Transformations of Cryptographic Schemes
Through Interpolation Techniques
Stamatios-Aggelos N. Alexandropoulos, Gerasimos C. Meletiou,
Dimitrios S. Triantafyllou, and Michael N. Vrahatis
Abstract The problem of transforming cryptographic schemes using interpolation
techniques is studied. Firstly, explicit forms for the discrete logarithm and the
Diffie–Hellman cryptographic functions are given. Subsequently, the inverse Aitken
and Neville interpolation methods for the discrete logarithm and the Lucas logarithm
problems are presented. Next, the representation of cryptographic functions through
polynomials or algebraic functions as well as a special case of discrete logarithm
problem is given. Finally, a study of cryptographic functions using factorization of
matrices is analyzed.
Keywords: Public key cryptography • Discrete logarithm • Diffie Hellman
mapping • Polynomial interpolation techniques • Matrix factorization
1 Introduction
A basic task of cryptography is the transformation or encryption, of a given message
into another one which appears meaningful only to the intended recipient after the
process of decryption. Messages and cryptograms are represented as elements of
finite algebraic structures. Encryption and decryption processes are functions over
finite structures especially over finite fields.
It is well known that, in a finite field GF.q/, where q is a prime power, every
function can be represented as a polynomial through the Lagrangian interpolation.
S.-A.N. Alexandropoulos () • M.N. Vrahatis
Computational Intelligence Laboratory (CILab), Department of Mathematics,
University of Patras, GR-26110 Patras, Greece
e-mail: alekst@master.math.upatras.gr; vrahatis@math.upatras.gr
G.C. Meletiou
A.T.E.I. of Epirus, P.O. 110, GR-47100 Arta, Greece
e-mail: gmelet@teiep.gr
D.S. Triantafyllou
Hellenic Army Academy (SSE), University of Military Education, GR-16673 Vari,
Attica, Greece
e-mail: dtriant@sse.gr
© Springer International Publishing Switzerland 2015
N.J. Daras, M.Th. Rassias (eds.), Computation, Cryptography,
and Network Security, DOI 10.1007/978-3-319-18275-9_1
1
1