10.12.2012 Views

Prime Numbers

Prime Numbers

Prime Numbers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

402 Chapter 8 THE UBIQUITY OF PRIME NUMBERS<br />

1998], it is shown that most of the bits of xn can be kept, and the result is<br />

still cryptographically secure. There is thus much less computation per bit.<br />

There are many other generators in current use, such as shift-register,<br />

chaotic, and cellular-automata (CA) generators. Some generators have been<br />

cryptographically “broken,” notably the simpler congruential ones, even if<br />

the linear congruence is replaced with higher polynomial forms [Lagarias<br />

1990]. One dilemma that besets researchers in this field is that the generators<br />

that may well be quite “secure,” such as the discrete exponential variety<br />

that in turn depends on the DL problem for its security, are sluggish.<br />

Incidentally, there are various standard randomness tests, especially as regard<br />

random generation of binary bits, which can often be invoked to demolish—<br />

alternatively to bestow some measure of confidence upon—a given generator<br />

[Menezes et al. 1997].<br />

On the issue of security, an interesting idea due to V. Miller is to use<br />

a linear-congruential generator, but with elliptic addition. Given an elliptic<br />

curve E over a finite field, one might choose integer a and point B ∈ E and<br />

iterate<br />

Pn+1 =[a]Pn + B, (8.1)<br />

where the addition is elliptic addition and now the seed will be some initial<br />

point P0 ∈ E. One might then use the x-coordinate of Pn as a random<br />

field element. This scheme is not as clearly breakable as is the ordinary<br />

linear congruential scheme. It is of interest that certain multipliers a, suchas<br />

powers of two, would be relatively efficient because of the implied simplicity<br />

of the elliptic multiplication ladder. Then, too, one could perhaps use reduced<br />

operations inherent in Algorithm 7.2.8. In other words, use only x-coordinates<br />

and live with the ambiguity in [a]P ± B, never actually adding points per se,<br />

but having to take square roots.<br />

Incidentally, a different approach to the use of elliptic curves for random<br />

generators appears in [Gong et al. 1999], where the older ideas of shift registers<br />

and codewords are generalized to curves over F2m (see Exercise 8.29).<br />

Along the same lines, let us discuss for a moment the problem of random<br />

bit generation. Surely, one can contemplate using some bit—such as the lowest<br />

bit—of a “good” random-number generator. But one wonders, for example,<br />

whether the calculation of Legendre symbols appropriate to point-finding on<br />

elliptic curves,<br />

<br />

3 x + ax + b<br />

= ±1,<br />

p<br />

with x running over consecutive integers in an interval and with the (rare)<br />

zero value thrown out, say, constitute a statistically acceptable random walk<br />

of ±1 values. And one wonders further whether the input of x into a Legendresymbol<br />

machine, but from a linear-congruential or other generator, provides<br />

extra randomness in any statistical sense.<br />

Such attempts at random bit streams should be compared statistically to<br />

the simple exclusive-or bit generators. An example given in [Press et al. 1996]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!