10.12.2012 Views

Prime Numbers

Prime Numbers

Prime Numbers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

234 Chapter 5 EXPONENTIAL FACTORING ALGORITHMS<br />

The usual case where this method is applied is when the order n is prime,<br />

so as long as the various random numbers r chosen at the start by each node<br />

are all distinct modulo n, then the above congruence can be easily solved for<br />

the discrete logarithm l. (This is true unless we have the misfortune that the<br />

collision occurs on one of the nodes; that is, r = r ′ . However, if the number of<br />

nodes is large, an internodal collision is much more likely than an intranodal<br />

collision.)<br />

It is also possible to use the pseudorandom function discussed in Section<br />

5.2.2 in connection with the lambda method. In this case all collisions are<br />

useful: A collision occurring on one particular walk with itself can also be used<br />

to compute our discrete logarithm. That is, in this collision event, the lambda<br />

method has turned itself into the rho method. However, if one already knows<br />

that the discrete logarithm that one is searching for is in a small interval, the<br />

above method can be used, and the time spent should be about the square<br />

root of the interval length. However, the mean value of the set of integers in<br />

S needs to be smaller, so that the kangaroos are hopping only through the<br />

appropriate interval.<br />

A central computer needs to keep track of all the sequences on all the<br />

nodes so that collisions may be detected. By the birthday paradox, we expect<br />

a collision when the number of terms of all the sequences is O( √ n). It is clear<br />

that as described, this method has a formidable memory requirement for the<br />

central computer. The following idea, described in [van Oorschot and Wiener<br />

1999] (and attributed to J.-J. Quisquater and J.-P. Delescaille, who in turn<br />

acknowledge R. Rivest) greatly mitigates the memory requirement, and so<br />

renders the method practical for large problems. It is to consider so-called<br />

distinguished points. We presume that the group elements are represented<br />

by integers (or perhaps tuples of integers). A particular field of length k of<br />

binary digits will be all zero about 1/2 k of the time. A random walk should<br />

pass through such a distinguished point about every 2 k steps on average.<br />

If two random walks ever collide, they will coincide thereafter, and both<br />

will hit the next distinguished point together. So the idea is to send only<br />

distinguished points to the central computer, which cuts the rather substantial<br />

space requirement down by a factor of 2 −k .<br />

A notable success is the March 1998 calculation of a discrete logarithm<br />

in an elliptic-curve group whose order is a 97-bit prime n; see [Escott et al.<br />

1998]. A group of 588 people in 16 countries used about 1200 computers over<br />

53 days to complete the task. Roughly 2 · 10 14 elliptic-curve group additions<br />

were performed, with the number of distinguished points discovered being<br />

186364. (The value of k in the definition of distinguished point was 30, so<br />

only about one out of each billion sequence steps was reported to the main<br />

computer.) In 2002, an elliptic-curve discrete logarithm (EDL) extraction was<br />

completed with a 109-bit (= 33-decimal-digit) prime; see the remarks following<br />

Algorithm 8.1.8.<br />

For discrete logarithms in the multiplicative group of a finite field we<br />

have subexponential methods (see Section 6.4), with significantly larger cases<br />

being handled. The current record for discrete logarithms over Fp is a 2001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!