Cryptography Reference
In-Depth Information
Lemma 6.3.19 Given ( V i ,V i 1 ) and V one can compute ( V 2 i ,V 2 i 1 ) (i.e., “squaring”) or
( V 2 i + 1 ,V 2 i ) (i.e., “square-and-multiply”) in one multiplication, one squaring and two or
three additions in
F q .
Proof One must compute V i
and V i V i 1 and then apply part 4 and either part 5 or 7 of
Lemma 6.3.14 .
Exercise 6.3.20 Write the ladder algorithm for computing [ n ] V using Lucas sequences in
detail.
The storage requirement of the ladder algorithm is the same as when working in
F q 2 ,
although the output value is compressed to a single element of
F q . Note however that
computing a squaring alone in
F q 2 already requires more computation (at least when q is
not a power of 2) than Lemma 6.3.19 .
We have shown that for V
G q, 2 one can compute [ n ] V using polynomial operations
starting with the pair ( V, 2). Since G q, 2 is in one-to-one correspondence with G q, 2 /
σ
,it
is natural to consider G q, 2 as being an algebraic group quotient.
Performing discrete logarithm based cryptography in G q, 2 is sometimes called the
LUC cryptosystem. 6 To solve the discrete logarithm problem in G q, 2 , one usually lifts
the problem to the covering group G q, 2 ⊂ F q 2 by taking one of the roots in
F q 2 of the
polynomial x 2
Vx
+
1.
= F 37 ( θ ) where θ 2
Example 6.3.21 Define
F 37 2
3 θ
+
1
=
0. The element g
=−
1
+
3 θ
has order 19 and lies in G 37 , 2 . Write V
=
Tr F 37 2 / F 37 ( g )
=
7. To compute [6] V , one uses
the addition chain ( V 1 ,V 0 )
=
(7 , 2)
( V 3 ,V 2 )
=
(26 , 10)
( V 6 ,V 5 )
=
(8 , 31); this is
because 6
=
(110) 2 in binary so the intermediate values for i are (1) 2 =
1 and (11) 2 =
3.
Exercise 6.3.22 Using the same values as Example 6.3.21 compute [10] V .
Exercise 6.3.23
F q multiplications and squarings to compute a
squaring or a squaring-and-multiplication in the quotient G q, 2 using Lucas sequences with
the cost for general arithmetic in G q, 2 ⊂ F q 2 .
Compare the number of
6.4 The group G q, 6
F q 6 of order 6 ( q )
q 2
The group G q, 6 is the subgroup of
=
q
+
1. The natural represen-
tation of elements of G q, 6 requires 6 elements of
F q .
∈ F q 2 and θ 2
Assume (without loss of generality) that
F q 6
= F q 3 ( θ ) where θ
+
+
B
=
0forsome A,B
∈ F q .
6
The original LUC cryptosystem due to Smith and Lennon [ 515 ] was using Lucas sequences modulo a composite integer N ;
we refer to Section 6.6 for further discussion. The finite field version is only very briefly mentioned in [ 515 ], but is further
developed in [ 516 ].
Search WWH ::




Custom Search