A New method for computing DLP based on extending smooth numbers to finite field for ephemeral key recovery

No Thumbnail Available
Date
2015-01-01
Authors
Padmavathy, R.
Bhagvati, Chakravarthy
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
In this paper, new algorithms to solve certain special instances of the Discrete Logarithm Problem (DLP) is presented. These instances are generally considered hard in literature. If a cryptosystem is based on a prime p such that p - 1 is either 2q with q a prime; or 2p where p = γ1 γ2 ... γkq with γs being small prime factors and q a large prime factor, and the exponent is chosen in the middle of the group (or a prime-order subgroup), we show that it is vulnerable. In other words, the attacks proposed in this paper are analogous to the attacks for factoring large numbers when the factors lie near the square-root. The main idea is to generalize the concept of a smooth number and extend it over factor bases and multiplicative groups Z < sup > * < /sup > < inf > p < /inf > . We show that for careful selection of factor bases, patterns form in the distribution of such generalized smooth numbers which may be exploited in the attacks. Our algorithms are empirically tested on several hundred problems with sizes ranging from 100 - 1024 bits and the average running times show the performance of the newly developed attacks. Also, the key recovery attack proposed on Chang and Chang novel three party simple key exchange protocol is mounted by recovering the ephemeral keys. The ephemeral keys are recovered by solving DLP using the new algorithms proposed in the present study.
Description
Keywords
Chang-chang password key exchange protocol, Cryptanalysis, Discrete logarithm problem, Key recovery attack, Smooth numbers
Citation
International Journal of Network Security. v.17(3)