Abstract
This chapter presents another public-key cryptographic method used world-wide, the Diffie-Hellman key exchange. Section 8.5 introduced an efficient algorithm for finding \(h = g^{m}\) where g is an element of a finite group, for example when the group is the group of units modulo a prime p and m is a large exponent. The reverse problem, given g and h, find m, is called the discrete logarithm problem, and is a hard problem. The security of Diffie-Hellman key exchange and the closely related ElGamal cryptosystem is based on that fact. Needed for Diffie-Hellman are cyclic groups of large order. We find many such groups by proving the Primitive Root Theorem, which states that for every prime number p, the group of units of \(\mathbb {Z}_{p}\) is a cyclic group. The chapter concludes with two methods that can be more efficient than constructing log tables for solving the discrete logarithm problem; one method involves use of the Chinese Remainder Theorem.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Childs, L.N. (2019). Cyclic Groups and Cryptography. In: Cryptology and Error Correction. Springer Undergraduate Texts in Mathematics and Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-15453-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-15453-0_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15451-6
Online ISBN: 978-3-030-15453-0
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)