Skip to main content

Exponentiation Algorithms

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 115 Accesses

The problem of computing an exponentiation occurs frequently in modern cryptography. In particular, it is the core operation in the three most popular families of public-key algorithms: integer factorization based schemes (e.g., RSA public key encryption); discrete logarithm problem based schemes (e.g., Digital Signature Standard or Diffie-Hellman key agreement); and elliptic curve cryptography. Exponentiation is defined as the repeated application of the group operation to a single group element. If we assume a multiplicative group, i.e., the group operation is called “multiplication”, and we denote the group element by g, we write an exponentation as

$$\underbrace{g \cdot g \cdot \ldots \cdot g}_{e\ \ {\rm times}} = g^e.$$

This case is in particular relevant for RSA and discrete logarithm schemes in finite fields. It should be kept in mind that the corresponding notation for additive groups, i.e., groups where the group operation is an addition, looks as follows:

$$\underbrace{g + g...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Paar, C. (2005). Exponentiation Algorithms. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_150

Download citation

Publish with us

Policies and ethics