Bartosz Naskręcki
Elements of Cryptanalysis • Adam Mickiewicz University
Chapters 28–33
| Algorithm | Complexity | Requirement |
|---|---|---|
| Baby-step giant-step | \(O(\sqrt{p})\) | General |
| Pollard \(\rho\) | \(O(\sqrt{p})\) | General |
| Pohlig-Hellman | \(O(\sum \sqrt{p_i})\) | Smooth \(p{-}1\) |
| Index calculus | \(L_p[1/3, c]\) | \(\mathbb{F}_p^*\) |
This is why \(\mathbb{F}_p^*\) needs 3072-bit primes for 128-bit security, while ECC needs only 256-bit curves.
| Security | RSA | DH | ECC |
|---|---|---|---|
| 128-bit | 3072 | 3072 | 256 |
| 192-bit | 7680 | 7680 | 384 |
| 256-bit | 15360 | 15360 | 512 |
ECC advantage: no index calculus ⇒ best attack is Pollard \(\rho\) at \(O(\sqrt{n})\).
| Ch | Topic | Key Result |
|---|---|---|
| 28 | DH & DLP | CDH/DDH assumptions, safe primes, DLP algorithms |
| 29 | ElGamal | IND-CPA under DDH, nonce-reuse vulnerability |
| 30 | Index calculus | \(L_p[1/3]\) sub-exponential DLP in \(\mathbb{F}_p^*\) |
| 31 | EC group law | Chord-tangent addition, Hasse bound |
| 32 | Point groups | Schoof’s algorithm, structure theorem |
| 33 | ECC practice | 256-bit ECC \(\approx\) 3072-bit RSA security |