CYG Chapter 7 The Discrete Logarithm
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 7 The Discrete Logarithm
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 7 The Discrete Logarithm
Kartei Details
Karten | 29 |
---|---|
Sprache | English |
Kategorie | Informatik |
Stufe | Universität |
Erstellt / Aktualisiert | 21.03.2017 / 24.08.2017 |
Weblink |
https://card2brain.ch/box/20170321_cyg_chapter_7_the_discrete_logarithm
|
Einbinden |
<iframe src="https://card2brain.ch/box/20170321_cyg_chapter_7_the_discrete_logarithm/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Lernkarteien erstellen oder kopieren
Mit einem Upgrade kannst du unlimitiert Lernkarteien erstellen oder kopieren und viele Zusatzfunktionen mehr nutzen.
Melde dich an, um alle Karten zu sehen.
What is the characteristic?
[motivation.dl]
Basis of numerous cryptographic protocols // Most famous is ElGamal cs
What is the definition?
[orderofAmoduloN, 3]
1. Let n in N\{1} and a in Zn*
2. ordn(a)=min{k in {1,…,phi(n)}| ak equiv 1 (mod n)}
3. If ordn(a)=phi(n) then a is called “pem n”
What are the characteristics?
[orderofAmoduloN, 2]
1. There exists no 1<=i<j<=phi(n) with ai equiv aj (mod n) and thus aj-i equiv 1 (mod n)
2. Hence <a> is a cyclic group
What is the definition?
[cyclicgroup.orderofAmoduloN, 2]
1. <a>={a,a2,…,aphi(n)}=Zn* // Consists just of powers of a
2. a is called generator
What is the idea?
[theorem72.orderofAmoduloN]
Is for given n the group Zn* cyclic or not?
What is the definition?
[theorem72.orderofAmoduloN, 3]
1. Let n in N
2. pem n exists iff n in {2,4,pk,2pk|p>=3 prime and k in N}
3. If pem n exists then there exist phi(phi(n)) many
Describe an example!
[orderofAmoduloN, 5]
1. Let n=7, phi(n)=6
2. Test a=2 … a3=1 → Not a pem 7
3. Test a=3 … a6=1 → Is a pem 7
4. Test a=5 … a6=1 → Is a pem 7
5. Because phi(phi(7))=phi(6)=|{1,5}|=2 we know we found all
What is the definition?
[dl, 2]
1. Let a be pem n and y in Zn*
2. There exists the unique dl x in {0,…,phi(n)-1} with ax equiv y (mod n) // x=logay
List them!
[comments.dl, 2]
1. Function y=ax mod n can be considered a one-way function
2. Exponentiation can be efficiently computed using “square and multiply algorithm”
What are the steps?
[squaremutliply.comments.dl, 2+3]
1. Input is x=(xt,…,x0) in N and a in N
2. Output is ax mod n
3. Init y←a
4. For(i=t-1; i>=0; --i) compute y←y² mod n and if xi=1 then y←y*a mod n
5. Return y
What is the characteristic?
[squaremutliply.comments.dl]
rounddown(log2x)+v(x)-1 many multiplications with v(x) number of bits with value “one” in the binary representation of x
What are the characteristics?
[DH.dl, 2]
1. Based on dl one-way function
2. (Unauthenticated) key agreement protocol allowing two parties to establish a shared secret key over an open channel
What is the definition?
[SG.DH.dl, 2]
1. Primes p<=N with 2p+1 also prime
2. |{p|p<=N and p SG-prime}|~ 2C2N/log²N many with C2~0.66
What are the steps?
[DH.dl, 5]
1. Prime p and a pem p are selected and published // Initial setup
2. A chooses a random secret x in {2,…,p-2} and sends u=ax mod p to B
3. B chooses a random secret y in {2,…,p-2} and sends v=ay mod p to A
4. B receives u and computes shared key uy=(ax)y mod p
5. A receives v and computes shared key vx=(ay)x mod p
What is the idea?
[proposition75.DH.dl]
Test if a is pem p
What is the definition?
[proposition75.DH.dl, 2]
1. Let p>=3 prime and p-1=Prodi=1kpit_i
2. a is pem p iff a(p-1)/p_i notequiv 1 (mod p) fa i in [1,k]
What are the characteristics?
[proposition75.DH.dl, 3]
1. Find appropriate p and a by choosing a SG-prime q
2. Randomly choose a in {2,…,p-1} until a² and aq notequiv 1 (mod p)
3. There are phi(phi(p))=phi(p-1)=phi(2)phi(q)=q-1 many // Probability to select pem p is q-1/p-2=q-1/2q-1~1/2
What is the definition?
[DHP.DH.dl, 2]
1. Given prime p, a pem p , ax mod p and ay mod p
2. Calculate axy mod p
What is the characteristic?
[DHP.DH.dl]
Open questions if an efficient algorithm for the DHP is one for dl
What are the characteristics?
[mitm.DH.dl, 2]
1. Active intruder O
2. Use aq=a(p-1)/2 has order 2 since (a(p-1)/2)² equiv ap-1 equiv 1 (mod p) // Fermat’s little theorem
What are the steps?
[1.mitm.DH.dl, 2]
1. O intercepts key exchange by axq and ayq thus A and B share axyq
2. O knows that axyq=(aq)xy equiv aq equiv ±1 (mod p) // Try out both possibilities
How to avoid?
[1.mitm.DH.dl]
Avoid by checking that received messages are both different from ±1 mod p
What are the steps?
[2.mitm.DH.dl, 2]
1. O computes x0 and y0
2. Decrypt and encrypt before sending further
How to avoid?
[2.mitm.DH.dl]
Avoid by use of digital signatures
What is the idea?
[shamir.dl, 2]
1. No-key protocol
2. Princess and knight with box locked by two different padlocks
What is the definition?
[proposition77.shamir.dl, 2]
1. Let p prime and a,b in Zp-1*
2. Fa m in Zp it holds that maba’b’ equiv m (mod p)
What is the proof?
[proposition77.shamir.dl, 2]
1. Use fact that bb’=t(p-1)+1 with ct(p-1) equiv 1 (mod p)
2. maba’b’ mod p = (ma mod p)bb’a’ mod p = cbb’a’ mod p = ca’ mod p = m mod p
What are the steps?
[shamir.dl, 6]
1. Publish prime p // Initial setup
2. A and B choose secret random numbers a,b in Zp-1* with a’,b’
3. A sends c1=ma mod p to B
4. B sends c2=c1b mod p to A
5. A sends c3=c2a’ mod p to B
6. B computes m=c3b’ mod p
What is the characteristic?
[shamir.dl]
Protocol does not include authentication, hence offers protection from passive adversaries only
-
- 1 / 29
-