Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Computation of discrete logarithms in prime fields
LaMacchia B., Odlyzko A. Designs, Codes and Cryptography1 (1):47-62,1991.Type:Article
Date Reviewed: Apr 1 1992

If p is a prime and g and x are integers, then computation of y such that y ≡ g x mod p , 0 ≤ y ≤ p - 1 is fast. On the other hand the inverse problem, that is, for given p, g, and y to establish x, appears to be quite hard in general. This inverse problem is called the discrete logarithm problem. SUN Microcomputers has implemented a secure identification feature that uses discrete exponentiation modulo a prime of 192 bits as part of its Network File System.

The main goal of this paper is to show that it is quite easy to compute discrete logarithms modulo that prime. The authors also suggest that even cryptosystems based on 512-bit primes will become computationally insecure in the near future.

The paper’s presentation is exceptionally good. The method of computation is described clearly. The authors give several comments on their experiences with the implementation. Incorporating these suggestions in a new implementation could lead to considerable speed-up. Furthermore, these remarks can stimulate further theoretical research on the relevant areas. Finally, the paper is well documented.

Reviewer:  A. Pethö Review #: CR115694
Bookmark and Share
 
Public Key Cryptosystems (E.3 ... )
 
 
Computations In Finite Fields (F.2.1 ... )
 
 
Number-Theoretic Computations (F.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Public Key Cryptosystems": Date
Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)211990. Type: Proceedings
Sep 1 1991
Public-key cryptography
Salomaa A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9783540528319)
Feb 1 1992
Cryptanalysis of certain variants of Rabin’s signature scheme
Shamir A., Schnorr C. Information Processing Letters 19(3): 113-115, 1984. Type: Article
May 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy