Pohlig–Hellman Algorithm
   HOME

TheInfoList



OR:

In
group theory In abstract algebra, group theory studies the algebraic structures known as group (mathematics), groups. The concept of a group is central to abstract algebra: other well-known algebraic structures, such as ring (mathematics), rings, field ...
, the Pohlig–Hellman algorithm, sometimes credited as the Silver–Pohlig–Hellman algorithm, Mollin 2006, pg. 344 is a special-purpose
algorithm In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific problems or to perform a computation. Algorithms are used as specifications for performing ...
for computing
discrete logarithm In mathematics, for given real numbers ''a'' and ''b'', the logarithm log''b'' ''a'' is a number ''x'' such that . Analogously, in any group ''G'', powers ''b'k'' can be defined for all integers ''k'', and the discrete logarithm log' ...
s in a finite abelian group whose order is a
smooth integer In number theory, an ''n''-smooth (or ''n''-friable) number is an integer whose prime factors are all less than or equal to ''n''. For example, a 7-smooth number is a number whose every prime factor is at most 7, so 49 = 72 and 15750 = 2 × 32 × 5 ...
. The algorithm was introduced by Roland Silver, but first published by Stephen Pohlig and
Martin Hellman Martin Edward Hellman (born October 2, 1945) is an American cryptologist and mathematician, best known for his involvement with public key cryptography in cooperation with Whitfield Diffie and Ralph Merkle. Hellman is a longtime contributor to ...
(independent of Silver).


Groups of prime-power order

As an important special case, which is used as a subroutine in the general algorithm (see below), the Pohlig–Hellman algorithm applies to groups whose order is a
prime power In mathematics, a prime power is a positive integer which is a positive integer power of a single prime number. For example: , and are prime powers, while , and are not. The sequence of prime powers begins: 2, 3, 4, 5, 7, 8, 9, 11, 13, 16, ...
. The basic idea of this algorithm is to iteratively compute the p-adic digits of the logarithm by repeatedly "shifting out" all but one unknown digit in the exponent, and computing that digit by elementary methods. (Note that for readability, the algorithm is stated for cyclic groups — in general, G must be replaced by the subgroup \langle g\rangle generated by g, which is always cyclic.) :Input. A cyclic group G of order n=p^e with generator g and an element h\in G. :Output. The unique integer x\in\ such that g^x=h. :# Initialize x_0:=0. :# Compute \gamma:=g^. By Lagrange's theorem, this element has order p. :# For all k\in\, do: :## Compute h_k:=(g^h)^. By construction, the order of this element must divide p, hence h_k\in\langle\gamma\rangle. :## Using the baby-step giant-step algorithm, compute d_k\in\ such that \gamma^=h_k. It takes time O(\sqrt p). :## Set x_:=x_k+p^kd_k. :# Return x_e. Assuming e is much smaller than p, the algorithm computes discrete logarithms in time complexity O(e\sqrt p), far better than the baby-step giant-step algorithm's O(\sqrt).


The general algorithm

In this section, we present the general case of the Pohlig–Hellman algorithm. The core ingredients are the algorithm from the previous section (to compute a logarithm modulo each prime power in the group order) and the
Chinese remainder theorem In mathematics, the Chinese remainder theorem states that if one knows the remainders of the Euclidean division of an integer ''n'' by several integers, then one can determine uniquely the remainder of the division of ''n'' by the product of the ...
(to combine these to a logarithm in the full group). (Again, we assume the group to be cyclic, with the understanding that a non-cyclic group must be replaced by the subgroup generated by the logarithm's base element.) :Input. A cyclic group G of order n with generator g, an element h\in G, and a prime factorization n=\prod_^rp_i^. :Output. The unique integer x\in\ such that g^x=h. :# For each i\in\, do: :## Compute g_i:=g^. By Lagrange's theorem, this element has order p_i^. :## Compute h_i:=h^. By construction, h_i\in\langle g_i\rangle. :## Using the algorithm above in the group \langle g_i\rangle, compute x_i\in\ such that g_i^=h_i. :# Solve the simultaneous congruence x\equiv x_i\pmod \quad\forall i\in\ \textThe Chinese remainder theorem guarantees there exists a unique solution x\in\. :# Return x. The correctness of this algorithm can be verified via the classification of finite abelian groups: Raising g and h to the power of n/p_i^ can be understood as the projection to the factor group of order p_i^.


Complexity

The worst-case input for the Pohlig–Hellman algorithm is a group of prime order: In that case, it degrades to the baby-step giant-step algorithm, hence the worst-case time complexity is \mathcal O(\sqrt n). However, it is much more efficient if the order is smooth: Specifically, if \prod_i p_i^ is the prime factorization of n, then the algorithm's complexity is \mathcal O\left(\sum_i \right) group operations. Menezes, et al. 1997, pg. 108


Notes


References

* * * {{DEFAULTSORT:Pohlig-Hellman algorithm Number theoretic algorithms