Abstract
We obtain rigorous upper bounds on the number of primes p ≤ x for which p- 1 is smooth or has a large smooth factor. Conjecturally these bounds are nearly tight. As a corollary, we show that for almost all primes p the multiplicative order of 2 modulo p is not smooth, and we prove a similar but weaker result for almost all odd numbers n. We also discuss some cryptographic applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
W. R. Alford, A. Granville and C. Pomerance, ‘There are infinitely many Carmichael numbers,’ Annals Math. 140 (1994), 703–722.
R. C. Baker and G. Harman, ‘Shifted primes without large prime factors,’ Acta Arith. 83 (1998), 331–361.
D. Bleichenbacher, ‘Generating ElGamal signatures without knowing the secret key,’ Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1070 (1996), 10–18.
D. Boneh and R. Venkatesan, ‘Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes,’ Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1109 (1996), 129–142.
R. Crandall and C. Pomerance, Prime numbers: a computational perspective, Springer-Verlag, New York, 2001.
P. Erdős, ‘On the normal number of prime factors of p-1 and some other related problems concerning Euler’s ø-function,’ Quart. J. Math. (Oxford Ser.) 6 (1935), 205–213.
A. Granville, ‘Integers without large prime factors, in arithmetic progressions. II,’ Philos. Trans. Roy. Soc. London Ser. A 345 (1993), 349–362.
A. Granville, ‘Smooth numbers: computational number theory and beyond,’ Proc. MSRI Conf. Algorithmic Number Theory: Lattices, Number Fields, Curves, and Cryptography, Berkeley, 2000, J. Buhler and P. Stevenhagen, eds., Cambridge University Press, to appear.
H. Halberstam and H.-E. Richert, Sieve methods, Academic Press, London, 1974.
C. Hooley, ‘On Artin’s conjecture,’ J. Reine Angew. Math. 225 (1967), 209–220.
C. Hooley, Applications of sieve methods to the theory of numbers, Cambridge Tracts in Mathematics, No. 70, Cambridge University Press, Cambridge-New York-Melbourne, 1976.
H. W. Lenstra, Jr., ‘Factoring integers with elliptic curves,’ Ann. of Math. 2 (1987), 649–673.
S. Li and C. Pomerance, ‘On generalizing Artin’s conjecture on primitive roots to composite moduli,’ Preprint, 2001.
A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1996.
G. Martin, ‘An asymptotic formula for the number of smooth values of a polynomial,’ J. Number Theory 93 (2002), 108–182.
P. Moree, ‘A note on Artin’s conjecture,’ Simon Stevin 67 (1993), 255–257.
M. R. Murty and F. Saidak, ‘Non-abelian generalizations of the Erdős-Kac theorem,’ Preprint, 2001.
C. Pomerance, ‘Popular values of Euler’s function,’ Mathematika 27 (1980), 84–89.
C. Pomerance, ‘Fast, rigorous factorization and discrete logarithm algorithms,’ Discrete Algorithms and Complexity, Academic Press, 1987, 119–143
C. Pomerance and J. Sorenson, ‘Counting the integers factorable via cyclotomic methods,’ J. Algorithms 19 (1995), 250–265.
O. Schirokauer, ‘Discrete logarithms and local units,’ Philos. Trans. Roy. Soc. London, Ser. A 345 (1993), 409–423.
O. Schirokauer, D. Weber and T. Denny, ‘Discrete logarithms: The effectiveness of the index calculus method,’ Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1122 (1996), 337–362.
V. Shoup, ‘Smoothness and factoring polynomials over finite fields,’ Inform. Proc. Letters, 38 (1991), 39–42.
D. R. Stinson, Cryptography: Theory and Practice, CRC Press, Boca Raton, FL, 1995.
G. Tenenbaum, Introduction to analytic and probabilistic number theory, University Press, Cambridge, UK, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pomerance, C., Shparlinski, I.E. (2002). Smooth Orders and Cryptographic Applications. In: Fieker, C., Kohel, D.R. (eds) Algorithmic Number Theory. ANTS 2002. Lecture Notes in Computer Science, vol 2369. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45455-1_27
Download citation
DOI: https://doi.org/10.1007/3-540-45455-1_27
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43863-2
Online ISBN: 978-3-540-45455-7
eBook Packages: Springer Book Archive