Algorithms and Computation in Mathematics - Volume 3: Editors
Algorithms and Computation in Mathematics - Volume 3: Editors
in Mathematics Volume 3
Editors
Manuel Bronstein Arjeh M. Cohen
Henri Cohen David Eisenbud
Bernd Sturmfels
Neal Koblitz
Algebraic Aspects
of Cryptography
With an Appendix on
Hyperelliptic Curves by
Alfred J. Menezes,
Yi-Hong Wu, and
Robert J. Zuccherato
With 7 Figures
Springer
Neal Koblitz
Yi-HongWu
Department of Mathematics
University of Washington
Seattle, WA 98195, USA
e-mail:
[email protected]
Alfred J. Menezes
Robert J. Zuccherato
Department of Combinatrics
and Optimization
University of Waterloo
Waterloo, Ontario
Canada N2L3G1
e-mail:
[email protected]
Entrust Technologies
750 Heron Road
Ottawa, Ontario
Canada K1V1A7
e-mail:
[email protected]
lst ed. 1998. Corr. 1nd printing 1999, 3rd printing 1004
ISSN 1431-1550
ISBN 978-3-642-08332-7
ISBN 978-3-662-03642-6 (eBook)
DOI 10.1007/978-3-662-03642-6
This work is subject to copyright. All rights are reserved, whetber tbe whole or part of tbe material
is concerned, specificaJJy tbe rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilm or in any otber way, and storage in data banks. Duplication
of tbis publication or parts tbereof is permitted onJy under tbe provisions of tbe German Copyright
Law of September 9, 1965, in its current version, and permission for use must always be obtained
from Springer-VerJag. VioJations are liable for prosecution under tbe German Copyright Law.
springeronline.com
The use of general descriptive names, registered names, trademarks, etc. in tbis publication does not
imply, even in tbe absence of a specific statement, that such names are exempt from tbe relevant protective laws and regulations and tberefore free for general use.
Typeset by tbe autbor using a Springer BrJll( macro package
Cover design: design & production GmbH, Heidelberg
Printed on acid-free paper
46/3141db - 5 4 3 1-
Preface
Neal Koblitz
Contents
Chapter 1. Cryptography
..................................... .
1
2
5
8
10
12
13
17
18
18
21
22
23
24
31
34
41
44
45
48
48
52
Chapter 3. Algebra
53
1. Fields ....................................................
Exercises .................................................
2. Finite Fields ...............................................
Exercises .................................................
3. The Euclidean Algorithm for Polynomials ......................
Exercises .................................................
4. Polynomial Rings ..........................................
Exercises .................................................
53
55
55
61
63
64
65
70
VITI
Contents
5. Grobner Bases
Exercises ................................................ .
70
80
78
Exercises .................................................
2. Patarin's Little Dragon ......................................
Exercises .................................................
3. Systems That Might Be More Secure ..........................
Exercises .................................................
80
86
87
95
96
102
...............
103
1. History ...................................................
2. Irrelevance of Brassard's Theorem .............................
Exercises .................................................
3. Concrete Combinatorial-Algebraic Systems .....................
Exercises .................................................
4. The Basic Computational Algebra Problem ......................
Exercises .................................................
5. Cryptographic Version of Ideal Membership .....................
6. Linear Algebra Attacks ......................................
7. Designing a Secure System ..................................
103
104
105
105
109
111
112
112
113
114
...............
117
117
129
131
136
137
139
139
144
148
148
154
155
1.
2.
3.
4.
156
159
161
167
Contents
IX
169
171
172
178
Answers to Exercises
179
..........................................
Bibliography
193
Subject Index
201