CYG Chapter 7 The Discrete Logarithm
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 7 The Discrete Logarithm
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 7 The Discrete Logarithm
Set of flashcards Details
Flashcards | 29 |
---|---|
Language | English |
Category | Computer Science |
Level | University |
Created / Updated | 21.03.2017 / 24.08.2017 |
Weblink |
https://card2brain.ch/box/20170321_cyg_chapter_7_the_discrete_logarithm
|
Embed |
<iframe src="https://card2brain.ch/box/20170321_cyg_chapter_7_the_discrete_logarithm/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
What is the characteristic?
[motivation.dl]
Basis of numerous cryptographic protocols // Most famous is ElGamal cs
What is the definition?
[orderofAmoduloN, 3]
1. Let n in N\{1} and a in Zn*
2. ordn(a)=min{k in {1,…,phi(n)}| ak equiv 1 (mod n)}
3. If ordn(a)=phi(n) then a is called “pem n”
What are the characteristics?
[orderofAmoduloN, 2]
1. There exists no 1<=i<j<=phi(n) with ai equiv aj (mod n) and thus aj-i equiv 1 (mod n)
2. Hence <a> is a cyclic group
What is the definition?
[cyclicgroup.orderofAmoduloN, 2]
1. <a>={a,a2,…,aphi(n)}=Zn* // Consists just of powers of a
2. a is called generator
What is the idea?
[theorem72.orderofAmoduloN]
Is for given n the group Zn* cyclic or not?
What is the definition?
[theorem72.orderofAmoduloN, 3]
1. Let n in N
2. pem n exists iff n in {2,4,pk,2pk|p>=3 prime and k in N}
3. If pem n exists then there exist phi(phi(n)) many
Describe an example!
[orderofAmoduloN, 5]
1. Let n=7, phi(n)=6
2. Test a=2 … a3=1 → Not a pem 7
3. Test a=3 … a6=1 → Is a pem 7
4. Test a=5 … a6=1 → Is a pem 7
5. Because phi(phi(7))=phi(6)=|{1,5}|=2 we know we found all
What is the definition?
[dl, 2]
1. Let a be pem n and y in Zn*
2. There exists the unique dl x in {0,…,phi(n)-1} with ax equiv y (mod n) // x=logay
List them!
[comments.dl, 2]
1. Function y=ax mod n can be considered a one-way function
2. Exponentiation can be efficiently computed using “square and multiply algorithm”
What are the steps?
[squaremutliply.comments.dl, 2+3]
1. Input is x=(xt,…,x0) in N and a in N
2. Output is ax mod n
3. Init y←a
4. For(i=t-1; i>=0; --i) compute y←y² mod n and if xi=1 then y←y*a mod n
5. Return y
What is the characteristic?
[squaremutliply.comments.dl]
rounddown(log2x)+v(x)-1 many multiplications with v(x) number of bits with value “one” in the binary representation of x
What are the characteristics?
[DH.dl, 2]
1. Based on dl one-way function
2. (Unauthenticated) key agreement protocol allowing two parties to establish a shared secret key over an open channel
What is the definition?
[SG.DH.dl, 2]
1. Primes p<=N with 2p+1 also prime
2. |{p|p<=N and p SG-prime}|~ 2C2N/log²N many with C2~0.66
What are the steps?
[DH.dl, 5]
1. Prime p and a pem p are selected and published // Initial setup
2. A chooses a random secret x in {2,…,p-2} and sends u=ax mod p to B
3. B chooses a random secret y in {2,…,p-2} and sends v=ay mod p to A
4. B receives u and computes shared key uy=(ax)y mod p
5. A receives v and computes shared key vx=(ay)x mod p
What is the idea?
[proposition75.DH.dl]
Test if a is pem p
What is the definition?
[proposition75.DH.dl, 2]
1. Let p>=3 prime and p-1=Prodi=1kpit_i
2. a is pem p iff a(p-1)/p_i notequiv 1 (mod p) fa i in [1,k]
What are the characteristics?
[proposition75.DH.dl, 3]
1. Find appropriate p and a by choosing a SG-prime q
2. Randomly choose a in {2,…,p-1} until a² and aq notequiv 1 (mod p)
3. There are phi(phi(p))=phi(p-1)=phi(2)phi(q)=q-1 many // Probability to select pem p is q-1/p-2=q-1/2q-1~1/2
What is the definition?
[DHP.DH.dl, 2]
1. Given prime p, a pem p , ax mod p and ay mod p
2. Calculate axy mod p
What is the characteristic?
[DHP.DH.dl]
Open questions if an efficient algorithm for the DHP is one for dl
What are the characteristics?
[mitm.DH.dl, 2]
1. Active intruder O
2. Use aq=a(p-1)/2 has order 2 since (a(p-1)/2)² equiv ap-1 equiv 1 (mod p) // Fermat’s little theorem
What are the steps?
[1.mitm.DH.dl, 2]
1. O intercepts key exchange by axq and ayq thus A and B share axyq
2. O knows that axyq=(aq)xy equiv aq equiv ±1 (mod p) // Try out both possibilities
How to avoid?
[1.mitm.DH.dl]
Avoid by checking that received messages are both different from ±1 mod p
What are the steps?
[2.mitm.DH.dl, 2]
1. O computes x0 and y0
2. Decrypt and encrypt before sending further
How to avoid?
[2.mitm.DH.dl]
Avoid by use of digital signatures
What is the idea?
[shamir.dl, 2]
1. No-key protocol
2. Princess and knight with box locked by two different padlocks
What is the definition?
[proposition77.shamir.dl, 2]
1. Let p prime and a,b in Zp-1*
2. Fa m in Zp it holds that maba’b’ equiv m (mod p)
What is the proof?
[proposition77.shamir.dl, 2]
1. Use fact that bb’=t(p-1)+1 with ct(p-1) equiv 1 (mod p)
2. maba’b’ mod p = (ma mod p)bb’a’ mod p = cbb’a’ mod p = ca’ mod p = m mod p
What are the steps?
[shamir.dl, 6]
1. Publish prime p // Initial setup
2. A and B choose secret random numbers a,b in Zp-1* with a’,b’
3. A sends c1=ma mod p to B
4. B sends c2=c1b mod p to A
5. A sends c3=c2a’ mod p to B
6. B computes m=c3b’ mod p
What is the characteristic?
[shamir.dl]
Protocol does not include authentication, hence offers protection from passive adversaries only