The Relationship Between Breaking the Diffie--Hellman Protocol and Computing Discrete Logarithms
- 1 January 1999
- journal article
- Published by Society for Industrial & Applied Mathematics (SIAM) in SIAM Journal on Computing
- Vol. 28 (5) , 1689-1721
- https://doi.org/10.1137/s0097539796302749
Abstract
Both uniform and nonuniform results concerning the security of the Diffie--Hellman key-exchange protocol are proved. First, it is shown that in a cyclic group G of order |G|=\prod{p_i^{e_i}}$, where all the multiple prime factors of |G| are polynomial in log|G|, there exists an algorithm that reduces the computation of discrete logarithms in G to breaking the Diffie--Hellman protocol in G and has complexity $\sqrt{\max\{\nu(p_i)\}}\cdot(\log|G|)^{O(1)}$, where $\nu(p)$ stands for the minimum of the set of largest prime factors of all the numbers d in the interval $[p-2\sqrt{p}+1,p+2\sqrt{p}+1]$. Under the unproven but plausible assumption that $\nu(p)$ is polynomial in log p, this reduction implies that the Diffie--Hellman problem and the discrete logarithm problem are polynomial-time equivalent in G. Second, it is proved that the Diffie--Hellman problem and the discrete logarithm problem are equivalent in a uniform sense for groups whose orders belong to certain classes: there exists a polynomial-time reduction algorithm that works for all those groups. Moreover, it is shown that breaking the Diffie--Hellman protocol for a small but nonnegligible fraction of the instances is equally difficult as breaking it for all instances. Finally, efficient constructions of groups are described for which the algorithm reducing the discrete logarithm problem to the Diffie--Hellman problem is efficiently constructible.
Keywords
This publication has 19 references indexed in Scilit:
- Primality Testing and Abelian Varieties Over Finite FieldsLecture Notes in Mathematics, 1992
- A Classical Introduction to Modern Number TheoryPublished by Springer Nature ,1990
- Hyperelliptic cryptosystemsJournal of Cryptology, 1989
- Factoring with cyclotomic polynomialsMathematics of Computation, 1989
- A key-exchange system based on imaginary quadratic fieldsJournal of Cryptology, 1988
- Computing in the Jacobian of a hyperelliptic curveMathematics of Computation, 1987
- Elliptic curve cryptosystemsMathematics of Computation, 1987
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- On a problem of Oppenheim concerning “factorisatio numerorum”Journal of Number Theory, 1983
- New directions in cryptographyIEEE Transactions on Information Theory, 1976