In
cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
, XTR is an
algorithm
In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific Computational problem, problems or to perform a computation. Algorithms are used as specificat ...
for
public-key encryption
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
. XTR stands for 'ECSTR', which is an abbreviation for Efficient and Compact Subgroup Trace Representation. It is a method to represent elements of a subgroup of a multiplicative
group of a
finite field
In mathematics, a finite field or Galois field (so-named in honor of Évariste Galois) is a field that contains a finite number of elements. As with any field, a finite field is a set on which the operations of multiplication, addition, subtr ...
. To do so, it uses the
trace
Trace may refer to:
Arts and entertainment Music
* Trace (Son Volt album), ''Trace'' (Son Volt album), 1995
* Trace (Died Pretty album), ''Trace'' (Died Pretty album), 1993
* Trace (band), a Dutch progressive rock band
* The Trace (album), ''The ...
over
to represent elements of a subgroup of
.
From a security point of view, XTR relies on the difficulty of solving
Discrete Logarithm
In mathematics, for given real numbers ''a'' and ''b'', the logarithm log''b'' ''a'' is a number ''x'' such that . Analogously, in any group ''G'', powers ''b'k'' can be defined for all integers ''k'', and the discrete logarithm log''b' ...
related problems in the full multiplicative group of a finite field. Unlike many cryptographic protocols that are based on the generator of the full multiplicative group of a finite field, XTR uses the generator
of a relatively small subgroup of some prime order
of a subgroup of
. With the right choice of
, computing Discrete Logarithms in the group, generated by
, is, in general, as hard as it is in
and thus cryptographic applications of XTR use
arithmetics while achieving full
security leading to substantial savings both in communication and
computational overhead without compromising security. Some other advantages of XTR are its fast key generation, small key sizes and speed.
Fundamentals of XTR
XTR uses a
subgroup, commonly referred to as ''XTR subgroup'' or just ''XTR group'', of a subgroup called ''XTR supergroup'', of the multiplicative group of a
finite field
In mathematics, a finite field or Galois field (so-named in honor of Évariste Galois) is a field that contains a finite number of elements. As with any field, a finite field is a set on which the operations of multiplication, addition, subtr ...
with
elements. The XTR supergroup is of order
, where ''p'' is a prime such that a sufficiently large prime ''q'' divides
. The XTR subgroup has now order ''q'' and is, as a subgroup of
, a
cyclic group with
generator
Generator may refer to:
* Signal generator, electronic devices that generate repeating or non-repeating electronic signals
* Electric generator, a device that converts mechanical energy to electrical energy.
* Generator (circuit theory), an eleme ...
''g''. The following three paragraphs will describe how elements of the XTR supergroup can be represented using an element of
instead of an element of
and how arithmetic operations take place in
instead of in
.
Arithmetic operations in
Let ''p'' be a prime such that ''p'' ≡ ''2'' mod ''3'' and ''p
2 - p + 1'' has a sufficiently large prime factor ''q''. Since ''p
2'' ≡ ''1'' mod ''3'' we see that ''p'' generates
and thus the third
cyclotomic polynomial
In mathematics, the ''n''th cyclotomic polynomial, for any positive integer ''n'', is the unique irreducible polynomial with integer coefficients that is a divisor of x^n-1 and is not a divisor of x^k-1 for any Its roots are all ''n''th primiti ...
is
irreducible
In philosophy, systems theory, science, and art, emergence occurs when an entity is observed to have properties its parts do not have on their own, properties or behaviors that emerge only when the parts interact in a wider whole.
Emergence ...
over
. It follows that the
roots
A root is the part of a plant, generally underground, that anchors the plant body, and absorbs and stores water and nutrients.
Root or roots may also refer to:
Art, entertainment, and media
* ''The Root'' (magazine), an online magazine focusing ...
and
form an optimal
normal basis In mathematics, specifically the algebraic theory of fields, a normal basis is a special kind of basis for Galois extensions of finite degree, characterised as forming a single orbit for the Galois group. The normal basis theorem states that any f ...
for
over
and
:
Considering that ''p'' ≡ ''2'' mod ''3'' we can reduce the exponents modulo ''3'' to get
:
The cost of arithmetic operations is now given in the following Lemma labeled Lemma 2.21 in ''"An overview of the XTR public key system"'':
Lemma
* Computing ''x''
''p'' is done without using multiplication
* Computing ''x''
''2'' takes two multiplications in
* Computing ''xy'' takes three multiplications in
* Computing ''xz-yz''
''p'' takes four multiplications in
.
Traces over
The
trace
Trace may refer to:
Arts and entertainment Music
* Trace (Son Volt album), ''Trace'' (Son Volt album), 1995
* Trace (Died Pretty album), ''Trace'' (Died Pretty album), 1993
* Trace (band), a Dutch progressive rock band
* The Trace (album), ''The ...
in XTR is always considered over
. In other words, the
conjugates of
over
are
and
and the trace of
is their sum:
:
Note that
since
:
Consider now the generator
of the XTR subgroup of a prime order
. Remember that
is a subgroup of the XTR supergroup of order
, so
. In the
following section we will see how to choose
and
, but for now it is sufficient to assume that
. To compute the trace of
note that modulo
we have
:
and
:
and thus
:
The product of the conjugates of
equals
,
i.e., that
has
norm
Naturally occurring radioactive materials (NORM) and technologically enhanced naturally occurring radioactive materials (TENORM) consist of materials, usually industrial wastes or by-products enriched with radioactive elements found in the envir ...
1.
The crucial observation in XTR is that the
minimal polynomial of
over
:
simplifies to
:
which is fully determined by
. Consequently, conjugates of
, as roots of the minimal polynomial of
over
, are completely determined by the trace of
. The same is true for any power of
: conjugates of
are roots of polynomial
:
and this polynomial is completely determined by
.
The idea behind using traces is to replace
in cryptographic protocols, e.g. the
Diffie–Hellman key exchange
Diffie–Hellman key exchangeSynonyms of Diffie–Hellman key exchange include:
* Diffie–Hellman–Merkle key exchange
* Diffie–Hellman key agreement
* Diffie–Hellman key establishment
* Diffie–Hellman key negotiation
* Exponential key exc ...
by
and thus obtaining a factor of 3 reduction in representation size. This is, however, only useful if there is a quick way to obtain
given
. The next paragraph gives an algorithm for the efficient computation of
. In addition, computing
given
turns out to be quicker than computing
given
.
Algorithm for the quick computation of given
A. Lenstra and E. Verheul give this algorithm in their paper titled ''The XTR public key system'' in.
All the definitions and lemmas necessary for the algorithm and the algorithm itself presented here, are taken from that paper.
Definition For c in
define
:
Definition Let
denote the, not necessarily distinct, roots of
in
and let
be in
. Define
:
Properties of
and
#
#
#
#
# Either all
have order dividing
and
or all
are in
. In particular,
is irreducible if and only if its roots have order diving
and
.
#
is reducible over
if and only if
Lemma
Let
be given.
# Computing
takes two multiplication in
.
# Computing
takes four multiplication in
.
# Computing
takes four multiplication in
.
# Computing
takes four multiplication in
.
Definition Let
.
Algorithm 1 for computation of
given
and
* If
apply this algorithm to
and
, and apply Property 2 to the resulting value.
* If
, then
.
* If
, then
.
* If
, use the computation of
and
to find
and thereby
.
* If
, to compute
define
:::
::and
if n is odd and
otherwise. Let
and compute
using the Lemma above and
. Let further
:::
::with
and
. For
in succession, do the following:
::* If
, use
to compute
.
::* If
, use
to compute
.
::* Replace
by
.
When these iterations finish,
and
. If n is even use
to compute
.
Parameter selection
Finite field and subgroup size selection
In order to take advantage of the above described representations of elements with their traces and furthermore ensure sufficient security, that will be discussed
below
Below may refer to:
*Earth
*Ground (disambiguation)
*Soil
*Floor
*Bottom (disambiguation)
Bottom may refer to:
Anatomy and sex
* Bottom (BDSM), the partner in a BDSM who takes the passive, receiving, or obedient role, to that of the top or ...
, we need to find primes
and
, where
denotes the
characteristic of the field
with
and
is the size of the subgroup, such that
divides
.
We denote with
and
the sizes of
and
in bits. To achieve security comparable to 1024-bit
RSA, we should choose
about 1024, i.e.
and
can be around 160.
A first easy algorithm to compute such primes
and
is the next Algorithm A:
Algorithm A
# Find
such that
is a
-bit prime.
# Find
such that
is a
-bit prime with
.
:''Correctness of Algorithm A:''
:It remains to check that
because all the other necessary properties are obviously satisfied per definition of
and
. We easily see that
which implies that
.
Algorithm A is very fast and can be used to find primes
that satisfy a degree-two polynomial with small coefficients. Such
lead to fast arithmetic operations in
.
In particular if the search for
is restricted to
, which means looking for an
such that both
are prime and such that
, the primes
have this nice form.
Note that in this case
must be even and
.
On the other hand, such
may be undesirable from a security point of view because they may make an attack with the
Discrete Logarithm
In mathematics, for given real numbers ''a'' and ''b'', the logarithm log''b'' ''a'' is a number ''x'' such that . Analogously, in any group ''G'', powers ''b'k'' can be defined for all integers ''k'', and the discrete logarithm log''b' ...
variant of the
Number Field Sieve easier.
The following Algorithm B doesn't have this disadvantage, but it also doesn't have the fast arithmetic modulo
Algorithm A has in that case.
Algorithm B
# Select a
-bit prime
so that
.
# Find the roots
and
of
.
# Find a
such that
is a
-bit prime with
for
:''Correctness of Algorithm B:''
:Since we chose
it follows immediately that
(because
and
). From that and
quadratic reciprocity we can deduce that
and
exist.
:To check that
we consider again
for
and get that
, since
and
are roots of
and hence
.
Subgroup selection
In the last paragraph we have chosen the sizes
and
of the finite field
and the multiplicative subgroup of
, now we have to find a subgroup
of
for some
such that
.
However, we do not need to find an explicit
, it suffices to find an element
such that
for an element
of order
. But, given
, a generator
of the XTR (sub)group can be found by determining any root of
which has been defined
above.
To find such a
we can take a look at property 5 of
here
Here is an adverb that means "in, on, or at this place". It may also refer to:
Software
* Here Technologies, a mapping company
* Here WeGo (formerly Here Maps), a mobile app and map website by Here
Television
* Here TV (formerly "here!"), a TV ...
stating that the roots of
have an order dividing
if and only if
is
irreducible
In philosophy, systems theory, science, and art, emergence occurs when an entity is observed to have properties its parts do not have on their own, properties or behaviors that emerge only when the parts interact in a wider whole.
Emergence ...
. After finding such
we need to check if it really is of order
, but first we focus on how to select
such that
is irreducible.
An initial approach is to select
randomly which is justified by the next lemma.
Lemma: ''For a randomly selected
the probability that