Abstract
At the 1981 IEEE Symposium on Information Theory, T. Herlestam and R. Johannesson presented a heurestic method for computing logarithms over GF(2p). They reported computing logarithms over GF(23 !) with surprisingly few iterations and claimed that the running time of their algorithm was polynomial in p. If this were true, the algorithm could be used to cryptanalyze the Pohlig-Hellman cryptosystem, currently in use by Mitre Corporation for key distribution. The Mitre system operates in GF(2127). However, the algorithm was not implemented for GF(2p) for p > 31 because it would require multiple precision arithmetic. Consequently attempts to evaluate the possible threat to the Pohlig-Hellman cryptosystem have centered on modeling the algorithm so that some predictions could be made analytically about the number of iterations required to find logarithms over GF(2P) for p > 31.
This work performed at Sandia National Laboratories supported by the U. S. Department of Energy under contract number DE-AC04-76DP00789.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
S. Berkovits, J. Kowalchuk and B. Schanning, “Implementing a Public Key Scheme,” IEEE Communications Magazine, 17, May 1979, pp. 2–3.
W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Trans. Inform. Theory, IT-22 (1976), pp. 644–654.
T. Herlestam and R. Johannesson, “On Computing Logarithms over GF(2P),” BIT 21 (1981), pp. 326–334.
S. Pohlig and M. Hellman, “An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance,” IEEE Trans. Inform. Theory, IT-24 (1978), pp. 106–110.
J. Sachs, private communication.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1983 Springer Science+Business Media New York
About this paper
Cite this paper
Brickell, E.F., Moore, J.H. (1983). Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p). In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds) Advances in Cryptology. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-0602-4_2
Download citation
DOI: https://doi.org/10.1007/978-1-4757-0602-4_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-0604-8
Online ISBN: 978-1-4757-0602-4
eBook Packages: Springer Book Archive