Browse > Article
http://dx.doi.org/10.7236/JIIBC.2015.15.2.23

Baby-Step 2k-ary Adult-Step Algorithm for Symmetric-Key Decryption  

Lee, Sang-Un (Dept. of Multimedia Eng., Gangneung-Wonju National University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.15, no.2, 2015 , pp. 23-29 More about this Journal
Abstract
The baby-step giant-step algorithm seeks b in a discrete logarithm problem when a,c,p of $a^b{\equiv}c$(mod p) are already given. It does so by dividing p by m block of $m={\lceil}{\sqrt{p}}{\rceil}$ length and letting one giant walk straight toward $a^0$ with constant m strides in search for b. In this paper, I basically reduce $m={\lceil}{\sqrt{p}}{\rceil}$ to p/l, $a^l$ > p and replace a giant with an adult who is designed to walk straight with constant l strides. I also extend the algorithm to allow $2^k$ adults to walk simultaneously. As a consequence, the proposed algorithm quarters the execution time of the basic adult-walk method when applied to $2^k$, (k=2) in the range of $1{\leq}b{\leq}p-1$. In conclusion, the proposed algorithm greatly shorten the step number of baby-step giant-step.
Keywords
Discrete logarithm; Discrete exponentiation; Multiplicative order; Euler's totient function; Baby-step giant-step;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, "Introduction to Algorithms," 2nd Ed., MIT Press and McGraw-Hill. pp. 887-896, 2001.
2 D. R. Stinson, "Cryptography: Theory and Practice," 3rd ed., London, CRC Press, 2006.
3 M. Alfred, P. C. Oorschot, and S. A. Vanstone, "Handbook of Applied Cryptography", CRC Press, 1996.
4 R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.   DOI
5 B. Raiter, "How the RSA Cipher Works", http://www.tutorialized.com/tutorial/How-the-RSA-Cipher-Works/42395, 2009.
6 K. Ford, "The Number of Solutions of ${\phi}(x)=m$", Annals of Mathematics, Vol. 150, No. 1, pp. 283-311, 1999.   DOI
7 D. Boneh, "The Decision Diffie-Hellman Problem", Lecture Notes in Computer Science Vol.1423, pp. 48-63, 1998.
8 W. Diffie and M. E. Hellman, "New Directions in Cryptography", IEEE Trans. on Information Theory, Vol. IT-22, pp. 644-654, 1976.
9 T. ElGamal, "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", IEEE Transactions on Information Theory, Vol.31 No. 4, pp. 469-472. 1985.   DOI
10 A. Stein and E. Teske, "Optimized Baby step-Giant step Methods," Journal of the Ramanujan Mathematical Society, Vol. 20, No. 1, pp. 1-32, 2005.
11 D. C. Terr, "A modification of Shanks' Baby-step Giant-step algorithm," Mathematics of Computation, Vol. 69, pp. 767-773, 2000.
12 J. Pollard, "Monte Carlo Methods for Index Computation mod p", Mathematics of Computation, Vol.32, 1978.
13 A. A. Razborov and S. Rudich, "Natural Proofs", Journal of Computer and System Sciences, Vol. 55, pp. 24-35, 1997.   DOI   ScienceOn