Abstract
The Diffie-Hellman key agreement protocol is based on taking large powers of a generator of a prime-order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority to generate a standard for the Diffie-Hellman key agreement protocol which has a hidden trapdoor.
Original language | English |
---|---|
Pages (from-to) | 145-148 |
Number of pages | 4 |
Journal | Information Processing Letters |
Volume | 99 |
Issue number | 4 |
DOIs | |
State | Published - 31 Aug 2006 |
Externally published | Yes |
Keywords
- Cryptography
- Diffie-Hellman problem
- Discrete logarithm problem
- Fast generators
- Trapdoor