Article ID Journal Published Year Pages File Type
428386 Information Processing Letters 2006 4 Pages PDF
Abstract

The Diffie–Hellman key agreement protocol is based on taking large powers of a generator of a prime-order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority to generate a standard for the Diffie–Hellman key agreement protocol which has a hidden trapdoor.

Related Topics
Physical Sciences and Engineering Computer Science Computational Theory and Mathematics