10.12.2012 Views

Prime Numbers

Prime Numbers

Prime Numbers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

302 Chapter 6 SUBEXPONENTIAL FACTORING ALGORITHMS<br />

Assuming the ERH, see Conjecture 1.4.2, an algorithm of Shanks<br />

deterministically factors n in a running-time bound of O(n 1/5+o(1) ). This<br />

method is described in Section 5.6.4.<br />

That is it for rigorous, deterministic methods. What, then, of probabilistic<br />

methods? The first subexponential probabilistic factoring algorithm with a<br />

completely rigorous analysis was the “random-squares method” of J. Dixon;<br />

see [Dixon 1981]. His algorithm is to take random integers r in [1,n], looking<br />

for those where r 2 mod n is smooth. If enough are found, then congruent<br />

squares can be assembled, as in QS, and so a factorization of n may be<br />

attempted. The randomness of the numbers r that are used allows one to say<br />

rigorously how frequently the residues r 2 mod n are smooth, and how likely<br />

the congruent squares assembled lead to a nontrivial factorization of n. Dixon<br />

showedthat the expected running time for his algorithm to split n is bounded<br />

by exp (c + o(1)) √ <br />

ln n ln ln n ,wherec = √ 8. Subsequent improvements by<br />

Pomerance and later by B. Vallée lowered c to 4/3.<br />

The current lowest running-time bound for a rigorous probabilistic<br />

factoring algorithm is exp((1 + o(1)) √ ln n ln ln n). This is achieved by the<br />

“class-group-relations method” of [Lenstra and Pomerance 1992]. Previously,<br />

this time bound was achieved by A. Lenstra for a very similar algorithm,<br />

but the analysis required the use of the ERH. It is interesting that this time<br />

bound is exactly the same as that heuristically achieved by QS. Again the<br />

devil is in the “o(1),” making the class-group-relations method impractical in<br />

comparison.<br />

It is interesting that both the improved versions of the random-squares<br />

method and the class-group-relations method use ECM as a subroutine to<br />

quickly recognize smooth numbers. One might well wonder how a not-yetrigorously<br />

analyzed algorithm can be used as a subroutine in a rigorous<br />

algorithm. The answer is that one need not show that the subroutine<br />

always works, just that it works frequently enough to be of use. It can be<br />

shown rigorously that ECM recognizes most y-smooth numbers below x in<br />

y o(1) ln x arithmetic operations with integers the size of x. Theremaybesome<br />

exceptional numbers that are stubborn for ECM, but they are provably rare.<br />

Concerning the issue of smoothness tests, a probabilistic algorithm<br />

announced in [Lenstra et al. 1993b] recognizes all y-smooth numbers n in<br />

y o(1) ln n arithmetic operations. That is, it performs similarly as ECM, but<br />

unlike ECM, the complexity estimate is completely rigorous and there are<br />

provably no exceptional numbers.<br />

6.4 Index-calculus method for discrete logarithms<br />

In Chapter 5 we described some general algorithms for the computation of<br />

discrete logarithms that work in virtually any cyclic group for which we can<br />

represent group elements on a computer and perform the group operation.<br />

These exponential-time algorithms have the number of steps being about<br />

the square root of the group order. In certain specific groups we have more

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!