10.2 Computing Discrete Logs
In this section, we present some methods for computing discrete logarithms. A method based on the birthday attack is discussed in Subsection 12.1.1.
For simplicity, take to be a primitive root mod , so is the smallest positive exponent such that . This implies that
Assume that
We want to find .
First, it’s easy to determine . Note that
so (see Exercise 15 in Chapter 3). However, is assumed to be the smallest exponent to yield , so we must have
Starting with , raise both sides to the power to obtain
Therefore, if ...
Get Introduction to Cryptography with Coding Theory, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.