11 research outputs found

    On Taking Square Roots without Quadratic Nonresidues over Finite Fields

    Full text link
    We present a novel idea to compute square roots over finite fields, without being given any quadratic nonresidue, and without assuming any unproven hypothesis. The algorithm is deterministic and the proof is elementary. In some cases, the square root algorithm runs in O~(log⁥2q)\tilde{O}(\log^2 q) bit operations over finite fields with qq elements. As an application, we construct a deterministic primality proving algorithm, which runs in O~(log⁥3N)\tilde{O}(\log^3 N) for some integers NN.Comment: 14 page

    On Solving Univariate Polynomial Equations over Finite Fields and Some Related Problems

    Get PDF
    We show deterministic polynomial time algorithms over some family of finite fields for solving univariate polynomial equations and some related problems such as taking nth roots, constructing nth nonresidues, constructing primitive elements and computing elliptic curve “nth roots”. In additional, we present a deterministic polynomial time primality test for some family of integers. All algorithms can be proved by elementary means (without assuming any unproven hypothesis). The problem of solving polynomial equations over finite fields is a generalization of the following problems over finite fields • constructing primitive nth roots of unity, • taking nth roots, • constructing nth nonresidues, • constructing primitive elements (generators of the multiplicative group) for any positive n dividing the number of elements of the underlying field. By the Tonelli-Shanks square root algorithm [21, 19] and its generalization for taking nth roots, constructing nth nonresidue

    Cyclotomic cartesian authentication codes

    No full text
    Authentication is an important issue in many communications systems. Simmons developed the theory of unconditional authentication analogous to Shannon’s theory of unconditional secrecy. Based on Simmons’ authentication model, Chanson, Ding and Salomaa have recently constructed several classes of authentication codes using functions with perfect nonlinearity and optimal nonlinearity. We extend their work by constructing three classes of Cartesian authentication codes using the logarithm function over groups. We observe that the logarithm function over groups has high nonlinearity. To describe authentication codes based on the logorithm function, the theory of cyclotomy is used. It can be shown that the codes we constructed are better than existing codes with comparable parameters. In the first class of authentication codes, the deception probability Pd0 of impersonation attack essentially reaches the minimum and the deception probability Pd1 of substitution attack is bounded below and above by the maximum cyclotomic number of order d, where d is a parameter of the codes. For d = 2, the value of Pd1 is determined completely. For d = 3 and d = 4, some codes are proved to be asymptotically optimal. In the second class of authentication codes, both Pd0 and Pd1 can be evaluated completely. The codes in this class have smaller values of Pd0 and Pd1 compared with the codes in the first class. However, the size of the key space is larger. In the third class of authentication codes, we allow multiplication in the authentication mapping. Although the form of Pd1 is complex, we provide a table of possible codes with exact values of Pd1. We also demonstrate how the codes can be used for authentication in a wireless communication environment for the control of nuclear weapons. The computation requirement of the authentication system is very low. The system can be implemented on a PDA-like handheld device which need only perform arithmetic operations on one-byte integers. Also we present a detailed implementation example of an authentication system for smart cards, which has very limited computing and memory capacities. The average running time for encoding or verifying a message is only 4 seconds on a Java card. Most other existing authentication codes would not even be able to run on smart cards
    corecore