skip to main content
research-article

Discrete logarithms inGF(p)

Published: 01 January 1986 Publication History

Abstract

Several related algorithms are presented for computing logarithms in fieldsGF(p),p a prime. Heuristic arguments predict a running time of exp((1+o(1))) for the initial precomputation phase that is needed for eachp, and much shorter running times for computing individual logarithms once the precomputation is done. The running time of the precomputation is roughly the same as that of the fastest known algorithms for factoring integers of size aboutp. The algorithms use the well known basic scheme of obtaining linear equations for logarithms of small primes and then solving them to obtain a database to be used for the computation of individual logarithms. The novel ingredients are new ways of obtaining linear equations and new methods of solving these linear equations by adaptations of sparse matrix methods from numerical analysis to the case of finite rings. While some of the new logarithm algorithms are adaptations of known integer factorization algorithms, others are new and can be adapted to yield integer factorization algorithms.

References

[1]
L. M. Adleman, “A subexponential algorithm for the discrete logarithm problem with applications to cryptography,”Proc. 20th IEEE Found. Comp. Sci. Symp. (1979), 55–60.
[2]
Canfield E. R., Erdös P., and Pomerance C. On a problem of Oppenheim concerning ‘Factorisatio Numerorum’ J. Number Theory 1983 17 1-28
[3]
Coppersmith D. Fast evaluation of logarithms in fields of characteristic two IEEE Trans. Inform. Theory IT 1984 -30 587-594
[4]
Coppersmith D. and Winograd S. On the asymptotic complexity of matrix multiplication SIAM J. Comput. 1982 11 472-492
[5]
T. ElGamal, “A subexponential-time algorithm for computing discrete logarithms overGF(p2),”IEEE Trans. Inform. Theory, to appear.
[6]
Hestenes M. R. and Stiefel E. Method of conjugate gradients for solving linear systems J. Res. Nat. Bur. Standards, Sect. B 1952 49 409-436
[7]
Lanczos C. An iterative method for the solution of the eigenvalue problem of linear differential and integral operators J. Res. Nat. Bur. Standards, Sect. B 1950 45 255-282
[8]
H. W. Lenstra, Jr., paper in preparation.
[9]
A. M. Odlyzko, “Discrete logarithms in finite fields and their cryptographic significance,” to appear,Proceedings of Eurocrypt '84, Springer Lecture Notes in Computer Science.
[10]
Pollard J. M. A Monte Carlo method for factorization BIT 1975 15 331-334
[11]
C. Pomerance, “Analysis and comparison of some integer factoring algorithms,” pp. 89–139 inComputational Methods in Number Theory: Part I, H. W. Lenstra, Jr., and R. Tijdeman, eds., Math. Centre Tract 154, Math. Centre Amsterdam, 1982.
[12]
J. M. Reyneri, unpublished manuscript.
[13]
Strassen V. Gaussian elimination is not optimal Numer. Math. 1969 13 354-356
[14]
D. Wiedemann, “Solving sparse linear equations over finite fields,”IEEE Trans. Inform. Theory, to appear.
[15]
A. E. Western and J. C. P. Miller,Tables of Indices and Primitive Roots, Royal Society Mathematical Tables, vol. 9, Cambridge Univ. Press, 1968.

Cited By

View all
  • (2023)Elimination ideal and bivariate resultant over finite fieldsProceedings of the 2023 International Symposium on Symbolic and Algebraic Computation10.1145/3597066.3597100(526-534)Online publication date: 24-Jul-2023
  • (2022)Integrating Real-Time and Non-Real-Time Collaborative ProgrammingProceedings of the ACM on Human-Computer Interaction10.1145/35675637:GROUP(1-19)Online publication date: 29-Dec-2022
  • (2022)Seq2Parse: neurosymbolic parse error repairProceedings of the ACM on Programming Languages10.1145/35633306:OOPSLA2(1180-1206)Online publication date: 31-Oct-2022
  • Show More Cited By

Index Terms

  1. Discrete logarithms inGF(p)
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Reviews

    Thomas Rainer Michael Fischer

    Several related algorithms are presented for computing logarithms in fields GF( p); that is, given integers a, b and a prime p, computing an integer x such that a x :3W.9T b mod p if such an x exists. The algorithms differ from previous approaches by making use of new methods of generating linear equations over finite rings and also by utilizing new techniques of solving them by adaptations of sparse matrix methods to the case of finite rings. Heuristic arguments predict a running time of exp((1 + o(1)) :.PC12 :3Wz:Hlog :Cp:A log log :Cp:A:9U) for the initial precomputation phase required for each p, and much shorter time for computing individual logarithms once the precomputation is done. All algorithms are described informally. While some of the methods used are modifications of known algorithms, others seem to be new and can perhaps be adapted to integer factorization problems. The achieved running times substantially improve upon previously published algorithms.

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Information & Contributors

    Information

    Published In

    cover image Algorithmica
    Algorithmica  Volume 1, Issue 1-4
    Nov 1986
    517 pages

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 01 January 1986
    Revision received: 01 June 1985
    Received: 02 February 1985

    Author Tags

    1. Cryptography
    2. Number theory
    3. Discrete logarithms

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Elimination ideal and bivariate resultant over finite fieldsProceedings of the 2023 International Symposium on Symbolic and Algebraic Computation10.1145/3597066.3597100(526-534)Online publication date: 24-Jul-2023
    • (2022)Integrating Real-Time and Non-Real-Time Collaborative ProgrammingProceedings of the ACM on Human-Computer Interaction10.1145/35675637:GROUP(1-19)Online publication date: 29-Dec-2022
    • (2022)Seq2Parse: neurosymbolic parse error repairProceedings of the ACM on Programming Languages10.1145/35633306:OOPSLA2(1180-1206)Online publication date: 31-Oct-2022
    • (2022)Democratizing CryptographyundefinedOnline publication date: 24-Aug-2022
    • (2021)Non-interactive Zero Knowledge from Sub-exponential DDHAdvances in Cryptology – EUROCRYPT 202110.1007/978-3-030-77870-5_1(3-32)Online publication date: 17-Oct-2021
    • (2019)Enabling Social Information Exchange via Dynamically Robust AnnotationsProceedings of the 21st International Conference on Information Integration and Web-based Applications & Services10.1145/3366030.3366060(176-184)Online publication date: 2-Dec-2019
    • (2019)Paying Crowd Workers for Collaborative WorkProceedings of the ACM on Human-Computer Interaction10.1145/33592273:CSCW(1-24)Online publication date: 7-Nov-2019
    • (2019)SootDiff: bytecode comparison across different Java compilersProceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis10.1145/3315568.3329966(14-19)Online publication date: 22-Jun-2019
    • (2018)Smooth q-Gram, and Its Applications to Detection of Overlaps among Long, Error-Prone Sequencing ReadsProceedings of the 27th ACM International Conference on Information and Knowledge Management10.1145/3269206.3271688(267-276)Online publication date: 17-Oct-2018
    • (2018)ClDiff: generating concise linked code differencesProceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering10.1145/3238147.3238219(679-690)Online publication date: 3-Sep-2018
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media