George ; Osiceanu, Sanda
Author_Institution
Automatics & Comput. Sci. Fac., Politeh. Univ. of Bucharest, Bucharest
fYear
2008
fDate
18-21 May 2008
Firstpage
1
Lastpage
4
Abstract
The security of many cryptographic techniques depends on the intractability of the discrete logarithm problem (DLP). As a starting point, we consider the particular case of this problem, the discrete logarithm problem in subgroups of Zopfp* (p prime number), which is of special interest because its presumed intractability is the basis for the security of the U.S. Government NIST Digital Signature Algorithm, among other cryptographic techniques. Our intention is to generalize the discrete logarithm problem in subgroups of Zopfp*, first by considering an arbitrary finite cyclic group G, instead of Zopfp*; and then, more generally, by considering an arbitrary finite group G instead of Zopfp*. Then, following the same idea, we try to generalize a problem closely related to the DLP, the Diffie-Hellman problem (DHP), which is of significance to public-key cryptography because its apparent intractability forms the basis for the security of many cryptographic schemes, including Diffie-Hellman key agreement and its derivatives, and ElGamal public-key encryption. Our paper will give the mathematical description of the general problems, using group theory, as well as provide a mathematical algorithm for solving them.
Keywords
digital signatures; group theory; public key cryptography; Diffie-Hellman problem; ElGamal public-key encryption; U.S. Government NIST digital signature algorithm; arbitrary finite cyclic group; cryptographic techniques; cyclic subgroups; discrete logarithm problem; group theory; intractability; mathematical algorithm; mathematical description; not necessary cyclic groups; public-key cryptography; Computer science; Computer security; Digital signatures; Government; Information technology; NIST; Polynomials; Protocols; Public key; Public key cryptography;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology, 2008. IT 2008. 1st International Conference on
Conference_Location
Gdansk
Print_ISBN
978-1-4244-2244-9
Electronic_ISBN
978-1-4244-2245-6
Type
conf
DOI
10.1109/INFTECH.2008.4621640
Filename
4621640
Link To Document