SlideShare a Scribd company logo
1 of 1
Download to read offline
Mapping the Discrete Logarithm
                                                                  Daniel R. Cloutier                                          Joshua Holden
                                                                 Cincinnati, OH, USA                               Rose-Hulman Institute of Technology
                                                               Daniel.R.Cloutier@                                      Terre Haute, IN 47803, USA
                                                             alumni.rose-hulman.edu                              Joshua.Holden@rose-hulman.edu


1       Graphs Produced by Discrete Exponentiation:                                                                This yields the following results

        A Comparison to Random Graphs                                                                                   Ξ1(z) =
                                                                                                                                    1
                                                                                                                                           ln
                                                                                                                                                    1
                                                                                                                                                               (Number of components)                                  (4)
We investigate the functional graph produced by the discrete exponentiation                                                     1 − zb(z)       1 − zb(z)
transformation                                                                                                                     zb(z)
                                                                                                                        Ξ2(z) =                    (Number of cyclic nodes)                                            (5)
                                g a mod p.                                                                                      (1 − zb(z)) 2
                                                                                                                                     z2
This is the inverse of the discrete logarithm, which is used in many crypto-                                            Ξ3(z) =               .     (Number of terminal nodes)                                         (6)
                                                                                                                                (1 − 2z 2)3/2
graphic algorithms. We predict that these graphs behave like random graphs
with the same in-degrees and out-degrees for each node.                                                           We compute an asymptotic form for each of these by performing a singular-
                                                                                                               ity analysis1 as in [2, Section 2]. (See [1] for full proofs.)
2       Terminology and Background                                                                             Theorem 1. The expected values of the following parameters in a random bi-
A functional graph is a directed graph such that each vertex must have exactly                                 nary functional graph of size n, as n → ∞, are asymptotic to
one edge directed out from it. An m-ary functional graph is a graph where
each node has in-degree of exactly zero or m.                                                                                                                                    ln (2n) + γ
  There are a number of statistics of interest derived from functional graphs.                                                               Number of components                                                      (i)
                                                                                                                                                                                      2
These include:                                                                                                                             Number of cyclic nodes                   πn/2 − 1                          (ii)
 • number of connected components                                                                                                        Number of terminal nodes                n/2                                 (iii)
 • number of cyclic nodes                                                                                        In part (i), γ represents the Euler constant which is approximately
 • number of terminal nodes                                                                                    0.57721566. Note that the formula in part (iii) can be proved to be exact.
 • average cycle length                                                                                          Using similar techniques, we can calculate:
                                                                                                               Theorem 2. The expected values for the following parameters as seen from a
 • maximum cycle length
                                                                                                               random node in a random binary functional graph of size n, as n → ∞, are
 • average tail length                                                                                         asymptotic to
 • maximum tail length
                                                                                                                                               Average cycle length                πn/8                                (i)
                                                                                                                                                  Average tail length              πn/8                                (ii)

                                                                                                               Theorem 3. The expected values of the largest cycle and the largest tail in a
                                                                                                               random binary functional graph of size n, as n → ∞, are asymptotic to

                                                                                                                                             πn ∞             ∞
                                                                                                                                                                 −u du                                             √
                                                                                                                   Largest cycle                  1 − exp −     e                               dv ≈ 0.78248 n
                                                                                                                                              2 0           v       u
                                                                                                                                                                                                                        (i)
                                                                                                                                         √                                            √
                                                                                                                     Largest tail            2πn ln 2 − 3 + 2 ln 2 ≈ 1.73746 n − 1.61371                               (ii)

                                                                                                               4       Success in Predicting the Observed Results
                                                                                                               We generated experimental data for the parameters described by these theoret-
                                                                                                               ical predictions. The generation and analysis of each of the discrete exponen-
Figure 1: The graph generated using f (x) = 3x mod 11. This graph has two                                      tiation graphs was handled by C++ code written by the first author. The com-
connected components: one containing a cycle of length three (1,3,5) and the                                   putation took approximately one week for each prime. The statistics observed
other containing a cycle of length one (fixed point) at 4.                                                      (Table 1) seem to support the claim that binary functional graphs induced by
                                                                                                               exponentiation modulo a prime behave in the same fashion as random binary
                                                                                                               functional graphs.
3       Theoretical Predictions for Random Binary
                                                                                                                                                   100043                  100057                  106261
        Functional Graphs: The Basis for Comparison                                                                                          Observed Error Observed Error Observed Error
The methods in [2] can be extended to develop estimates for these parameters                                            Components             6.389      0.047%       6.364      0.437%       6.370     0.810%
in random binary functional graphs. Define the following:                                                                Cyclic Nodes          395.303 0.029% 395.858 0.105% 408.433 0.217%
        BinFunGraph = set(Components)                                                                                   Terminal Nodes         50021        0%         50028        0%        53130         0%
        Component = cycle(Node*BinaryTree)                                                                              Avg Cycle             198.319 0.056% 197.766 0.230% 202.651 0.795%
        BinaryTree = Node + Node*set(BinaryTree, cardinality = 2)                                                       Avg Tail              197.961 0.125% 197.550 0.339% 202.422 0.907%
        Node            = Atomic Unit                                                                                   Max Cycle             247.261 0.094% 247.302 0.082% 256.986 0.754%
   Imitating [2, Section 2.1], the generating functions of interest are                                                 Max Tail              541.827 1.115% 549.588 1.145% 566.370 1.744%

                   f (z) = ec(z)           (Binary functional graphs)                                  (1)     Table 1: The observed results for the three primes over all binary functional
                                  1                                                                            graphs generated and the corresponding percent errors.
                    c(z) = ln                        (Connected components)                            (2)
                              1 − zb(z)
                                1 2
                    b(z) = z + zb (z)                (Binary trees)                                    (3)     References
                                2
                                                                                                               [1] Daniel R. Cloutier and Joshua Holden. Mapping the discrete logarithm.
  A bivariate generating function, ξ(u, z), is defined with parameter u marking                                     http://xxx.lanl.gov/abs/math.NT/0605024.
the elements of interest. The mean value generating function, Ξ(z), is found as                                [2] Philippe Flajolet and Andrew M. Odlyzko. Random mapping statistics.
                                                                                                                   In Advances in cryptology—EUROCRYPT ’89 (Houthalen, 1989), volume
                                                 ∂ξ                                                                434 of Lecture Notes in Comput. Sci., pages 329–354. Springer, Berlin,
                                          Ξ(z) =        .
                                                 ∂u u=1                                                            1990.
    1
     The analyses in this paper have been performed using the computer algebra program Maple and the packages created as part of the Algorithms Project at INRIA, Rocquencourt, France. The packages can be found online at
http://pauillac.inria.fr/algo/libraries/software.html.

More Related Content

What's hot

Engr 371 final exam april 2006
Engr 371 final exam april 2006Engr 371 final exam april 2006
Engr 371 final exam april 2006
amnesiann
 
Detecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow AnalysisDetecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Silvio Cesare
 
Engr 371 final exam april 2010
Engr 371 final exam april 2010Engr 371 final exam april 2010
Engr 371 final exam april 2010
amnesiann
 
Lecture6
Lecture6Lecture6
Lecture6
voracle
 
IGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdfIGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdf
grssieee
 
20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilers20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilers
Computer Science Club
 
Quoc le tera-scale deep learning
Quoc le   tera-scale deep learningQuoc le   tera-scale deep learning
Quoc le tera-scale deep learning
zukun
 
Wavelets for computer_graphics_stollnitz
Wavelets for computer_graphics_stollnitzWavelets for computer_graphics_stollnitz
Wavelets for computer_graphics_stollnitz
Juliocaramba
 

What's hot (20)

7 - Model Assessment and Selection
7 - Model Assessment and Selection7 - Model Assessment and Selection
7 - Model Assessment and Selection
 
Engr 371 final exam april 2006
Engr 371 final exam april 2006Engr 371 final exam april 2006
Engr 371 final exam april 2006
 
Detecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow AnalysisDetecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow Analysis
 
Engr 371 final exam april 2010
Engr 371 final exam april 2010Engr 371 final exam april 2010
Engr 371 final exam april 2010
 
Lecture6
Lecture6Lecture6
Lecture6
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Lesson 1: Functions
Lesson 1: FunctionsLesson 1: Functions
Lesson 1: Functions
 
Parameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its ApplicationsParameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its Applications
 
Lesson 25: Evaluating Definite Integrals (handout)
Lesson 25: Evaluating Definite Integrals (handout)Lesson 25: Evaluating Definite Integrals (handout)
Lesson 25: Evaluating Definite Integrals (handout)
 
Java cơ bản java co ban
Java cơ bản java co ban Java cơ bản java co ban
Java cơ bản java co ban
 
IGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdfIGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdf
 
36
3636
36
 
Camera calibration
Camera calibrationCamera calibration
Camera calibration
 
20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilers20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilers
 
Quoc le tera-scale deep learning
Quoc le   tera-scale deep learningQuoc le   tera-scale deep learning
Quoc le tera-scale deep learning
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
Lesson 2: A Catalog of Essential Functions (handout)
Lesson 2: A Catalog of Essential Functions (handout)Lesson 2: A Catalog of Essential Functions (handout)
Lesson 2: A Catalog of Essential Functions (handout)
 
Mm2521542158
Mm2521542158Mm2521542158
Mm2521542158
 
Wavelets for computer_graphics_stollnitz
Wavelets for computer_graphics_stollnitzWavelets for computer_graphics_stollnitz
Wavelets for computer_graphics_stollnitz
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 

Viewers also liked

Web 2.0 en la Educacion
Web 2.0 en la EducacionWeb 2.0 en la Educacion
Web 2.0 en la Educacion
feelynamin
 
What is it european day of languages
What is it european day of languagesWhat is it european day of languages
What is it european day of languages
ivid1990
 
PRESENTATION BY SRI TEJA
PRESENTATION BY SRI TEJAPRESENTATION BY SRI TEJA
PRESENTATION BY SRI TEJA
vardhamanece
 
Formación Pizarra Digital 2008-2009
Formación Pizarra Digital 2008-2009Formación Pizarra Digital 2008-2009
Formación Pizarra Digital 2008-2009
cprgraus
 
Cronicas de una resurreccion anunciada 20.04.2014
Cronicas de una resurreccion anunciada   20.04.2014Cronicas de una resurreccion anunciada   20.04.2014
Cronicas de una resurreccion anunciada 20.04.2014
iacymcallao
 
Herramientas colaborativas
Herramientas colaborativasHerramientas colaborativas
Herramientas colaborativas
Johan Llanten
 
Informacion Feria de Canton 2,012
Informacion Feria de Canton 2,012Informacion Feria de Canton 2,012
Informacion Feria de Canton 2,012
Canton2012
 
Modelo O S I Taller 8
Modelo  O S I     Taller 8Modelo  O S I     Taller 8
Modelo O S I Taller 8
edvinogo
 
WeddingsEventsRebekah
WeddingsEventsRebekahWeddingsEventsRebekah
WeddingsEventsRebekah
rebekahandre
 

Viewers also liked (20)

Diseño Web 02
Diseño Web 02Diseño Web 02
Diseño Web 02
 
Lf353
Lf353Lf353
Lf353
 
Performance vs. Salários NBA 2011-2012
Performance vs. Salários NBA 2011-2012Performance vs. Salários NBA 2011-2012
Performance vs. Salários NBA 2011-2012
 
Web 2.0 en la Educacion
Web 2.0 en la EducacionWeb 2.0 en la Educacion
Web 2.0 en la Educacion
 
Eva Giberti Sexualidad
Eva Giberti SexualidadEva Giberti Sexualidad
Eva Giberti Sexualidad
 
Comoserhacker
ComoserhackerComoserhacker
Comoserhacker
 
What is it european day of languages
What is it european day of languagesWhat is it european day of languages
What is it european day of languages
 
PRESENTATION BY SRI TEJA
PRESENTATION BY SRI TEJAPRESENTATION BY SRI TEJA
PRESENTATION BY SRI TEJA
 
Assignment on literature review
Assignment on literature reviewAssignment on literature review
Assignment on literature review
 
Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653
Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653
Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653
 
Formación Pizarra Digital 2008-2009
Formación Pizarra Digital 2008-2009Formación Pizarra Digital 2008-2009
Formación Pizarra Digital 2008-2009
 
Cronicas de una resurreccion anunciada 20.04.2014
Cronicas de una resurreccion anunciada   20.04.2014Cronicas de una resurreccion anunciada   20.04.2014
Cronicas de una resurreccion anunciada 20.04.2014
 
Herramientas colaborativas
Herramientas colaborativasHerramientas colaborativas
Herramientas colaborativas
 
10 способов как не надо тестировать высоконагруженный веб-сервис
10 способов как не надо тестировать высоконагруженный веб-сервис10 способов как не надо тестировать высоконагруженный веб-сервис
10 способов как не надо тестировать высоконагруженный веб-сервис
 
Informacion Feria de Canton 2,012
Informacion Feria de Canton 2,012Informacion Feria de Canton 2,012
Informacion Feria de Canton 2,012
 
comets of preetam teja
comets of preetam tejacomets of preetam teja
comets of preetam teja
 
Modelo O S I Taller 8
Modelo  O S I     Taller 8Modelo  O S I     Taller 8
Modelo O S I Taller 8
 
Capitulo oriental 18
Capitulo oriental 18Capitulo oriental 18
Capitulo oriental 18
 
JMcI/C2K
JMcI/C2KJMcI/C2K
JMcI/C2K
 
WeddingsEventsRebekah
WeddingsEventsRebekahWeddingsEventsRebekah
WeddingsEventsRebekah
 

Similar to Mapping the discrete logarithm

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Implementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. ProcessorImplementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
PTIHPA
 

Similar to Mapping the discrete logarithm (20)

G234353
G234353G234353
G234353
 
HOPFIELD NETWORK
HOPFIELD NETWORKHOPFIELD NETWORK
HOPFIELD NETWORK
 
Applications Of One Type Of Euler-Lagrange Fractional Differential Equation
Applications Of One Type Of Euler-Lagrange Fractional Differential EquationApplications Of One Type Of Euler-Lagrange Fractional Differential Equation
Applications Of One Type Of Euler-Lagrange Fractional Differential Equation
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Quantifying the call blending balance in two way communication retrial queues...
Quantifying the call blending balance in two way communication retrial queues...Quantifying the call blending balance in two way communication retrial queues...
Quantifying the call blending balance in two way communication retrial queues...
 
Dsp U Lec06 The Z Transform And Its Application
Dsp U   Lec06 The Z Transform And Its ApplicationDsp U   Lec06 The Z Transform And Its Application
Dsp U Lec06 The Z Transform And Its Application
 
4213ijaia05
4213ijaia054213ijaia05
4213ijaia05
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR Filters
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Simplified Model
Simplified ModelSimplified Model
Simplified Model
 
J0535964
J0535964J0535964
J0535964
 
Application of matrix algebra to multivariate data using standardize scores
Application of matrix algebra to multivariate data using standardize scoresApplication of matrix algebra to multivariate data using standardize scores
Application of matrix algebra to multivariate data using standardize scores
 
11.application of matrix algebra to multivariate data using standardize scores
11.application of matrix algebra to multivariate data using standardize scores11.application of matrix algebra to multivariate data using standardize scores
11.application of matrix algebra to multivariate data using standardize scores
 
San diego pres
San diego presSan diego pres
San diego pres
 
Dsp U Lec04 Discrete Time Signals & Systems
Dsp U   Lec04 Discrete Time Signals & SystemsDsp U   Lec04 Discrete Time Signals & Systems
Dsp U Lec04 Discrete Time Signals & Systems
 
Er24902905
Er24902905Er24902905
Er24902905
 
Implementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. ProcessorImplementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
 
Dsp U Lec08 Fir Filter Design
Dsp U   Lec08 Fir Filter DesignDsp U   Lec08 Fir Filter Design
Dsp U Lec08 Fir Filter Design
 
Approximate Bayesian Computation on GPUs
Approximate Bayesian Computation on GPUsApproximate Bayesian Computation on GPUs
Approximate Bayesian Computation on GPUs
 
MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...
 

More from Joshua Holden

Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Joshua Holden
 
Fixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power mapFixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power map
Joshua Holden
 
How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?
Joshua Holden
 

More from Joshua Holden (20)

The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
 
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
 
Statistics for fixed points of x ↦ x^x mod p
Statistics for fixed points of x  ↦ x^x mod pStatistics for fixed points of x  ↦ x^x mod p
Statistics for fixed points of x ↦ x^x mod p
 
Teaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation CiphersTeaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation Ciphers
 
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
 
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
 
A statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithmA statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithm
 
Fixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power mapFixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power map
 
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
 
A Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice VersaA Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice Versa
 
How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?
 
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
 
Math in Your Hands
Math in Your HandsMath in Your Hands
Math in Your Hands
 
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
 
How to Paint Your Way out of a Maze
How to Paint Your Way out of a MazeHow to Paint Your Way out of a Maze
How to Paint Your Way out of a Maze
 
Blackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversalsBlackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversals
 
Mathematical Cryptography
Mathematical CryptographyMathematical Cryptography
Mathematical Cryptography
 
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
 
Modular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door CiphersModular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door Ciphers
 
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Mapping the discrete logarithm

  • 1. Mapping the Discrete Logarithm Daniel R. Cloutier Joshua Holden Cincinnati, OH, USA Rose-Hulman Institute of Technology Daniel.R.Cloutier@ Terre Haute, IN 47803, USA alumni.rose-hulman.edu Joshua.Holden@rose-hulman.edu 1 Graphs Produced by Discrete Exponentiation: This yields the following results A Comparison to Random Graphs Ξ1(z) = 1 ln 1 (Number of components) (4) We investigate the functional graph produced by the discrete exponentiation 1 − zb(z) 1 − zb(z) transformation zb(z) Ξ2(z) = (Number of cyclic nodes) (5) g a mod p. (1 − zb(z)) 2 z2 This is the inverse of the discrete logarithm, which is used in many crypto- Ξ3(z) = . (Number of terminal nodes) (6) (1 − 2z 2)3/2 graphic algorithms. We predict that these graphs behave like random graphs with the same in-degrees and out-degrees for each node. We compute an asymptotic form for each of these by performing a singular- ity analysis1 as in [2, Section 2]. (See [1] for full proofs.) 2 Terminology and Background Theorem 1. The expected values of the following parameters in a random bi- A functional graph is a directed graph such that each vertex must have exactly nary functional graph of size n, as n → ∞, are asymptotic to one edge directed out from it. An m-ary functional graph is a graph where each node has in-degree of exactly zero or m. ln (2n) + γ There are a number of statistics of interest derived from functional graphs. Number of components (i) 2 These include: Number of cyclic nodes πn/2 − 1 (ii) • number of connected components Number of terminal nodes n/2 (iii) • number of cyclic nodes In part (i), γ represents the Euler constant which is approximately • number of terminal nodes 0.57721566. Note that the formula in part (iii) can be proved to be exact. • average cycle length Using similar techniques, we can calculate: Theorem 2. The expected values for the following parameters as seen from a • maximum cycle length random node in a random binary functional graph of size n, as n → ∞, are • average tail length asymptotic to • maximum tail length Average cycle length πn/8 (i) Average tail length πn/8 (ii) Theorem 3. The expected values of the largest cycle and the largest tail in a random binary functional graph of size n, as n → ∞, are asymptotic to πn ∞ ∞ −u du √ Largest cycle 1 − exp − e dv ≈ 0.78248 n 2 0 v u (i) √ √ Largest tail 2πn ln 2 − 3 + 2 ln 2 ≈ 1.73746 n − 1.61371 (ii) 4 Success in Predicting the Observed Results We generated experimental data for the parameters described by these theoret- ical predictions. The generation and analysis of each of the discrete exponen- Figure 1: The graph generated using f (x) = 3x mod 11. This graph has two tiation graphs was handled by C++ code written by the first author. The com- connected components: one containing a cycle of length three (1,3,5) and the putation took approximately one week for each prime. The statistics observed other containing a cycle of length one (fixed point) at 4. (Table 1) seem to support the claim that binary functional graphs induced by exponentiation modulo a prime behave in the same fashion as random binary functional graphs. 3 Theoretical Predictions for Random Binary 100043 100057 106261 Functional Graphs: The Basis for Comparison Observed Error Observed Error Observed Error The methods in [2] can be extended to develop estimates for these parameters Components 6.389 0.047% 6.364 0.437% 6.370 0.810% in random binary functional graphs. Define the following: Cyclic Nodes 395.303 0.029% 395.858 0.105% 408.433 0.217% BinFunGraph = set(Components) Terminal Nodes 50021 0% 50028 0% 53130 0% Component = cycle(Node*BinaryTree) Avg Cycle 198.319 0.056% 197.766 0.230% 202.651 0.795% BinaryTree = Node + Node*set(BinaryTree, cardinality = 2) Avg Tail 197.961 0.125% 197.550 0.339% 202.422 0.907% Node = Atomic Unit Max Cycle 247.261 0.094% 247.302 0.082% 256.986 0.754% Imitating [2, Section 2.1], the generating functions of interest are Max Tail 541.827 1.115% 549.588 1.145% 566.370 1.744% f (z) = ec(z) (Binary functional graphs) (1) Table 1: The observed results for the three primes over all binary functional 1 graphs generated and the corresponding percent errors. c(z) = ln (Connected components) (2) 1 − zb(z) 1 2 b(z) = z + zb (z) (Binary trees) (3) References 2 [1] Daniel R. Cloutier and Joshua Holden. Mapping the discrete logarithm. A bivariate generating function, ξ(u, z), is defined with parameter u marking http://xxx.lanl.gov/abs/math.NT/0605024. the elements of interest. The mean value generating function, Ξ(z), is found as [2] Philippe Flajolet and Andrew M. Odlyzko. Random mapping statistics. In Advances in cryptology—EUROCRYPT ’89 (Houthalen, 1989), volume ∂ξ 434 of Lecture Notes in Comput. Sci., pages 329–354. Springer, Berlin, Ξ(z) = . ∂u u=1 1990. 1 The analyses in this paper have been performed using the computer algebra program Maple and the packages created as part of the Algorithms Project at INRIA, Rocquencourt, France. The packages can be found online at http://pauillac.inria.fr/algo/libraries/software.html.