Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/800057.808682acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Evaluating logarithms in GF(2n)

Published: 01 December 1984 Publication History

Abstract

We present a method for determining logarithms in GF(2n). Its asymptotic running time is O( exp (cn1/3log2/3n)) for a small constant c, while, by comparison, Adleman's scheme runs in time O( exp (c'n1/2log1/2n)). The ideas give a dramatic improvement even for moderate-sized fields such as GF(2127), and make (barely) possible computations in fields of size around 2400. The method is not applicable to GF(q) for a large prime q.

References

[1]
L. Adleman, "A Subexponential Algorithm for the Discrete Logarithm Problem with Applications to Cryptography," Proc. IEEE 20th Annual Symposium on Foundations of Computer Science, 55-60 (1979).
[2]
E.R. Berlekamp, "Factoring polynomials over finite fields," Bell System Tech. J. 46(1967), pp. 1853-1859.
[3]
I.F. Blake, R. Fuji-Hara, R.C. Mullin and S.A. Vanstone, "Computing Logarithms in Finite Fields of Characteristic Two." Submitted to SIAM Journal on Algebraic and Discrete Methods.
[4]
D. Coppersmith, "Fast Evaluation of Logarithms in Fields of Characteristic Two," Research Report No. RC 10187, IBM T. J. Watson Research Center, Yorktown Heights, N. Y., 10598, October 3, 1983; to appear, IEEE Transactions on Information Theory.
[5]
W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. IT-22, pp.644-654 (1976).
[6]
M.E. Hellman, "On the Difficulty of Computing Logarithms Over GF(QM)," Proceedings of the 1980 Symposium on Security and Privacy, Oakland, CA, April 14-16, 1980, 83(1980).
[7]
M.E. Hellman and J.M. Reyneri, "Fast computation of discrete logarithms in GF(q)", Advances in Cryptography: Proceedings of CRYPTO '82, D. Chaum, R. Rivest, and A. Sherman, eds., pp. 3-13, Plenum Press, 1983.
[8]
R.D. Jenks and B.M. Trager, "A Language for Computational Algebra," Proc. SYMSAC 81, P.S. Wang, editor, pp. 6-13. ACM, New York, 1981.
[9]
D.E. Knuth, The Art Of Computer Programming, volume 2, pp. 351-354. Addison-Wesley, 1971.
[10]
J.L. Massey, "Logarithms in finite cyclic groups—cryptographic issues," 4-th Symp. on Info. Th. in BENELUX, Haasrode, Belgium, May 26-27, 1983; preprint.
[11]
M. Morrison and J. Brillhart, "A Method of Factoring and the Factorization of F7'" Math. Comp., v. 29, 129, pp. 183-205.
[12]
A.M. Odlyzko, "Discrete logarithms in finite fields and their cryptographic significance," Bell Laboratories Internal Technical Memorandum, September 27, 1983.
[13]
N. Zierler, "A conversion algorithm for logarithms on GF(2n)", Journal of Pure and Applied Algebra 4 (1974), pp. 353-356.

Cited By

View all
  • (2010)Signcryption Schemes Based on Bilinear MapsPractical Signcryption10.1007/978-3-540-89411-7_5(71-97)Online publication date: 4-Oct-2010
  • (2006)Software implementation of Tate pairing over GF(2m)Proceedings of the conference on Design, automation and test in Europe: Designers' forum10.5555/1131355.1131358(7-11)Online publication date: 6-Mar-2006
  • (2004)Function Field Sieve in Characteristic ThreeAlgorithmic Number Theory10.1007/978-3-540-24847-7_16(223-234)Online publication date: 2004
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '84: Proceedings of the sixteenth annual ACM symposium on Theory of computing
December 1984
547 pages
ISBN:0897911334
DOI:10.1145/800057
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 1984

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)79
  • Downloads (Last 6 weeks)16
Reflects downloads up to 02 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2010)Signcryption Schemes Based on Bilinear MapsPractical Signcryption10.1007/978-3-540-89411-7_5(71-97)Online publication date: 4-Oct-2010
  • (2006)Software implementation of Tate pairing over GF(2m)Proceedings of the conference on Design, automation and test in Europe: Designers' forum10.5555/1131355.1131358(7-11)Online publication date: 6-Mar-2006
  • (2004)Function Field Sieve in Characteristic ThreeAlgorithmic Number Theory10.1007/978-3-540-24847-7_16(223-234)Online publication date: 2004
  • (2003)Estimates for Discrete Logarithm Computations in Finite Fields of Small CharacteristicCryptography and Coding10.1007/978-3-540-40974-8_16(190-206)Online publication date: 2003
  • (2003)Efficient Computations of the Tate Pairing for the Large MOV DegreesInformation Security and Cryptology — ICISC 200210.1007/3-540-36552-4_20(283-297)Online publication date: 14-Mar-2003
  • (2002)Efficient computations of the Tate pairing for the large MOV degreesProceedings of the 5th international conference on Information security and cryptology10.5555/1765361.1765387(283-297)Online publication date: 28-Nov-2002
  • (2000)Discrete logarithms in finite fields and their cryptographic significanceAdvances in Cryptology10.1007/3-540-39757-4_20(224-314)Online publication date: 1-Dec-2000
  • (1994)Conditionally secure secret sharing schemes with disenrollment capabilityProceedings of the 2nd ACM Conference on Computer and communications security10.1145/191177.191196(89-95)Online publication date: 2-Nov-1994

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media