Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
How long does it take to catch a wild kangaroo?
Montenegro R., Tetali P.  STOC 2009 (Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Bethesda, MD, May 31-Jun 2, 2009)553-560.2009.Type:Proceedings
Date Reviewed: Oct 14 2009

The kangaroo in question is Pollard’s kangaroo (or lambda method) [1], in the distinguished points variant [2]. The eponymous feature of the method is that it has two kangaroos, one tame (or known) and one wild, that make (pseudo-)random jumps in a cyclic group G, where the jump sizes come from a set S. If the wild kangaroo ever lands on a point where the tame kangaroo has been, their paths from then on are the same, and the method can be used to find where the wild kangaroo starts, which is normally the value of a desired discrete logarithm.

This method is best applied where the discrete logarithm x is assumed to lie in some interval [a,b]. The paper shows that the number of group operations is (3 + o(1)) if x = a or b, and is otherwise bounded by this. Furthermore, if x is uniformly random in [a,b], the average number is (2 + o(1)) .

There is a subtlety in the bullet point spanning the column break on page 554: “We consider powers of two, S = {2k}d{k=0}, with d ≈ log2 + log2 log2 - 2.” For a realistic b - a, say 230 or more, this seems possible. While the first equation of Section 4 is an example, some details need to be filled in to get the approximation; in particular, the - 2 term seems crucial.

The paper uses some notation with which I am unfamiliar: 1C is not explained, but is “1 if C is true, otherwise 0.” It also falls into the common trap of declaring that cryptographic schemes are “all based on an assumption that discrete logarithm is difficult to find.” It is possible--but unlikely--that some or all of these schemes would fail anyway, since their hypotheses are stronger than the general discrete logarithm.

Reviewer:  J. H. Davenport Review #: CR137362 (1007-0717)
1) Pollard, J.M. Monte Carlo methods for index computations (mod p). Math. Comp. 32 (1978), 918–924.
2) van Oorschot, P.C.; Wiener, M.J. Parallel collision search with cryptanalytic applications. Journal of Cryptology 12, 1(1999), 1–28.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Markov Processes (G.3 ... )
 
 
Number-Theoretic Computations (F.2.1 ... )
 
 
Probabilistic Algorithms (Including Monte Carlo) (G.3 ... )
 
 
Numerical Algorithms And Problems (F.2.1 )
 
 
Probability And Statistics (G.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Markov Processes": Date
Continuous-time Markov chains and applications
Yin G., Zhang Q., Springer-Verlag New York, Inc., New York, NY, 1998. Type: Book (9780387982441)
Jan 1 1999
Stochastic dynamic programming and the control of queueing systems
Sennott L., Wiley-Interscience, New York, NY, 1999. Type: Book (9780471161202)
Jan 1 1999
Lower bounds for randomized mutual exclusion
Kushilevitz E., Mansour Y., Rabin M., Zuckerman D. SIAM Journal on Computing 27(6): 1550-1563, 1998. Type: Article
Jul 1 1999
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy