Cryptography Reference
In-Depth Information
x
mn
= x
m
x
n
·
Z n x n = n · n =1.
Last but not least, Gauss' law of quadratic reciprocity suggests that if
gcd ( m, n )=1and m, n > 2,then
Consequently, for x
m
n
n
m
=(
1) ( m− 1)( n− 1) / 4 .
Thanks to these properties, there is an efficient 27
(and recursive) algorithm
for computing n , which does not require the prime factorization of n . We don't
elaborate on this algorithm. For the purpose of this topic, it is sufficient to know that
an efficient algorithm for computing n exists.
As mentioned earlier, the fact that the Jacobi symbol of x modulo n is 1 does
not necessarily imply that x
Z n with
QR n .Let J n be the set of all elements of
Jacobi symbol 1:
x
n
=1
Z n |
J n =
{
x
}
Z n that are quadratic
nonresidue, but still have Jacobi symbol 1. These elements are called pseudosquares
modulo n , denoted as QR n (i.e., QR n = J n \
Obviously, QR n
J n and there are elements x
QR n ).
Let n = pq be the product of two primes. Then
Z n has φ ( n )=( p
1)
elements, and these elements can be partitioned into two equally large sets. One half
of the elements (i.e., J n ) has Jacobi symbol 1, and the other half of the elements
has Jacobi symbol
1)( q
1. J n can be further partitioned into two equally large sets (i.e.,
QR n ) with
|QR n |
QR n and
|
QR n |
=( p
1)( q
1) / 4. For example, if p =3
=
and q =7,then n =3
·
Z 21 =
{
1 , 2 , 4 , 5 , 8 , 10 , 11 , 13 , 16 , 17 , 19 , 20
}
7=21,
,and
φ (21) = 2
·
6=12. J 21
has 6 elements and these elements can be partitioned as
follows :
J 21
=
{
1 , 4 , 5 , 16 , 17 , 20
}
QR 21
=
{
1 , 4 , 16
}
QR 21
{
5 , 17 , 20
}
=
The algorithm has a running time of O ((ln n ) 3 ) bit operations.
27
Search WWH ::




Custom Search