Abstract
We present group-theoretic and cryptographic properties of a generalization of the traditional discrete logarithm problem from cyclic to arbitrary finite groups. Questions related to properties which contribute to cryptographic security are investigated, such as distributional, coverage and complexity properties. We show that the distribution of elements in a certain multiset tends to uniform. In particular we consider the family of finite non-abelian groups \({PSL_2(\mathbb{F}_p)}\) , p a prime, as possible candidates in the design of new cryptographic primitives, based on our new discrete logarithm.
Similar content being viewed by others
References
Anshel I, Anshel M, Goldfeld D (1999) An algebraic method for public-key cryptography. Math Res Lett 6: 287–291
Choi S-J, Blackburn SR, Wild PR (2007) Cryptanalysis of a homomorphic public-key cryptosystem over a finite group. J Math Cryptogr 1: 351–358
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 2: 644–654
Egner S, Pueschel M (1998) Solving puzzles related to permutation groups. In: Proceedings of the 1998 International Symposium on Symbolic and Algebraic Computation. ACM Press, New York, pp 186–193
Even S, Goldreich O (1981) Minimum-length generator sequence problem is NP-hard. J Algorithms 2(3): 311–313
Goldreich O (2001) Foundations of Cryptography. Cambridge University Press, Cambridge
Gonzalez-Vasco MI, Steinwandt R (2006) Chosen ciphertext attacks as common vulnerability of some group- and polynomial-based encryption schemes. Tatra Mt Math Publ 33(1): 149–157
Grigoriev D, Ponomarenko I (2004) Homomorphic public-key cryptosystems over groups and rings. Complex Comput Proofs Quad Mat 13: 305–325
Holt DF, Eick B, O’Brien EA (2005) Handbook of computational group theory. Chapman & Hall/CRC Press, Boca Raton
Ilic I (2008) Discrete logs in arbitrary finite groups. PhD Research, Florida Atlantic University (Unpublished)
Impagliazzo R, Levin LA, Luby M (1989) Pseudorandom generation from one-way functions. In: Proceedings of the 21st ACM symposium on theory of computing. ACM Press, New York, pp 12–24
Kashyap SK, Sharma BK, Banerjee A (2006) A cryptosystem based on DLP \({\gamma\equiv\alpha^a\beta^b\pmod{p}}\) . Int J Netw Secur 3(1): 95–100
Lempken W, Magliveras SS, Tran van Trung, Wei W (2009) A public key cryptosystem based on non-abelian finite groups. J Cryptol 22: 62–74
Leon JS (1980) On an algorithm for finding a base and a strong generating set for a group given by generating permutations. Math Comput 35: 941–974
Magliveras SS, Memon ND (1992) The algebraic properties of cryptosystem PGM. J Cryptol 5: 167–183
Magliveras SS, van Tran Trung, Stinson DR (2002) New approaches to designing public key cryptosystems using one-way functions and trap-doors in finite groups. J Cryptol 15: 285–297
Mahalanobis A (2005) Diffie–Hellman key exchange protocol, its generalization and Nilpotent Groups. PhD thesis, Florida Atlantic University, Boca Raton
Mahalanobis A (2008) The Diffie–Hellman key exchange protocol, and non-abelian nilpotent groups. Isr J Math 165: 161–187
Mahalanobis A (2008) A simple generalization of the ElGamal cryptosystem to non-abelian groups. Comm Algebra 36(10): 3878–3889
Maze G, Monico C, Rosenthal J (2007) Public key cryptography based on semigroup actions. Adv Math Commun 1(4): 489–507
Myasnikov AG, Shpilrain V, Ushakov A (2005) A practical attack on some braid group based cryptographic protocols. In: Advances in Cryptology—CRYPTO 2005. Lecture Notes in Computer Science, vol 3621. Springer, Heidelberg, pp 86–96
Odlyzko AM (2000) Discrete logarithms: the past and the future. Des Codes Cryptogr 19: 129–145
Paeng S, Ha K, Kim J, Chee S, Park C (2001) New public key cryptosystem using finite non-abelian groups. In: Advances in Cryptology—CRYPTO 2001. Lecture Notes in Computer Science, vol 2139. pp 470–485
Rompel J (1990) One-way functions are necessary and sufficient for secure signatures. In: Proceedings of the 22nd annual ACM symposium on theory of computing. ACM Press, New York, pp 387–394
Shor PW (1997) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput 26(5): 1484–1509
Shpilrain V, Zapata G (2006) Combinatorial group theory and public key cryptography. App Alg Eng Comm Comp 17: 291–302
Shpilrain V (2008) Cryptanalysis of Stickel’s key exchange scheme. In: Proceedings of Computer Science in Russia 2008. Lecture Notes in Computer Science, vol 5010. Springer, Heidelberg, pp 283–288 (2008)
Birget J-C, Magliveras SS, Sramka M (2006) On public-key cryptosystems based on combinatorial group theory. Tatra Mt Math Publ 33(1): 137–148
Sramka M (2006) New Results in Group Theoretic Cryptology. PhD Thesis, Florida Atlantic University, Boca Raton
Sramka M (2008) Cryptanalysis of the cryptosystem based on DLP γ = α a β b. Int J Netw Secur 6(1): 80–81
Sramka M (2008) On the Security of Stickel’s Key Exchange Scheme. J Comb Math Comb Comp 66
Stickel E (2005) A new method for exchanging secret keys. In: Proceedings of the third international conference on information technology and applications (ICITA’05), vol 2, pp 426–430
Steinwandt R, Grassl M, Geiselmann W, Beth Th (2000) Weaknesses in the SL2(F2n) Hashing Scheme. In: Advances in Cryptology—CRYPTO 2000. Lecture Notes in Computer Science, vol 1880. Springer, Heidelberg, pp 287–299
Tillich JP, Zémor G (1994) Hashing with SL2. In: Advances in Cryptology—CRYPTO’94. Lecture Notes in Computer Science, vol 839. Springer, Heidelberg, pp 40–49
Wagner NR, Magyarik MR (1985) A public-key cryptosystem based on the word problem. In: Advances in Cryptology—CRYPTO’84. Lecture Notes in Computer Science, vol 196. Springer, Heidelberg, pp 19–36
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Klingler, L.C., Magliveras, S.S., Richman, F. et al. Discrete logarithms for finite groups. Computing 85, 3–19 (2009). https://doi.org/10.1007/s00607-009-0032-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-009-0032-0