Abstract
In 1999 Gong and Harn proposed a new cryptosystem based on third-order characteristic sequences with period p 2k + p k + 1 for a large prime p and fixed k. In order to find key parameters and therefore to construct a polynomial whose characteristic sequence is equal to p 2k + p k + 1 one should generate a prime p such that the prime factorization of the number p 2k + p k + 1 is known. In this paper we propose new, efficient methods for finding the prime p and the factorization of the aforementioned number. Our algorithms work faster in practice than those proposed before. Moreover, when used for generating of XTR key parameters, they are a significant improvement over the Lenstra-Verheul Algorithm. Our methods have been implemented in C++ using LiDIA and numerical test are presented.
Partially supported by Ministry of Science and Higher Education, grant N N206 2701 33, 2007–2010.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, M., Kayal, K., Saxena, N.: Primes is P. Ann. of Math. 160, 781–793 (2004)
Bach, E., Shallit, J.: Algorithmic Number Theory. Efficient Algorithms, vol. I. MIT Press, Cambridge (1996)
Bateman, P.T., Horn, R.A.: A Heuristic Asymptotic Formula Concerning the Distribution of Prime Numbers. Math. Comp. 16, 119–132 (1962)
Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, Heidelberg (1995)
Davenport, H.: Multiplicative Number Theory. Springer, New York (1980)
Gong, G., Harn, L.: Public-Key Cryptosystems Based on Cubic Finite Field Extension. IEEE IT 45(7), 2601–2605 (1999)
Gong, G., Harn, L.: A New Approach on Public-key Distribution. ChinaCRYPT, pp. 50–55 (1998)
Giuliani, K., Gong, G.: Generating Large Instances of the Gong-Harn Cryptosytem. In: Proceedings of Cryptography and Coding: 8th International Conference Cirencester. LNCS, vol. 2261. Springer, Heidelberg (2002)
Giuliani, K., Gong, G.: Analogues to the Gong-Harn and XTR Cryptosystem. Combinatorics and Optimization Research Report CORR 2003-34, University of Waterloo (2003)
Heath-Brown, D.R.: Almost-primes in Arithmetic Progression and Short Intervals. Proc. London Proc. Cambridge Phil. Soc. 83, 357–375 (1978)
Heath-Brown, D.R.: Zero-free Regions for Dirichlet L-Functions and the Least Prime in an Arithmetic Progressions. Proc. London Math. Soc. 64(3), 265–338 (1992)
Iwaniec, H.: Primes Represented by Quadratic Polynomials in Two Variables. Acta Arith. 24, 435–459 (1974)
Lenstra, A.K., Verhuel, E.R.: The XTR Public Key System. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 1–19. Springer, Heidelberg (2000)
Lenstra, A.K., Verheul, E.R.: Fast Irreducibility and Subgroup Membership Testing in XTR. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 73–86. Springer, Heidelberg (2001)
Müller, S.: On the Computation of Cube Roots Modulo p. In: High Primes and Misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams. Fields Institute Communications Series, vol. 41 (2004)
Rabin, M.O.: Probabilistic Algorithm for Testing Primality. J. Number Theory 12, 128–138 (1980)
Rubin, K., Silverberg, A.: Using Primitive Subgrups to Do More with Fewer Bits. In: Buell, D.A. (ed.) ANTS 2004. LNCS, vol. 3076, pp. 18–41. Springer, Heidelberg (2004)
Rubin, K., Silverberg, A.: Torus-based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 349–365. Springer, Heidelberg (2003)
Schinzel, A., Sierpiński, W.: Sur Certaines Hypothèses Concernant Les Nombres Premiers. Acta Arith. 4, 185–208 (1956)
Wagstaff, S.: Greatest of the Least Primes in Arithmetic Progressions Having a Given Modulus. Math. Comp. 33, 1073–1080 (1979)
Williams, K., Hardy, K.: A Refinement of H. C. Williams’ qth Root Algorithm. Math. Comp. 61, 475–483 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Grześkowiak, M. (2008). On Generating Elements of Orders Dividing p 2k±p k + 1. In: Matsuura, K., Fujisaki, E. (eds) Advances in Information and Computer Security. IWSEC 2008. Lecture Notes in Computer Science, vol 5312. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89598-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-89598-5_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89597-8
Online ISBN: 978-3-540-89598-5
eBook Packages: Computer ScienceComputer Science (R0)