{"title":"GF(p)上计算对数的改进算法及其密码学意义","authors":"S. Pohlig, M. E. Hellman","doi":"10.1145/3549993.3550009","DOIUrl":null,"url":null,"abstract":"A cryptographic system is described which is secure if and only if computing log arithms over GF ( p ) is infeasible. Previously published algorithms for computing this function require O ( p 1 / 2 ) complexity in both time and space. An improved algo rithm is derived which requires O ( log 2 p ) complexity if p − 1 has only small prime factors. Such values of p must be avoided in the cryptosystem. Constructive uses for the new algorithm are also described.","PeriodicalId":305424,"journal":{"name":"Democratizing Cryptography","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance\",\"authors\":\"S. Pohlig, M. E. Hellman\",\"doi\":\"10.1145/3549993.3550009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A cryptographic system is described which is secure if and only if computing log arithms over GF ( p ) is infeasible. Previously published algorithms for computing this function require O ( p 1 / 2 ) complexity in both time and space. An improved algo rithm is derived which requires O ( log 2 p ) complexity if p − 1 has only small prime factors. Such values of p must be avoided in the cryptosystem. Constructive uses for the new algorithm are also described.\",\"PeriodicalId\":305424,\"journal\":{\"name\":\"Democratizing Cryptography\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Democratizing Cryptography\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3549993.3550009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Democratizing Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3549993.3550009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance
A cryptographic system is described which is secure if and only if computing log arithms over GF ( p ) is infeasible. Previously published algorithms for computing this function require O ( p 1 / 2 ) complexity in both time and space. An improved algo rithm is derived which requires O ( log 2 p ) complexity if p − 1 has only small prime factors. Such values of p must be avoided in the cryptosystem. Constructive uses for the new algorithm are also described.