15.08.2013 Views

General Computer Science 320201 GenCS I & II Lecture ... - Kwarc

General Computer Science 320201 GenCS I & II Lecture ... - Kwarc

General Computer Science 320201 GenCS I & II Lecture ... - Kwarc

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Candidates for one-way/trapdoor functions<br />

Multiplication and Factoring: The function f takes as inputs two prime numbers p and q<br />

in binary notation and returns their product. This function can be computed in O(n 2 ) time<br />

where n is the total length (number of digits) of the inputs. Inverting this function requires<br />

finding the factors of a given integer N. The best factoring algorithms known for this problem<br />

run in time 2 O(log(N) 1 3 log(log(N)) 2 3 ) .<br />

Modular squaring and square roots: The function f takes two positive integers x and N,<br />

where N is the product of two primes p and q, and outputs x 2 div N. Inverting this function<br />

requires computing square roots modulo N; that is, given y and N, find some x such that<br />

x 2 mod N = y. It can be shown that the latter problem is computationally equivalent to<br />

factoring N (in the sense of polynomial-time reduction) (used in RSA encryption)<br />

Discrete exponential and logarithm: The function f takes a prime number p and an integer<br />

x between 0 and p − 1; and returns the 2 x div p. This discrete exponential function can be<br />

easily computed in time O(n 3 ) where n is the number of bits in p. Inverting this function<br />

requires computing the discrete logarithm modulo p; namely, given a prime p and an integer<br />

y between 0 and p − 1, find x such that 2 x = y.<br />

c○: Michael Kohlhase 383<br />

To see whether these trapdoor function candidates really behave as expected, RSA laboratories,<br />

one of the first security companies specializing in public key encryption has established a series of<br />

prime factorization challenges to test the assumptions underlying public key cryptography.<br />

Example: RSA-129 problem<br />

Definition 579 We call a number semi-prime, iff it has exactly two prime factors.<br />

These are exactly the numbers involved in RSA encryption.<br />

RSA laboratories initiated the RSA challenge, to see whether multiplication is indeed a “practical”<br />

trapdoor function<br />

Example 580 (The RSA129 Challenge) is to factor the semi-prime number on the<br />

right<br />

So far, the challenges up to ca 200 decimal digits have been factored, but all within the<br />

expected complexity bounds.<br />

220

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!