Abstract

A cryptographic system is described which is secure if and only if computing logarithms over <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">GF(p)</tex> is infeasible. Previously published algorithms for computing this function require <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">O(p^{1/2})</tex> complexity in both time and space. An improved algorithm is derived which requires <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">O =(\log^{2} p)</tex> complexity if <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">p - 1</tex> has only small prime factors. Such values of <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">p</tex> must be avoided in the cryptosystem. Constructive uses for the new algorithm are also described.

Keywords

CryptographyAlgorithmDiscrete logarithmComputer scienceCryptosystemDiscrete mathematicsLogarithmMathematicsTheoretical computer scienceEncryptionPublic-key cryptographyOperating system

Affiliated Institutions

Related Publications

Maximum distanceq-nary codes

A <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">q</tex> -nary error-correcting code with <tex xmlns:mml="http://www.w3.org/1998/...

1964 IEEE Transactions on Information Theory 508 citations

Publication Info

Year
1978
Type
article
Volume
24
Issue
1
Pages
106-110
Citations
1179
Access
Closed

External Links

Social Impact

Social media, news, blog, policy document mentions

Citation Metrics

1179
OpenAlex

Cite This

S.C. Pohlig, Martin E. Hellman (1978). An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.). IEEE Transactions on Information Theory , 24 (1) , 106-110. https://doi.org/10.1109/tit.1978.1055817

Identifiers

DOI
10.1109/tit.1978.1055817