2010
DOI: 10.2140/involve.2010.3.197
|View full text |Cite
|
Sign up to set email alerts
|

Mapping the discrete logarithm

Abstract: The discrete logarithm is a problem that surfaces frequently in the field of cryptography as a result of using the transformation x → g x mod n. Analysis of the security of many cryptographic algorithms depends on the assumption that it is statistically impossible to distinguish the use of this map from the use of a randomly chosen map with similar characteristics. This paper focuses on a prime modulus, p, for which it is shown that the basic structure of the functional graph produced by this map is largely de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(19 citation statements)
references
References 18 publications
0
19
0
Order By: Relevance
“…Our first attempt assumed that F (p) was normally distributed around the predicted value d|p−1 φ(d) d . (The normality assumption had been successfully used for the discrete exponential map in, e.g., [3], see also [17]. Furthermore, it appeared to be justified by the Central Limit Theorem given the number of primes we were intending to test.…”
Section: Models and Experimental Resultsmentioning
confidence: 99%
“…Our first attempt assumed that F (p) was normally distributed around the predicted value d|p−1 φ(d) d . (The normality assumption had been successfully used for the discrete exponential map in, e.g., [3], see also [17]. Furthermore, it appeared to be justified by the Central Limit Theorem given the number of primes we were intending to test.…”
Section: Models and Experimental Resultsmentioning
confidence: 99%
“…If S is a finite set and f : S → S a mapping, then one can associate a functional graph to the mapping f by interpreting each element in S as a vertex. The edges are defined such that an edge (a, b) is in the graph iff f (a) = b. Cloutier and Holden [91] considered the functional graph associated to the mapping x → g x modulo p, with p a prime and S = {1, 2, . .…”
Section: )mentioning
confidence: 99%
“…There are applications of this problem in cryptography which is the subject of sending messages in a secret way, ensuring the security of the information (see for e.g., A.M.Odlyzko [6]). The problem of mapping the discrete logarithm has been considered by D.Cloutier and J.Holden [2]. The structure in the discrete logarithm has been studied by A.Hoffman [4].…”
Section: The Problem Of Discrete Logarithmmentioning
confidence: 99%
“…We say that r is a primitive root modulo p if . Let r be any primitive root modulo p and g D. Cloutier and J. Holden [2] that the values of g that produce an m-ary graph are precisely those for which gcd (α, p-1) = m.…”
Section: The Problem Of Discrete Logarithmmentioning
confidence: 99%