Cover image for Mathematics of public key cryptography
Title:
Mathematics of public key cryptography
Publication Information:
Cambridge ; New York : Cambridge University Press, 2012
Physical Description:
xiv, 615 pages ; 26 cm.
ISBN:
9781107013926
Abstract:
"Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more"--provided by publisher

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010343205 QA268 G35 2012 Open Access Book Book
Searching...

On Order

Summary

Summary

Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more.


Author Notes

Steven D. Galbraith is a leading international authority on the mathematics of public key cryptography. He is an Associate Professor in the Department of Mathematics at the University of Auckland.


Table of Contents

Prefacep. xiii
Acknowledgementsp. xiv
1 Introductionp. 1
1.1 Public key cryptographyp. 2
1.2 The textbook RSA cryptosystemp. 2
1.3 Formal definition of public key cryptographyp. 4
Part I Backgroundp. 11
2 Basic algorithmic number theoryp. 13
2.1 Algorithms and complexityp. 13
2.2 Integer operationsp. 21
2.3 Euclid's algorithmp. 24
2.4 Computing Legendre and Jacobi symbolsp. 27
2.5 Modular arithmeticp. 29
2.6 Chinese remainder theoremp. 31
2.7 Linear algebrap. 32
2.8 Modular exponentiationp. 33
2.9 Square roots modulo pp. 36
2.10 Polynomial arithmeticp. 38
2.11 Arithmetic in finite fieldsp. 39
2.12 Factoring polynomials over finite fieldsp. 40
2.13 Hensel liftingp. 43
2.14 Algorithms in finite fieldsp. 43
2.15 Computing orders of elements and primitive rootsp. 47
2.16 Fast evaluation of polynomials at multiple pointsp. 51
2.17 Pseudorandom generationp. 53
2.18 Summaryp. 53
3 Hash functions and MACsp. 54
3.1 Security properties of hash functionsp. 54
3.2 Birthday attackp. 55
3.3 Message authentication codesp. 56
3.4 Constructions of hash functionsp. 56
3.5 Number-theoretic hash functionsp. 57
3.6 Full domain hashp. 57
3.7 Random oracle modelp. 58
Part II Algebraic Groupsp. 59
4 Preliminary remarks on algebraic groupsp. 61
4.1 Informal definition of an algebraic groupp. 61
4.2 Examples of algebraic groupsp. 62
4.3 Algebraic group quotientsp. 63
4.4 Algebraic groups over ringsp. 64
5 Varietiesp. 66
5.1 Affine algebraic setsp. 66
5.2 Projective algebraic setsp. 69
5.3 Irreducibilityp. 74
5.4 Function fieldsp. 76
5.5 Rational maps and morphismsp. 79
5.6 Dimensionp. 83
5.7 Weil restriction of scalarsp. 84
6 Tori, LUC and XTRp. 86
6.1 Cyclotomic subgroups of finite fieldsp. 86
6.2 Algebraic torip. 88
6.3 The group G q,2p. 89
6.4 The group G q,6p. 94
6.5 Further remarksp. 99
6.6 Algebraic tori over ringsp. 99
l7 Curves and divisor class groupsp. 101
7.1 Non-singular varietiesp. 101
7.2 Weierstrass equationsp. 105
7.3 Uniformisers on curvesp. 106
7.4 Valuation at a point on a curvep. 108
7.5 Valuations and points on curvesp. 110
7.6 Divisorsp. 111
7.7 Principal divisorsp. 112
7.8 Divisor class groupp. 114
7.9 Elliptic curvesp. 116
8 Rational maps on curves and divisorsp. 121
8.1 Rational maps of curves and the degreep. 121
8.2 Extensions of valuationsp. 123
8.3 Maps on divisor classesp. 126
8.4 Riemann-Roch spacesp. 129
8.5 Derivations and differentialsp. 130
8.6 Genus zero curvesp. 136
8.7 Riemann-Roch theorem and Hurwitz genus formulap. 137
9 Elliptic curvesp. 138
9.1 Group lawp. 138
9.2 Morphisms between elliptic curvesp. 140
9.3 Isomorphisms of elliptic curvesp. 142
9.4 Automorphismsp. 143
9.5 Twistsp. 144
9.6 Isogenicsp. 146
9.7 The invariant differentialp. 153
9.8 Multiplication by n and division polynomialsp. 155
9.9 Endomorphism structurep. 156
9.10 Frobenius mapp. 158
9.11 Supersingular elliptic curvesp. 164
9.12 Alternative models for elliptic curvesp. 168
9.13 Statistical properties of elliptic curves over finite fieldsp. 175
9.14 Elliptic curves over ringsp. 177
10 Hyperelliptic curvesp. 178
10.1 Non-singular models for hyperelliptic curvesp. 179
10.2 Isomorphisms, automorphisms and twistsp. 186
10.3 Effective affine divisors on hyperelliptic curvesp. 188
10.4 Addition in the divisor class groupp. 196
10.5 Jacobians, Abelian varieties and isogenicsp. 204
10.6 Elements of order np. 206
10.7 Hyperelliptic curves over finite fieldsp. 206
10.8 Supersingular curvesp. 209
Part III Exponentiation, Factoring and Discrete Logarithmsp. 213
11 Basic algorithms for algebraic groupsp. 215
11.1 Efficient exponentiation using signed exponentsp. 215
11.2 Multi-exponentiationp. 219
11.3 Efficient exponentiation in specific algebraic groupsp. 221
11.4 Sampling from algebraic groupsp. 231
11.5 Determining group structure and computing generators for elliptic curvesp. 235
11.6 Testing subgroup membershipp. 236
12 Primality testing and integer factorisation using algebraic groupsp. 238
12.1 Primality testingp. 238
12.2 Generating random primesp. 240
12.3 The p - 1 factoring methodp. 242
12.4 Elliptic curve methodp. 244
12.5 Pollard-Strassen methodp. 245
13 Basic discrete logarithm algorithmsp. 246
13.1 Exhaustive searchp. 247
13.2 The Pohlig-Hellman methodp. 247
13.3 Baby-step-giant-step (BSGS) methodp. 250
13.4 Lower bound on complexity of generic algorithms for the DLPp. 253
13.5 Generalised discrete logarithm problemsp. 256
13.6 Low Hamming weight DLPp. 258
13.7 Low Hamming weight product exponentsp. 260
14 Factoring and discrete logarithms using pseudorandom walksp. 262
14.1 Birthday paradoxp. 262
14.2 The Pollard rho methodp. 264
14.3 Distributed Pollard rhop. 273
14.4 Speeding up the rho algorithm using equivalence classesp. 276
14.5 The kangaroo methodp. 280
14.6 Distributed kangaroo algorithmp. 287
14.7 The Gaudry-Schost algorithmp. 292
14.8 Parallel collision search in other contextsp. 296
14.9 Pollard rho factoring methodp. 297
15 Factoring and discrete logarithms in subexponential timep. 301
15.1 Smooth integersp. 301
15.2 Factoring using random squaresp. 303
15.3 Elliptic curve method revisitedp. 310
15.4 The number field sievep. 312
15.5 Index calculus in finite fieldsp. 313
15.6 Discrete logarithms on hyperelliptic curvesp. 324
15.7 Weil descentp. 328
15.8 Discrete logarithms on elliptic curves over extension fieldsp. 329
15.9 Further resultsp. 332
Part IV Latticesp. 335
16 Latticesp. 337
16.1 Basic notions on latticesp. 338
16.2 The Hermite and Minkowski boundsp. 343
16.3 Computational problems in latticesp. 345
17 Lattice basis reductionp. 347
17.1 Lattice basis reduction in two dimensionsp. 347
17.2 LLL-reduced lattice basesp. 352
17.3 The Gram-Schmidt algorithmp. 356
17.4 The LL algorithmp. 358
17.5 Complexity of LLLp. 362
17.6 Variants of the LLL algorithmp. 365
18 Algorithms for the closest and shortest vector problemsp. 366
18.1 Babai's nearest plane methodp. 366
18.2 Babai's rounding techniquep. 371
18.3 The embedding techniquep. 373
18.4 Enumerating all short vectorsp. 375
18.5 Korkine-Zolotarev basesp. 379
19 Coppersmith's method and related applicationsp. 380
19.1 Coppersmith's method for modular univariate polynomialsp. 380
19.2 Multivariate modular polynomial equationsp. 387
19.3 Bivariate integer polynomialsp. 387
19.4 Some applications of Coppersmith's methodp. 390
19.5 Simultaneous Diophantine approximationp. 397
19.6 Approximate integer greatest common divisorsp. 398
19.7 Learning with errorsp. 400
19.8 Further applications of lattice reductionp. 402
Part V Cryptography Related to Discrete Logarithmsp. 403
20 The Diffie-Hellman problem and cryptographic applicationsp. 405
20.1 The discrete logarithm assumptionp. 405
20.2 Key exchangep. 405
20.3 Textbook Elgamal encryptionp. 408
20.4 Security of textbook Elgamal encryptionp. 410
20.5 Security of Diffie-Hellman key exchangep. 414
20.6 Efficiency considerations for discrete logarithm cryptographyp. 416
21 The Diffie-Hellman problemp. 418
21.1 Variants of the Diffie-Hellman problemp. 418
21.2 Lower bound on the complexity of CDH for generic algorithmsp. 422
21.3 Random self-reducibility and self-correction of CDHp. 423
21.4 The den Boer and Maurer reductionsp. 426
21.5 Algorithms for static Diffie-Hellmanp. 435
21.6 Hard bits of discrete logarithmsp. 439
21.7 Bit security of Diffie-Hellmanp. 443
22 Digital signatures based on discrete logarithmsp. 452
22.1 Schnorr signaturesp. 452
22.2 Other public key signature schemesp. 459
22.3 Lattice attacks on signaturesp. 466
22.4 Other signature functionalitiesp. 467
23 Public key encryption based on discrete logarithmsp. 469
23.1 CCA secure Elgamal encryptionp. 469
23.2 Cramer-Shoup encryptionp. 474
23.3 Other encryption functionalitiesp. 478
Part VI Crytography Related to Integer Factorisationp. 483
24 The RSA and Rabin cryptosystemsp. 485
24.1 The textbook RSA cryptosystemp. 485
24.2 The textbook Rabin cryptosystemp. 491
24.3 Homomorphic encryptionp. 498
24.4 Algebraic attacks on textbook RSA and Rabinp. 499
24.5 Attacks on RSA parametersp. 504
24.6 Digital signatures based on RSA and Rabinp. 507
24.7 Public key encryption based on RSA and Rabinp. 511
Part VII Advanced Topics in Elliptic and Hyperelliptic Curvesp. 513
25 Isogenics of elliptic curvesp. 515
25.1 Isogenics and kernelsp. 515
25.2 Isogenies from j-invariantsp. 523
25.3 Isogeny graphs of elliptic curves over finite fieldsp. 529
25.4tThe structure of the ordinary isogeny graph

p. 535

25.5 Constructing isogenies between elliptic curvesp. 540
25.6 Relating the discrete logarithm problem on isogenous curvesp. 543
26 Pairings on elliptic curvesp. 545
26.1 Weil reciprocityp. 545
26.2 The Weil pairingp. 546
26.3 The Tate-Lichtenbaum pairingp. 548
26.4 Reduction of ECDLP to finite fieldsp. 557
26.5 Computational problemsp. 559
26.6 Pairing-friendly elliptic curvesp. 561
Appendix A Background mathematicsp. 564
A.1 Basic notationp. 564
A.2 Groupsp. 564
A.3 Ringsp. 565
A.4 Modulesp. 565
A.5 Polynomialsp. 566
A.6 Field extensionsp. 567
A.7 Galois theoryp. 569
A.8 Finite fieldsp. 570
A.9 Idealsp. 571
A.10 Vector spaces and linear algebrap. 572
A.11 Hermite normal formp. 575
A.12 Orders in quadratic fieldsp. 575
A.13 Binary stringsp. 576
A.14 Probability and combinatoricsp. 576
Referencep. 579
Author indexp. 603
Subject indexp. 608