Documente Academic
Documente Profesional
Documente Cultură
I. I n t r o d u c t i o n H. N o t a t i o n
Irreducible polynomials in Fp[X] are used to carry
If K is a field K will denote an algebraic closure.
out the arithmetic in field extension of Fp. Computations
When p is a rational prime, F p will denote the field with
in such extensions occur in coding theory [2], complexity
p elements. If K is a number field (i.e. finite extension of
theory [8] and cryptography [3]. Random polynomial
Q) O K will denote its ring of integers. When a rational
time algorithms exist for finding irreducible polynomials
prime p and a number field K are fixed, then for a e OK,
of any degree over F p [2, 8], and so as a practical matter
5 will denote a + p O K. If a rational prime p is fixed, then
the problem is solved. However, the deterministic
d •
complexity of the problem has yet to be established. for f e Z [x], f = E i = 0 aixl, i will denote E i L o aix|¢
2hi
We present two results: n
Fp[X]. For n ~ Z > i , fn will denote e
350
(4) For i = 1,2,...,d calculate ai,l,ai,2,...,ai, d c Fp such which are polynomial in q log p. It follows that Step (3)
that: can be done in polynomial time.
Vi(flTaa) = ~j=l
d ai,iVj where
For Step (4) it suffices to show that for a fixed i the
Vi -~ fie I]5.~_
a 1 a tet ~ ~p for calculation of the a..'s takes polynomial time. The
1,]
a calculation proceeds in a + l stages. In Stage 1 powers of f
i ~ ~5--1 etPt-l(m°d pa) with ed{0,1,..,p-1 }
greater than n-1 are reduced using g. In stage i -~
for 5--1,2,...,a.
2,3,...,a+1 powers of aa+2. i greater than p-1 are reduced
i _~ e(mod n) with e ~ {0,1,...,n-I}.
using fa+2-i" The remaining details are straightforward.
a 1 ~ Fp is a root of fl ~ xP-x-1 ~ Fp[x]
The calculation of the characteristic polynomial of a
ate Fp is a root of ft = xP-x'[I~[~'~--llaj] p-I
matrix of Md(Fp) can be done in time polynomial in
Fp(~l,-2,...,%1)[x ] for t = 2,3,...,a
d log p using standard methods [10, pp. 353.-355, 410-411].
fl e Fp is a root of g
We now argue that the polynomial f eFp[X]
(5) Calculate f ~ Fp[x] such that f is the characteristic produced by Algorithm A is irreducible of degree d. We
polynomial of (ai,j) E Md(Fp). begin by considering the following tower of fields:
Hence the q required in Step (2) is sufficiently small It follows from the claims that f + a a satisfies a
that it can be found and tested for primality in unique d th degree monic irreducible polynomial in Fp[X].
polynomial time. Since p is inert in K iff (q-1/f,n) -~- 1 Since the V i of the Algorithm are clearly a basis for F / F p
where f is the order of p in (Z/ qZ)* this too can be it follows from standard result (see for example [7], pages
tested in polynomial time. 7-8) that f is the desired polynomial.
For Step (3) we begin by noting that it follows from Claim I will follow from the next two lemmas,
Gauss' theory of periods (see [9]) that 1-[aEGK]Q (x-, a) variants of which may be found in [7] for example:
Z Ix] so the definition of g makes sense. Since
L e m m a 4: Let K be a field of characteristic p 7d 0 and
IIaCGK/Q(x-, a) I]aeGK/Q( x , ) the calculation of g
a ~ K. Then either f ---- xP-x-a is irreducible or it has a
can be done using the ring operations in Z [;q]/pZ [¢q]
root in K.
351
P r o o f : If a,~ e K are roots of f then (a-c) p = a-~, so a-~ e Proof: It is well known [9] that S = {na:a e GK/Q} is
Fp. Therefore K(a) ~- K(~), and a and /~ have the same
a basis for O K over Z. Hence S'---- {,Ta:a E GK/Q} is a
degree over K. It follows that all irreducible factors of f in
basis for the n th degree extension field OK/PO K as a
K[x] have the same.degree. But f has prime degree, so
either f is irreducible or all its factors are linear. [] vector space over Fp. It follows that S has n elements.
The field automorphisms of OK/PO K induced by the
L e m m a 5: Let K be a field of characteristic p ~ 0, a e
elements of GK/Q permute S" transitively. Hence the
K with f = xP-x-a e K[x] irreducible, a ~ K a root of f.
Then g = xP-x-aa p'I e K(a)[x] is irreducible. elements of S" are conjugate over Fp. It follows that g is
irreducible in Fp[X]. O
Proof: Let Tr denote the trace function from K(a) to
Notice that since fa is irreducible in
K. We will calculate Tr(aP'l). By assumption,
Fp(al,a2,...,aa.1)[x ] it follows that F a = Fp(aa). Now
(*) ~ P - ~ - a ~- 0
Claim III follows from:
Multiplying (*) by a "l gives a p-1 ~- a a ' l + l so Tr(a p'I) =
Tr(aa-l+l)- aTr(a-1)+Wr(1)_-- aTr(a'l). Multiplying
Lemma 7: Let a,~ E Fp with [Fp(a):Fp] and [Fp(~):Fp]
(*) by (a'l)Pa "1 gives a'l-(aq)(a'l)p'l-(a-1) p : 0 from
relatively prime. Then Fp(a,fl) ---- Fp(a+/~).
which it follows that -a-l+a'lxP'l-FxP is the monic
irreducible polynomial for 0-1 and Tr(a -1) = -a "1. Hence
Proof: Let d a = [Fp(a):Fp], d~ = [Fp(f0:Fp], da+ ~ =
Tr(. pq) = -1. [~p(a+/~):Fp]. Since Fp C Fp(a) _C_ Fp(/~,a+~) we have
~ K(a) with #P-h-ha p-I ---- 0. Taking traces (and da[da+ p. Similarly d~lda+ ~ hence dad~[da+ ~. Clearly
observing that raising to the pth power commutes with Fp(a+~) _C Fp(a,l~) so they must be equal. []
g= II (x-~a)
aeGK/Q (0) Input p,d e Z > l
where ,7 ---- WrQ(¢q)/K(;q), then g is irreducible in FFp[x].
(1) Set e 0 -~ a 0 -~ b 0 ---- 1, set go "-~ x-1 e Fp[X].
352
(2) For i = 1,2,...,z calculate <qi,ai,bi,ei,gi> such VI. P r o o f o f C o r r e c t n e s s - A l g o r i t h m B
that:
We begin by proving the following claim (the
qi ~ least positive prime with qi-1 square free,
notation is that of Algorithm B):
qi ~ P and qi I P ei-l-1
a i -~ least positive integer with pai ~. I mod qi C l a i m IV: There exists a e ~ Z > 0 such that for all p,d
b i ~ ai/(ai,ei.1) Z > l with p prime, the bi's and qi's produced in Algorithm
(5) Calculate f e Fp[x] such that: It follows from (a) of Claim IV that z .~. log d and
f is characteristic polynomial of (aij) e Mt0(Fp). that each qi can be found in polynomial time by naive
search. Step (2) is now easily seen to be computable in
(6) Output f ' .
polynomial time. The other steps are proved to be
353
computable in polynomial time using simple varients of polynomial time algorithm for finding quadratic
the arguments used for Algorithm A. nonresidues and taking square roots in Fp.
((qi-1)/ai,bi)=l) •
References
Consider Step (3) of the algorithm. At the start we
[1] E. Bach and J. Shallit, •Factoring with
have tze z ---- e z ~_ d. Assume that at stage j we have tic j
Cyclotomic Polynomials, • Proceedings 26th
~_ d, then if option (a) is executed we have ti_lCj.1 -~
FOCS, 1985, pp. 443-450.
tibicj. 1 ~ tie i ~ d. If option (c) is executed we have
tj.lej. 1 .~- tjcj. 1 ~._ d. It follows that if option (b) is never
[2] E.R. Berlekamp, "Algebraic Coding Theory, •
executed then t o ---- t0e 0 __ d. On the other hand, if for
McGraw-Hill Publishing Company, New York,
some j option (b) is executed then using (a) of claim IV we
1968.
get d < tjbj < tj cej_1 log p ~- t o e log p so
t 0 > d / ¢ log p. In any case, since it is clear from Step (3)
[3] B. Chor and R. Rivest, •A Knapsack Type
that we always have t O _~. d, we get
Public Key Cryptosystem Based on Arithmetic
d
c iog-----p~ to "~" d in Finite Fields, • Advances in Cryptography
as desired. (Ed., G. Goos and J. Hartmanis), Springer-
Verlag, New York, pp. 54-65.
VII. Conclusion
[4] J. Von zur Gathen, •Irreducible Polynomials
A deterministic algorithm for finding an irreducible
Over Finite Fields," Manuscript, 1985.
polynomial of desired degree in Fp[X] is presented. The
algorithm runs in polynomial time if an extension of
Riemann hypothesis is assumed. A second algorithm [5] E.E. Kummer, Uber die Divisoren gewisser
which runs in deterministic polynomial time without Formen der Zahlen, welche aus der Theorie
hypothesis and produces an irreducible polynomial of der Kreistheilung entstehen, J. reine angew.
approximately the desired degree is also presented. Math. 30 (1846), 107-116; pp. 193-202 in
The obvious remaining problems are to remove the Collected papers, Springer-Verlag, Berlin,
solution to either would imply the solution to other well an Integer as the Sum of a Prime and a k-free
Integer, • Amer. Math. Monthly 56 (1949),
known problems in number theoretic computational
complexity. For example, removal of the need for 17-19.
354
[8]M.O. Rabin, "Probabilistie Algorithms in
Finite Fields," SIAM J. Comput., Vol. 9,
(1980), pp. 273-280.
355