Discrete Logarithm Cryptography

The security of many cryptographic schemes relies on the intractability of the discrete logarithm problem (DLP) in groups. The most commonly used groups to deploy such schemes are the multiplicative (sub)groups of finite fields and (hyper)elliptic curve groups over finite fields. The elements of the...

Full description

Bibliographic Details
Main Author: Karabina, Koray
Language:en
Published: 2010
Subjects:
Online Access:http://hdl.handle.net/10012/5088
id ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-5088
record_format oai_dc
spelling ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-50882013-01-08T18:53:21ZKarabina, Koray2010-04-27T20:32:52Z2010-04-27T20:32:52Z2010-04-27T20:32:52Z2010http://hdl.handle.net/10012/5088The security of many cryptographic schemes relies on the intractability of the discrete logarithm problem (DLP) in groups. The most commonly used groups to deploy such schemes are the multiplicative (sub)groups of finite fields and (hyper)elliptic curve groups over finite fields. The elements of these groups can be easily represented in a computer and the group arithmetic can be efficiently implemented. In this thesis we first study certain subgroups of characteristic-two and characteristic-three finite field groups, with the goal of obtaining more efficient representation of elements and more efficient arithmetic in the corresponding groups. In particular, we propose new compression techniques and exponentiation algorithms, and discuss some potential benefits and applications. Having mentioned that intractability of DLP is a basis for building cryptographic protocols, one should also take into consideration how a system is implemented. It has been shown that realistic (validation) attacks can be mounted against elliptic curve cryptosystems in the case that group membership testing is omitted. In the second part of the thesis, we extend the notion of validation attacks from elliptic curves to hyperelliptic curves, and show that singular curves can be used effectively in such attacks. Finally, we tackle a specific location-privacy problem called the nearby friend problem. We formalize the security model and then propose a new protocol and its extensions that solve the problem in the proposed security model. An interesting feature of the protocol is that it does not depend on any cryptographic primitive and its security is primarily based on the intractability of the DLP. Our solution provides a new approach to solve the nearby friend problem and compares favorably with the earlier solutions to this problem.enDiscrete Logarithm CryptographyThesis or DissertationCombinatorics and OptimizationDoctor of PhilosophyCombinatorics and Optimization
collection NDLTD
language en
sources NDLTD
topic Combinatorics and Optimization
spellingShingle Combinatorics and Optimization
Karabina, Koray
Discrete Logarithm Cryptography
description The security of many cryptographic schemes relies on the intractability of the discrete logarithm problem (DLP) in groups. The most commonly used groups to deploy such schemes are the multiplicative (sub)groups of finite fields and (hyper)elliptic curve groups over finite fields. The elements of these groups can be easily represented in a computer and the group arithmetic can be efficiently implemented. In this thesis we first study certain subgroups of characteristic-two and characteristic-three finite field groups, with the goal of obtaining more efficient representation of elements and more efficient arithmetic in the corresponding groups. In particular, we propose new compression techniques and exponentiation algorithms, and discuss some potential benefits and applications. Having mentioned that intractability of DLP is a basis for building cryptographic protocols, one should also take into consideration how a system is implemented. It has been shown that realistic (validation) attacks can be mounted against elliptic curve cryptosystems in the case that group membership testing is omitted. In the second part of the thesis, we extend the notion of validation attacks from elliptic curves to hyperelliptic curves, and show that singular curves can be used effectively in such attacks. Finally, we tackle a specific location-privacy problem called the nearby friend problem. We formalize the security model and then propose a new protocol and its extensions that solve the problem in the proposed security model. An interesting feature of the protocol is that it does not depend on any cryptographic primitive and its security is primarily based on the intractability of the DLP. Our solution provides a new approach to solve the nearby friend problem and compares favorably with the earlier solutions to this problem.
author Karabina, Koray
author_facet Karabina, Koray
author_sort Karabina, Koray
title Discrete Logarithm Cryptography
title_short Discrete Logarithm Cryptography
title_full Discrete Logarithm Cryptography
title_fullStr Discrete Logarithm Cryptography
title_full_unstemmed Discrete Logarithm Cryptography
title_sort discrete logarithm cryptography
publishDate 2010
url http://hdl.handle.net/10012/5088
work_keys_str_mv AT karabinakoray discretelogarithmcryptography
_version_ 1716573520449765376