CFP last date
20 December 2024
Reseach Article

Pollard RHO Algorithm for Integer Factorization and Discrete Logarithm Problem

by Nagaratna Hegde, P.deepthi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 18
Year of Publication: 2015
Authors: Nagaratna Hegde, P.deepthi
10.5120/21639-4969

Nagaratna Hegde, P.deepthi . Pollard RHO Algorithm for Integer Factorization and Discrete Logarithm Problem. International Journal of Computer Applications. 121, 18 ( July 2015), 14-17. DOI=10.5120/21639-4969

@article{ 10.5120/21639-4969,
author = { Nagaratna Hegde, P.deepthi },
title = { Pollard RHO Algorithm for Integer Factorization and Discrete Logarithm Problem },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 18 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number18/21639-4969/ },
doi = { 10.5120/21639-4969 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:08:45.285680+05:30
%A Nagaratna Hegde
%A P.deepthi
%T Pollard RHO Algorithm for Integer Factorization and Discrete Logarithm Problem
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 18
%P 14-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is must everywhere. We have to secure our data at all places like online banking, e-commerce etc. , Cryptography doesn't have to be so cryptic. AES, DES, RSA, ECC -- there are so many ways to encrypt our data. Example: company's protecting customer credit card information, securing remote user connections to our network or protecting our intellectual property from digital piracy, we're using encryption every day. In 1980s, there was only one real choice -- the Data Encryption Standard (DES). Today, we have a broad selection of stronger, faster and better-designed algorithms. Now, the problem is to sort out which algorithm to be used. Elliptic curve cryptography (ECC) is one of the most powerful but least understood types of cryptography in wide use today. An increasing number of websites make extensive use of ECC to secure everything from customers HTTPS connections to how they pass data between data centers. So, it's important for end users to understand the technology behind any security system in order to trust it.

References
  1. The Discrete Logarithm Problem. Available online: http://modular. math. washington. edu/edu/124/lectures/lecture8/html/node5. html
  2. G Wojtenko, "Statistical properties of ECC-point and its impact on ECDLP", https://eprint. iacr. org/2007/092. pdf
  3. Mandy Zandra Seet, "ELLIPTIC CURVE CRYPTOGRAPHY Improving the Pollard-Rho Algorithm", https://www. maths. unsw. edu. au/sites/default/files/mandyseetthesis. pdf
  4. Pollard's rho algorithm. Available online: http://en. wikipedia. org/wiki/Pollard_rho_algorithm
  5. Factoing Large Numbers, A Great Way to Spend a Birthday. Available online: http://www4. ncsu. edu/lrbosko/Publications/Rho. pdf
  6. Connelly Barnes "Integer Factorization Algorithms" http://www. connellybarnes. com/documents/factoring. pdf
  7. Pollard rho Factorization Method. Available online: http://mathworld. wolfram. com/PollardRhoFactorizationMethod. html
  8. Computational Number Theory and Algebra. Available online: http://people. mpi-inf. mpg. de/~csaha/lectures/lec18. pdf
  9. A Quick Tutorial on Pollard's Rho Algorithm. http://www. cs. colorado. edu/srirams/classes/doku. php/pollard_rho_tutorial
  10. ELLIPTIC CURVE CRYPTOGRAPHY (ECC) https://www. certicom. com/ecc
  11. Nick Sullivan, "A (relatively easy to understand) primer on elliptic curve cryptography", http://arstechnica. com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/
Index Terms

Computer Science
Information Sciences

Keywords

Discrete logarithm problem elliptic curve integer factorization pollard rho.