CYG Chapter 7 The Discrete Logarithm

Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 7 The Discrete Logarithm

Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 7 The Discrete Logarithm


Set of flashcards Details

Flashcards 29
Language English
Category Computer Science
Level University
Created / Updated 21.03.2017 / 24.08.2017
Weblink
https://card2brain.ch/box/20170321_cyg_chapter_7_the_discrete_logarithm
Embed
<iframe src="https://card2brain.ch/box/20170321_cyg_chapter_7_the_discrete_logarithm/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

What is the characteristic?

[motivation.dl]

Basis of numerous cryptographic protocols // Most famous is ElGamal cs

What is the definition?

[orderofAmoduloN, 3]

1. Let n in N\{1} and a in Zn*

2. ordn(a)=min{k in {1,…,phi(n)}| ak equiv 1 (mod n)}

3. If ordn(a)=phi(n) then a is called “pem n”

What are the characteristics?

[orderofAmoduloN, 2]

1. There exists no 1<=i<j<=phi(n) with ai equiv aj (mod n) and thus aj-i equiv 1 (mod n)

2. Hence <a> is a cyclic group

What is the definition?

[cyclicgroup.orderofAmoduloN, 2]

1. <a>={a,a2,…,aphi(n)}=Zn* // Consists just of powers of a

2. a is called generator

What is the idea?

[theorem72.orderofAmoduloN]

Is for given n the group Zn* cyclic or not?

What is the definition?

[theorem72.orderofAmoduloN, 3]

1. Let n in N

2. pem n exists iff n in {2,4,pk,2pk|p>=3 prime and k in N}

3. If pem n exists then there exist phi(phi(n)) many

Describe an example!

[orderofAmoduloN, 5]

1. Let n=7, phi(n)=6

2. Test a=2 … a3=1 → Not a pem 7

3. Test a=3 … a6=1 → Is a pem 7

4. Test a=5 … a6=1 → Is a pem 7

5. Because phi(phi(7))=phi(6)=|{1,5}|=2 we know we found all

What is the definition?

[dl, 2]

1. Let a be pem n and y in Zn*

2. There exists the unique dl x in {0,…,phi(n)-1} with ax equiv y (mod n) // x=logay

List them!

[comments.dl, 2]

1. Function y=ax mod n can be considered a one-way function

2. Exponentiation can be efficiently computed using “square and multiply algorithm”

What are the steps?

[squaremutliply.comments.dl, 2+3]

1. Input is x=(xt,…,x0) in N and a in N

2. Output is ax mod n

 

3. Init y←a

4. For(i=t-1; i>=0; --i) compute y←y² mod n and if xi=1 then y←y*a mod n

5. Return y

What is the characteristic?

[squaremutliply.comments.dl]

rounddown(log2x)+v(x)-1 many multiplications with v(x) number of bits with value “one” in the binary representation of x

What are the characteristics?

[DH.dl, 2]

1. Based on dl one-way function

2. (Unauthenticated) key agreement protocol allowing two parties to establish a shared secret key over an open channel

What is the definition?

[SG.DH.dl, 2]

1. Primes p<=N with 2p+1 also prime

2. |{p|p<=N and p SG-prime}|~ 2C2N/log²N many with C2~0.66

What are the steps?

[DH.dl, 5]

1. Prime p and a pem p are selected and published // Initial setup

2. A chooses a random secret x in {2,…,p-2} and sends u=ax mod p to B

3. B chooses a random secret y in {2,…,p-2} and sends v=ay mod p to A

4. B receives u and computes shared key uy=(ax)y mod p

5. A receives v and computes shared key vx=(ay)x mod p

What is the idea?

[proposition75.DH.dl]

Test if a is pem p

What is the definition?

[proposition75.DH.dl, 2]

1. Let p>=3 prime and p-1=Prodi=1kpit_i

2. a is pem p iff a(p-1)/p_i notequiv 1 (mod p) fa i in [1,k]

What are the characteristics?

[proposition75.DH.dl, 3]

1. Find appropriate p and a by choosing a SG-prime q

2. Randomly choose a in {2,…,p-1} until a² and aq notequiv 1 (mod p)

3. There are phi(phi(p))=phi(p-1)=phi(2)phi(q)=q-1 many // Probability to select pem p is q-1/p-2=q-1/2q-1~1/2

What is the definition?

[DHP.DH.dl, 2]

1. Given prime p, a pem p , ax mod p and ay mod p

2. Calculate axy mod p

What is the characteristic?

[DHP.DH.dl]

Open questions if an efficient algorithm for the DHP is one for dl

What are the characteristics?

[mitm.DH.dl, 2]

1. Active intruder O

2. Use aq=a(p-1)/2 has order 2 since (a(p-1)/2)² equiv ap-1 equiv 1 (mod p) // Fermat’s little theorem

What are the steps?

[1.mitm.DH.dl, 2]

1. O intercepts key exchange by axq and ayq thus A and B share axyq

2. O knows that axyq=(aq)xy equiv aq equiv ±1 (mod p) // Try out both possibilities

How to avoid?

[1.mitm.DH.dl]

Avoid by checking that received messages are both different from ±1 mod p

What are the steps?

[2.mitm.DH.dl, 2]

1. O computes x0 and y0

2. Decrypt and encrypt before sending further

How to avoid?

[2.mitm.DH.dl]

Avoid by use of digital signatures

What is the idea?

[shamir.dl, 2]

1. No-key protocol

2. Princess and knight with box locked by two different padlocks

What is the definition?

[proposition77.shamir.dl, 2]

1. Let p prime and a,b in Zp-1*

2. Fa m in Zp it holds that maba’b’ equiv m (mod p)

What is the proof?

[proposition77.shamir.dl, 2]

1. Use fact that bb’=t(p-1)+1 with ct(p-1) equiv 1 (mod p)

2. maba’b’ mod p = (ma mod p)bb’a’ mod p = cbb’a’ mod p = ca’ mod p = m mod p

What are the steps?

[shamir.dl, 6]

1. Publish prime p // Initial setup

2. A and B choose secret random numbers a,b in Zp-1* with a’,b’

3. A sends c1=ma mod p to B

4. B sends c2=c1b mod p to A

5. A sends c3=c2a’ mod p to B

6. B computes m=c3b’ mod p

What is the characteristic?

[shamir.dl]

Protocol does not include authentication, hence offers protection from passive adversaries only