Discrete Logarithm(s) (DLs) Fix a prime p. Let a, b be nonzero integers (mod p). The problem of finding x such that a x ≡ b (mod p) is called the discrete.

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Asymmetric-Key Cryptography
Data encryption with big prime numbers
22C:19 Discrete Structures Integers and Modular Arithmetic
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
7. Asymmetric encryption-
1 The RSA Algorithm Supplementary Notes Prepared by Raymond Wong Presented by Raymond Wong.
Announcements: 1. Term project groups and topics due midnight 2. HW6 due next Tuesday. Questions? This week: Primality testing, factoring Primality testing,
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
CNS2010handout 8 :: introduction to number theory1 computer and network security matt barrie.
Announcements: 1. Term project groups and topics due tomorrow midnight Waiting for posts from most of you. Questions? This week: Primality testing, factoring.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Elliptic Curve. p2. Outline EC over Z p EC over GF(2 n )
1 Cryptosystems Based on Discrete Logarithms. 2 Outline [1] Discrete Logarithm Problem [2] Algorithms for Discrete Logarithm –A trivial algorithm –Shanks’
Introduction to Modern Cryptography Homework assignments.
Announcements: 1. Short “pop” quiz on Ch 3 (not today) 2. Term project groups and topics due tomorrow midnight Waiting for posts from 22 of you. 3. HW6:
Pass in HW6 now Can use up to 2 late days Can use up to 2 late days But one incentive not to burn them all: teams will get to pick their presentation day.
Announcements: 1. HW6 due now 2. HW7 posted Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions.
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CSE331: Introduction to Networks and Security Lecture 20 Fall 2002.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Topic 5 Essential Public Key Crypto Methods.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Codes, Ciphers, and Cryptography-RSA Encryption
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
The RSA Algorithm Based on the idea that factorization of integers into their prime factors is hard. ★ n=p . q, where p and q are distinct primes Proposed.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
The RSA Algorithm Rocky K. C. Chang, March
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 3 Public-Key Cryptography and Key Management.
Application of Elliptic Curves to Cryptography
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Introduction to Algorithms Second Edition by Cormen, Leiserson, Rivest & Stein Chapter 31.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Public key ciphers 2 Session 6.
1 離散對數密碼系統 交通大學資訊工程系 陳榮傑. 2 Outline 離散對數問題 (Discrete Logarithm Problem) 離散對數演算法 (DL Algorithms) –A trivial algorithm –Shanks’ algorithm –Pollard’s algorithm.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
Diffie-Hellman Key Exchange Color Mixing Example Rick Stroud 21 September 2015 CSCE 522.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Outline Primitive Element Theorem Diffie Hellman Key Distribution
Asymmetric-Key Cryptography
CS 2210:0001Discrete Structures Modular Arithmetic and Cryptography
Prelude to Public-Key Cryptography
Advanced Algorithms Analysis and Design
RSA Preliminaries.
RSA and El Gamal Cryptosystems
Elliptic Curves.
Symmetric-Key Cryptography
El Gamal and Diffie Hellman
Presentation transcript:

Discrete Logarithm(s) (DLs) Fix a prime p. Let a, b be nonzero integers (mod p). The problem of finding x such that a x ≡ b (mod p) is called the discrete logarithm problem. Suppose that n is the smallest integer such that a n ≡1 (mod p), i.e., n=ord p (a). By assuming 0≤x<n, we denote x=L a (b), and call it the discrete log of b w.r.t. a (mod p) Ex: p=11, a=2, b=9, then x=L 2 (9)=6

Discrete Logarithms In the RSA algorithms, the difficulty of factoring a large integer yields good cryptosystems In the ElGamal method, the difficulty of solving the discrete logarithm problem yields good cryptosystems Given p, a, b, solve a x ≡ b (mod p) a is suggested to be a primitive root mod p

One-Way Function A function f(x) is called a one-way function if f(x) is easy to compute, but, given y, it is computationally infeasible to find x with y=f(x). L a (b) is a one-way function if p is large

Primitive Roots mod 13 a is a primitive root mod p if {a k | 1 ≦ k ≦ p-1} = {1,2, …,p-1} ♪ 2, 6,7,11 are primitive roots mod ≡ 1 (mod 13), 4 6 ≡ 1 (mod 13), 5 4 ≡ 1 (mod 13), 8 4 ≡ 1 (mod 13), 9 3 ≡ 1 (mod 13), 10 6 ≡ 1 (mod 13), 12 2 ≡ 1 (mod 13)

Solve a x ≡ b (mod p) An exhaustive search for all 0 ≤ x < p Check only for even x or odd x according to b (p-1)/2 ≡ (a x ) (p-1)/2 ≡(a (p-1)/2 ) x ≡(-1) x ≡ 1 or -1 (mod p), where a is a primitive root (Ex) p=11, a=2, b=9, since b (p-1)/2 ≡9 5 ≡1, then check for even numbers {0,2,4,6,8,10} only to find x=6 such that 2 6 ≡ 9 (mod 11)

Solve a x ≡ b (mod p) by Pohlig- Hellman Let p-1 = Πq r for all q|(p-1), write b 0 =b,and x=x 0 + x 1 q +x 2 q 2 + … + x r-1 q r-1 for 0 ≤ x i ≤ q-1 1. Find 0≤ k ≤q-1 such that (a (p-1)/q ) k ≡b (p-1)/q, then x 0 ≡k, next let b 1 ≡b 0 a -x0 2. Find 0≤ k ≤q-1 such that (a (p-1)/q ) k ≡[b 1 ] (p-1)/q^2, then x 1 ≡k, next let b 2 ≡b 1 a -x1 3. Repeat steps 1, 2 until x r-1 is found for a q 4. Repeat steps 1~3 for all q’s, then apply Chinese Remainder Theorem to get the final solution

7 x ≡12 (mod 41); p=41, a=7, b=12, p-1=41-1=40 =2 3 5 b 0 =12 For q=2: b 0 =12, b 1 =31, b 2 =31, and x = x 0 +2x 1 +4x 2 ≡1+2·0+4·1≡ 5 (mod 8) For q=5: b 0 =12, b 1 =18, and x = x 0 ≡ 3 (mod 5) Solving x ≡ 5 (mod 8) and x≡ 3 (mod 5), We have x≡13 (mod 40)

Solve a x ≡ b (mod p) by Index Calculus Let B be a bound and let p 1,p 2,…, p m be the primes less than B and cover all of the prime Factors of p-1. Then appropriately choose k(j)’s such that a k(j) ≡(p 1 ) r1 (p 2 ) r2 … (p m ) rm, i.e., r 1 *L a (p 1 )+r 2 *L a (p 2 )+… + r m *L a (p m ) ≡k(j) for several j’s, solve the linear system to get L a (p 1 ), L a (p 2 ), …, L a (p m ), then select R apply ba R ≡(p 1 ) b1 (p 2 ) b2 … (p m ) bm, then the solution is L a (b)≡-R+Πb i L a (p i )

Solve 2 x ≡37 (mod 131) p=131, a=2, b=37, let B=10, then p 1 =2, p 2 =3, p 3 =5, p 4 =7, since 2 8 ≡5 3, 2 12 ≡5·7, 2 14 ≡3 2, 2 34 ≡3·5 2 (mod p), we have 3L 2 (5)≡ 8 (mod 130) L 2 (5)+ L 2 (7)≡12 (mod 130) 2L 2 (3)≡14 (mod 130) L 2 (3)+2L 2 (5)≡34 (mod 130)

L 2 ([3, 5, 7])=[72, 46, 96] Choose R=43, then 37·2 43 ≡3·5·7 (mod 131), so we have L 2 (37) ≡-43+ L 2 (3)+ L 2 (5)+ L 2 (7) ≡ 41 (mod 130) ♪ L 2 (11) ≡ 56 (mod 130) [R=4] ♪ L 2 (23) ≡ 23 (mod 130) [R=5]

A Lemma on p≡3 (mod 4) Let p≡3 (mod 4), r≥2. Suppose a and g are nonzero integers such that g≡a y(2^r) (mod p). Then g (p+1)/4 ≡ a y[2^(r-1)] (mod p) [Proof] g (p+1)/4 ≡ a (p+1)y[2^(r-2)] ≡a y(2^(r-1)) [a (p-1) ] y(2^(r-2)) ≡ a y(2^(r-1)) (mod p)

A L a (b) (mod 4) Machine Let a be a primitive root (mod p), where p≡3 (mod 4) is large, then Computing L a (b) (mod 4) is as difficult as finding the solution of a x ≡ b (mod p) [P.172]

The ElGamal Public Key Cryptosystem Alice wants to send a message m to Bob. Bob chooses a large prime p and a primitive root a. Assume m is an integer 0≤m<p, and Bob selects a secret integer x to compute b≡a x (mod p). The information (p,a,b) is made public and is Bob’s public key. Alice does the following procedures.

Encryption and Decryption 1.Downloads (p,a,b) 2.Chooses a secret random k and computes r≡a k (mod p) 3.Computes t≡b k m (mod p) 4.Sends the pair (t,r) to Bob Bob decrypts by computing tr -x (≡m (mod p))

Exercises on Pages 175 and 176