New Lattice Attacks on DSA Schemes
|
|
|
- Amberly Freeman
- 9 years ago
- Views:
Transcription
1 New Lattice Attacks on DSA Schemes Dimitrios Poulakis Department of Mathematics, Aristotle University of Thessaloniki, Thessaloniki 54124, Greece, January 23, 20 Abstract We prove that a system of linear congruences of a particular form has at most a unique solution below a certain bound which can be computed efficiently Using this result we develop attacks against the DSA schemes which, under some assumptions, can provide the secret key in the case where one or several signed messages are available MSC 2010: 94A60, 11T71, 11Y Keywords: Public Key Cryptography; Digital Signature Algorithm; Elliptic Curve Digital Signature Algorithm; Closest Vector Problem; Discrete Logarithm 1 Introduction In August 1991, the US government s National Institute of Standards and Technology (NIST) proposed an algorithm for digital signatures The algorithm is known as DSA, for Digital Signature Algorithm [18,, 14] It is an efficient variant of the ElGamal digital signature scheme [6] intended for use in electronic mail, electronic funds transfer, electronic data interchange, software distribution, data storage, and other applications which require data integrity assurance and data authentication In 1998, an elliptic curve analogue called Elliptic Curve Digital Signature Algorithm (ECDSA) was proposed and standardized [9, 13, 14] In the next subsection we shall recall the outlines of DSA and ECDSA 11 The DSA Schemes First, for DSA, the signer chooses a prime p of size between 512 and 1024 bits with increments of 64, q is a prime of size 0 with q p 1 and g is a generator of the unique order q subgroup G of Z p Further, he chooses 1
2 a {1,, q 1} and computes A = g a mod p The public key of the signer is (p, q, g, A) and his private key a Furthermore, the signer chooses a publicly known hash function h mapping messages to {0,, q 1} To sign a message m, he chooses a random number k {1,, q 1} which is the ephemeral key, computes r = (g k mod p) mod q and s = k 1 (h(m) + ar) mod q The signature of m is the pair (r, s) The signature is valid if and only if the following equality holds: r = ((g s 1 h(m)modq A s 1 rmodq ) mod p) mod q The ECDSA uses an elliptic curve E over F p and a point P E(F p ) with order a prime q of size around 0 bits The signer selects a {1,, q 1} and computes Q = ap Its public key is (p, E, P, q, Q) and his private key a To sign a message m having hash value h(m) {0,, q 1}, he selects a random number k {1,, q 1} which is the ephemeral key and computes kp = (x, y) (where x and y are regarded as integer between 0 and p 1) Next, he computes r = x mod q and s = k 1 (h(m) + ar) mod q The signature of m is the pair (r, s) For the verification of the signature one computes u 1 = s 1 h(m) mod q, u 2 = s 1 r mod q, u 1 P + u 2 Q = (x 0, y 0 ) He accepts the signature if and only if r = x 0 mod q The security of DSA (respectively ECDSA) relies on the hardness of the discrete logarithm problem in prime fields and theirs subgroups (respectively in the group of elliptic curve) Thus, the parameters of the two systems were chosen in such a way that the computation of discrete logarithms is computationally infeasible, and so the secret key a and the ephemeral key k are well protected 12 Related Works The use of lattices and the LLL reduction method [15] is an efficient tool for attacking a variety of cryptographic schemes Attacks to DSA schemes using lattice reduction techniques and the equality s = k 1 (h(m) + ar) mod q are given in [1], [12], [19], [20], [3], [21], [5] and [7] In [1] it is shown that if random numbers for DSA are generated using a linear congruential pseudorandom number generator (LCG), then the combination of the DSA signature equations with the LCG generation equations lead to a system of equations which provide the secret key Babai s closest 2
3 vector approximation algorithm is used to solve such a system This algorithm only returns approximations to the closest vector which are not very good In [12], several heuristic attacks to recover the secret key are proposed under the hypothesis that for a reasonable number of signatures, a small fraction of the corresponding nonce k is revealed As in [1], the attacks are based on the LLL-based Babai CVP approximation algorithm They used several heuristic assumptions which did not allow precise statements on its theoretical behaviour The first provable polynomial-time attack against DSA is given in [19] under the hypothesis that the size of q is not too small compared with p and the probability of collisions for the hash function h is not too large compared with 1/q More precisely, if for a certain (polynomially bounded) number of random messages m and random nonces k, about log 1/2 q least significant bits of k are known, then in polynomial time one can recover the signer s secret key a This attack is adapted to the case of ECDSA [20] In [3], the authors, using one message, compute with the LLL reduction method, two short vectors of a three-dimensional lattice and in case where the second shortest vector is sufficiently short, they deduce two lines which intersect in (a, k), provided that a and k are sufficiently small If two messages are available one has a linear congruence relating the corresponding ephemeral keys and the same attack is applicable The attack presented in [21] uses also one message The algorithm LLL and two algorithms for the computation of the integral points of two classes of conics are combined for the computation of the secret key provided that at least the elements of one of the sets {a, k 1 mod q}, {k, a 1 mod q} and {a 1 mod q, k 1 mod q} are sufficiently small As in the previous attack, if two messages are available we can apply these attacks to the congruence relating the two ephemeral keys In [5] a two dimensional lattice L is used which is defined by a signed message Lagrange Lattice Reduction algorithm, provides a basis of L formed by two successive minima Using this basis we construct two linear polynomials f i (x, y) such that (a, k) is the intersection point of two straight lines of the form f i (x, y) = c i q, where c i Z (i = 1, 2) If a and k are sufficiently small, then c i belong to a small set and so we can compute the secret key a in polynomial time Similar attacks hold for the pairs (k 1 mod q, k 1 a mod q) and (a 1 mod q, a 1 k mod q) If we have two signed messages, then we can apply the same attacks to the equation related the two ephemeral keys Finally, in [7] it is assumed that we only know that there are equalities between δ bits of the unknown ephemeral keys used to sign some messages It is shown that this implicit information should be extracted by constructing a lattice which contains a very short vector such that its components yield the secret key When the ephemeral keys share enough bits δ, this vector is small enough and so can be computed by the LLL lattice reduction 3
4 algorithm Furthermore, the Gaussian heuristic is used to find a condition on the number of shared bits δ in function of the number of messages for this vector to be the shortest of the lattice 13 Our Contribution In this paper, we also use the equality s = k 1 (h(m) + ar) mod q and we develop new attacks on the DSA schemes More precisely, we first compute a lower bound for the size of vectors of a particular class of lattices Using this result and the Micciancio-Voulgaris theorem [17] on closest vector problem, we prove that a system of n linear congruences, where n log log q 1, of a particular form has at most a unique solution of size smaller than q n/(n+1) / which can be computed in polynomial time Thus, using only a signed message, we can construct a such system of linear congruences, which, in the case where it satisfies some condition, provide us the secret key in polynomial time If we have two signed messages, then we can perform the attack to the linear congruence relating the corresponding ephemeral keys Further, we give some variants of this attacks using the modular inverses of the keys When more than one messages are available it is more possible to construct the linear system with the required properties If we possess a small fixed number of signed messages, say 20, the time complexity of the attack remain polynomial On the other hand, if we use the maximum number of log log q 1 messages, then our attack has subexponential running time Our attack is rigorous while the attacks in [12] and [7] use heuristic assumptions Furthermore, it is independent from the pseudorandom number generator which is used for the generation of the random numbers The attacks in [19, 20] use polynomially bounded number of random messages and in [7] some messages which are signed with ephemeral keys sharing enough bits, while our attacks can be performed with only one message The attacks in [21] and [5] use also one message but they compute the secret key in polynomial time in the case where at least one of the keys or its modular inverse is at most q 1/2 + O(log q) This bound in our attack is q n/(n+1) / On the other hand, a disadvantage of our attacks is that some hypothesis which are dependent from the available signed messages must be verified that in many cases are not Finally, note that when ours attacks are applicable we can compute a secret key of full size in the case where its inverse is less than q n/(n+1) /4 as the example at the end of the paper shows Thus, in order the DSA schemes to be protected from ours attacks the secret, the ephemeral keys and their modular inverses must have the same size as q 4
5 14 The Structure of the Paper The paper is organized as follows In Section 2, we recall some basic results about lattices, the Micciancio-Voulgaris theorem on closest vector problem and we prove a key lemma for the proof of our result In section 3, using these results, we prove our theorem on the solutions of a system of linear congruences Our attacks based on it are presented in Sections 4 An example is given in Section 5 and finally Section 6 concludes the paper 2 Auxiliary Results Let B = {b 1,, b n } Z n be a basis of R n spanned by B is the set A n-dimensional lattice L = {z 1 b z n b n / z 1,, z n Z} The Euclidean norm of a vector v = (v 1,, v n ) R n is defined to be the quantity v = (v v 2 n) 1/2 Throughout the paper we state log for the natural logarithm and log 2 for the logarithm with base 2 We shall use the following results Lemma 1 Let q be a prime > 2 and integers n with 0 < n log log q 1, A i (i = 1,, n) with 2 i 1 q i/(n+1) < A i < 2 i q i/(n+1) and B i {1,, q 1} We denote by L the lattice spanned by the rows of the square matrix J = Then for every nonzero v L we have 1 A 1 A 2 A n 0 q q q v > qn/(n+1) 8 Proof First, we shall see that A n < q We have 2 n q n/(n+1) < q if and only if 2 n < q 1/(n+1) which is equivalent to n(n + 1) < log 2 q Further, n(n + 1) (log log q 1)(log log q) ( log q 1) log q < log 2 q It follows that A n < q 5
6 Suppose next that there are integers x 0,, x n such that is a nonzero vector of L satisfying v = ( x 0, x 0 A 1 + x 1 q,, x 0 A n + x n q) Then we have v qn/(n+1) 8 max{ x 0, x 0 A 1 + x 1 q,, x 0 A n + x n q } < qn/(n+1) 8 If x 0 = 0, then there is i {1,, n} such that x i 0 and so, we get v > q which is a contradiction Thus x 0 0 If x 0 A j + x j q = 0, then x j 0 Thus q x 0 A j and so, we get either q x 0 or q A j On the other hand we have 0 < x 0 < q and 0 < A j < A n < q which is a contradiction Hence x 0 A j + x j q 0 (j = 1,, n) Let i {1,, n} such that q (n i)/(n+1) If x j 0 with 1 j i, then we have 2 i+2 < x 0 < q(n i+1)/(n+1) 2 i+1 q n/(n+1) 8 > x 0 A j + x j q q x 0 A j > q q(n i+1)/(n+1) 2 i+1 A i > q 2, whence we get 1 > 4q 1/(n+1) which is a contradiction Hence x j = 0 (j = 1,, i) Then we have v > x 0 A i > q(n i)/(n+1) 2 i+2 2 i 1 q i/(n+1) = qn/(n+1) 8 which is a contradiction The result follows Theorem 1 Let L be a n-dimensional lattice and y R n Then there is a deterministic algorithm that computes v L such that for every t L we have v y t y in time 2 2n+o(n) Proof See [17] 6
7 3 A System of Linear Congruences Our attacks are based on the following theorem: Theorem 2 Let q be a prime > 2 and positive integers n and A i, B i (i = 1,, n) such that n log log q 1 and 2 i 1 q i/(n+1) < A i < 2 i q i/(n+1) Then the system of congruences y i + A i x + B i 0 (mod q) (i = 1,, n) has at most one solution v = (x, y 1,, y n ) {0,, q 1} n+1 having v < qn/(n+1) If a such solution exists, then the algorithm of Theorem 1 applied on the vector (0, B 1,, B n ) and the lattice of Lemma 1 gives a vector w whose first coordinate is x The time complexity of computation of x is O((log q) 2 ) Proof Let v = (x, y 1,, y n ) be a solution of the system with v < qn/(n+1) Consider the lattice L spanned by the rows of the square matrix 1 A 1 A 2 A n 0 q 0 0 J = 0 0 q q and set b = (0, B 1,, B n ) Since y i + A i x + B i 0 (modq), there is z i Z such that xa i + z i q = y i + B i (i = 1,, n) Then the vector u = (x, xa 1 + z 1 q,, xa n + z n q) belongs to L and we have u b = (x, y 1,, y n ) = v < qn/(n+1) On the other hand, by Theorem 1 we can compute w L such that w b u b < qn/(n+1) The time complexity of the computation is 2 2n+o(n) = O((log q) 2 ) Thus, we have u w u b + w b < qn/(n+1) 8 Since u w L, Lemma 1 implies u = w Thus, if w = (w 0,, w n ), then we get x = w 0 7
8 4 Our Attacks In this section we describe our attacks Let n be a positive integer log log q 1 Suppose we have t n signed messages m j (j = 1,, t) and theirs signatures (r j, s j ), respectively, with DSA (resp ECDSA) Then there are k j {1,, q 1} such that r j = (g k j mod p) mod q (resp r j = x j mod q and k j P = (x j, y j )) and s j = kj 1 (h(m j ) + ar j ) mod q It follows that k j + C j a + D j 0 (mod q) (j = 1,, t) where C j = r j s 1 j mod q and D j = s 1 j h(m j ) mod q We give below an algorithm based on Theorem 2 which computes a under some assumptions DSA-ATTACK-1 Input: (m j, r j, s j ) (j = 1,, t) 1 Compute C j = r j s 1 j mod q and D j = s 1 j h(m j ) mod q 2 Select integers A i (i = 1,, n) with 2 i 1 q i/(n+1) < A i < 2 i q i/(n+1) (If 2 i 1 q i/(n+1) < C i < 2 i q i/(n+1), then we can take A i = C i ) 3 Compute B ij = A i D j C 1 j mod q (i = 1,, n, j = 1,, t) 4 Denote by M the set of maps µ : {1,, n} {1,, t} For every µ M, compute (as it is explained in Theorem 2) the coefficient x µ of the solution v µ = (x µ, y 1,µ(1),, y n,µ(n) ) of the system with v µ < q n/(n+1) / y i + A i x + B i,µ(i) 0 (mod q) (i = 1,, t) 5 For every µ M check if x µ is the private key a The performance of the algorithm is given in the following proposition Proposition 1 Put k ij = k j A i Cj 1 Suppose there is µ M such that mod q (i = 1,, n, j = 1,, t) (a, k 1µ(1),, k nµ(n) ) < qn/(n+1) Then the algorithm DSA-ATTACK-1 computes a Its time complexity for the case of DSA is O((log p) 2 (log q) 1+log t ) bit operations and for ECDSA O((log q) 2 ((log q) log t +(log log q) 4 )) bit operations and O((log q) 1+log t ) elliptic curves operations 8
9 Proof Steps 1, 2, 3 and 4 build for every µ M the system of congruences y i + A i x + B i,µ(i) 0 (mod q) (i = 1,, t) Step 1 needs O((log q) 2 t) bit operations The computation of each q i needs time O(i 2 (log q) 2 ) The required time for the computation of q i/(n+1) is O(i 2 (log q) 2 ) [4] and for 2 i q i/(n+1) is O(i 3 (log q) 2 ) Thus, we can select A i such that 2 i 1 q i/(n+1) + 2 i 1 A i 2 i q i/(n+1) So, the time complexity of Step 2 is n O( i 3 (log q) 2 ) = O((log q) 2 n 4 ) = O((log q) 2 (log log q) 4 ) i=1 Step 3 needs O((log q) 2 (log log q) 2 ) bit operations Step 4 requires t n times the application of algorithm of Theorem 1 and so its time complexity is O((log q) 2+log t ) Therefore, the time complexity of the construction of all the systems and the computation of x µ is O((log q) 2 ((log q) log t + (log log q) 4 )) The complexity of Step 5, in the case of DSA, is O((log p) 2 (log q) 1+t ) bit operations and in the case of ECDSA, is O((log q) 1+t ) elliptic curves operations Therefore, for DSA, the time complexity of the procedure is O((log p) 2 (log q) 1+t ) bit operations and for ECDSA O((log q) 2 ((log q) log t + (log log q) 4 )) bit operations and O((log q) 1+t ) elliptic curves operations For every µ M, the vector (a, k 1,µ(1),, k n,µ(n) ) is a solution of the system of congruences y i + A i x + B i,µ(i) 0 (mod q) (i = 1,, t) Thus, in the case where there is µ M satisfying (a, k 1µ(1),, k nµ(n) ) < qn/(n+1), Theorem 2 implies that a is among the elements x µ and so it can be computed by the algorithm DSA-ATTACK-1 we get Multiplying by a 1 the congruence k j + C j a + D j 0 (mod q) (j = 1,, t) k j a 1 + C j + D j a 1 0 (mod q) (j = 1,, t) Thus, replacing (C j, D j ) by (D j, C j ) and a by a 1, we obtain a variant of DSA-ATTACK-1 which under some assumption provides us a 1 mod q and so a We call it DSA-ATTACK-2 Thus, we have the following result 9
10 Proposition 2 Put k ij = k j a 1 A i Dj 1 mod q (i = 1,, n, j = 1,, t) Suppose there is µ M such that (a 1 mod q, k 1µ(1),, k nµ(n) ) < qn/(n+1), Then the algorithm DSA-ATTACK-2 computes a Its time complexity for the case of DSA is O((log p) 2 (log q) 1+log t ) bit operations and for ECDSA O((log q) 2 ((log q) log t +(log log q) 4 )) bit operations and O((log q) 1+log t ) elliptic curves operations Suppose now that t 2 So we can eliminate a among the congruences and we deduce the congruences where C j = C j C 1 t k j + C j a + D j 0 (mod q) (j = 1,, t) k j + C j k t + D j 0 (mod q) (j = 1,, t 1), mod q and D j = C j Ct 1 D t + D j mod q Replacing in DSA-ATTACK-1 (C j, D j ) by ( C j, D j ) we have another variant of DSA- ATTACK-1 which we call DSA-ATTACK-3 and under some assumption provide us a Hence, we have the following result Proposition 3 Put k ij = k j A i C 1 j mod q (i = 1,, n, j = 1,, t 1) Suppose there is µ M such that (k t, k 1µ(1),, k nµ(n) ) < qn/(n+1), Then the algorithm DSA-ATTACK-3 computes a Its time complexity for the case of DSA is O((log p) 2 (log q) 1+log t ) bit operations and for ECDSA O((log q) 2 ((log q) log t +(log log q) 4 )) bit operations and O((log q) 1+log t ) elliptic curves operations Furthermore, multiplying by k 1 t the congruences k j + C j k t + D j 0 (mod q) (j = 1,, t 1) we obtain k j k 1 t + C j + D j k 1 t 0 (mod q) (j = 1,, t 1) So, replacing (C j, D j ) in DSA-ATTACK-2 by ( C j, D j ) we have another attack which we call DSA-ATTACK-4 10
11 Proposition 4 Put k ij = k j kt 1 Suppose there is µ M such that A D 1 i j mod q (i = 1,, n, j = 1,, t) (k 1 t mod q, k 1µ(1),, k nµ(n) ) < qn/(n+1), Then the algorithm DSA-ATTACK-4 computes a Its time complexity for the case of DSA is O((log p) 2 (log q) 1+log t ) bit operations and for ECDSA O((log q) 2 ((log q) log t +(log log q) 4 )) bit operations and O((log q) 1+log t ) elliptic curves operations Remark 1 If t is very small fixed number, say t < 20, then the time complexity of our attacks is polynomial Remark 2 Note that as large the number of available messages is, as possible is to construct a system with the required properties 5 An Example We consider the elliptic curve E given in [2, Example 3, p 182] defined over the finite field F p, where p = is a prime, by the equation y 2 = x x The number of points of E(F p ) is the 0-bit prime q = Consider the point P = (x(p ), y(p )) of E(F p ) of order q, where x(p ) = , y(p ) = We take as private key the 0 bit integer a = The public key is Q = ap = (x(q), y(q)) where x(q) = , y(q) = Let m 1, m 2 and m 3 be three messages with hash values h(m 1 ) = , h(m 2 ) = , h(m 3 ) =
12 Suppose that the following ephemeral keys have been used respectively for the generation of the signatures of the three messages: k 1 = , k 2 = , k 3 = The size of k 1 is 158 bits and the size of k 2 and k 3 is 159 bits We have the points R i = k i P = (x(r i ), y(r i )) (i = 1, 2, 3), where x(r 1 ) = , y(r 1 ) = , x(r 2 ) = , y(r 2 ) = , x(r 3 ) = , y(r 3 ) = The signature of m i is (r i, s i ) where s i r i = x(r i ) (i = 1, 2, 3) We have = ki 1 (h(m i ) + ar i ) mod q and s 1 = , s 2 = , s 3 = First, we remark that a 1 mod q = < Thus, we shall apply DSA-ATTACK-2 with t = n = 3 The couple (a 1 mod q, k j a 1 mod q) is a solution of the congruence where We have y + D i x + C i 0 (mod q) (i = 1, 2, 3), C 1 = , D 1 = , C 2 = , D 2 = , C 3 = , D 3 = q 1/4 = , q 1/2 = , q 3/4 =
13 Next, we have to consider integers A i (i = 1, 2, 3) satisfying 2 i 1 q i/4 < A i < 2 i q i/4 (i = 1, 2, 3) So, we take A 1 = D 1, A 2 = and A 3 = Since we have we obtain l 1 = a 1 k 1 mod q < 2 91, l 2 = k 2 a 1 A 2 D2 1 mod q < 2 90, l 3 = k 3 a 1 A 3 D3 1 mod q < 2 50, (a 1 mod q, l 1, l 2, l 3 ) < q3/4 Hence, the DSA-ATTACK-2 can provide us a 1 mod q and so, the secret key a 6 Conclusion In this paper we proposed some attacks on DSA schemes in the case where one or several signed messages are available Using these messages we built several systems of linear congruences which, in the case where their coefficients and solutions satisfy some inequalities, can provide us the secret key of the scheme These attacks can also be applied on other signature schemes where the secret and the ephemeral keys are solutions of a linear congruence, such as Schnorr signature, Heyst-Pedersen signature, GPS, etc [8,, 22] Note that in the case where the secret, the ephemeral keys and their modular inverses have the same size as q, our attacks cannot be applied References [1] M Bellare, S Goldwasser and Micciancio, Pseudo-random number generation within cryptographic algorithms: the DSS case In Proc of Crypto 97, LNCS 1294 IACR, Palo Alto, CA Springer-Verlag, Berlin 1997 [2] I F Blake, G Seroussi and N Smart, Elliptic Curves in Cryptography, Cambridge University Press 2000 [3] I F Blake and T Garefalakis, On the security of the digital signature algorithm, Des Codes Cryptogr, 26, no 1-3 (2002), [4] R Brent and P Zimmerman, Modern Computer Arithmetic, Cambridge University Press 2011 [5] K Draziotis and D Poulakis, Lattice attacks on DSA schemes based on Lagrange s algorithm 5th international Conference on Algebraic Informatics, CAI 2013 Berlin: Springer LNCS 8080, (2013) 13
14 [6] T ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithm, IEEE Transactions on Information Theory, 31 (1985), [7] J-L Faugère, C Goyet, and G Renault, Attacking (EC)DSA Given Only an Implicit Hint, Selected Area of Cryptography, LNCS 7707, pp , Springer-Verlag, Berlin - Heidelberg 2013 [8] M Girault, G Poupard and J Stern, Global Payment System (GPS): un protocole de signature à la volée, Proceedings of Trusting Electronic Trade, 7-9 juin 1999 [9] D Johnson, A J Menezes and S A Vastone, The elliptic curve digital signature algorithm (ECDSA), Intern J of Information Security, 1 (2001) [10] J Hoffstein, J Pipher and J Silverman, An Introduction to Mathematical Cryptography, Springer 2008 [11] N A Howgrave-Graham, Finding small roots of univariate equations revisited In Cryptography and Coding, vol 1355 of LNCS, pp Springer Verlag, 1997 [12] N A Howgrave-Graham and N P Smart, Lattice Attacks on Digital Signature Schemes, Des Codes Cryptogr 23 (2001) [13] N Koblitz, A J Menezes and S A Vastone, The state of elliptic curve cryptography, Des Codes Cryptogr 19 (2000), [14] N Koblitz and A J Menezes, A survey of Public-Key Cryptosystems, SIAM REVIEW, 46, No 4 (2004), [15] A K Lenstra, H W Lenstra Jr, and L Lovász, Factoring polynomials with rational coefficients, Math Ann, 261 (1982), [] A J Menezes, P C van Oorschot and S A Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, Florida, 1997 [17] D Micciancio and P Voulgaris A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations In Proc of STOC, ACM, (2010) pages [18] National Institute of Standards and Technology (NIST) FIPS Publication 186: Digital Signature Standard May 1994 [19] P Nguyen and I E Shparlinski, The Insecurity of the Digital Signature Algorithm with Partially Known Nonces, J Cryptology, 15 (2002), [20] P Nguyen and I E Shparlinski, The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces, Des Codes Cryptogr 30, (2003), [21] D Poulakis, Some Lattice Attacks on DSA and ECDSA, Applicable Algebra in Engineering, Communication and Computing, 22, (2011), [22] D R Stinson, Cryptography, Theory and Practice, Chapman & Hall/CRC, 2nd ed
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
An Approach to Shorten Digital Signature Length
Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based
Implementation of Elliptic Curve Digital Signature Algorithm
Implementation of Elliptic Curve Digital Signature Algorithm Aqeel Khalique Kuldip Singh Sandeep Sood Department of Electronics & Computer Engineering, Indian Institute of Technology Roorkee Roorkee, India
A New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
Digital Signature. Raj Jain. Washington University in St. Louis
Digital Signature Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis
Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis by Susana Sin A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master
Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?
Cryptography Digital Signatures Professor: Marius Zimand Digital signatures are meant to realize authentication of the sender nonrepudiation (Note that authentication of sender is also achieved by MACs.)
Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella
Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
Factoring N = p r q for Large r
Factoring N = p r q for Large r Dan Boneh 1,GlennDurfee 1, and Nick Howgrave-Graham 2 1 Computer Science Department, Stanford University, Stanford, CA 94305-9045 {dabo,gdurf}@cs.stanford.edu 2 Mathematical
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
A New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
Lecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC Laxminath Tripathy 1 Nayan Ranjan Paul 2 1Department of Information technology, Eastern Academy of Science and
The van Hoeij Algorithm for Factoring Polynomials
The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial
A novel deniable authentication protocol using generalized ElGamal signature scheme
Information Sciences 177 (2007) 1376 1381 www.elsevier.com/locate/ins A novel deniable authentication protocol using generalized ElGamal signature scheme Wei-Bin Lee a, Chia-Chun Wu a, Woei-Jiunn Tsaur
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction
MATH 168: FINAL PROJECT Troels Eriksen 1 Introduction In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key
Public Key (asymmetric) Cryptography
Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: [email protected]) Course of Network Security,
Cryptosystem. Diploma Thesis. Mol Petros. July 17, 2006. Supervisor: Stathis Zachos
s and s and Diploma Thesis Department of Electrical and Computer Engineering, National Technical University of Athens July 17, 2006 Supervisor: Stathis Zachos ol Petros (Department of Electrical and Computer
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Study of algorithms for factoring integers and computing discrete logarithms
Study of algorithms for factoring integers and computing discrete logarithms First Indo-French Workshop on Cryptography and Related Topics (IFW 2007) June 11 13, 2007 Paris, France Dr. Abhijit Das Department
Cryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
On the representability of the bi-uniform matroid
On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
with Embedding Degree 10 University of California, Berkeley, USA ANTS-VII, 2006 Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3 Outline 1 Introduction
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
How To Prove The Dirichlet Unit Theorem
Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if
A blind digital signature scheme using elliptic curve digital signature algorithm
A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department
A SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Number Theory and Cryptography using PARI/GP
Number Theory and Cryptography using Minh Van Nguyen [email protected] 25 November 2008 This article uses to study elementary number theory and the RSA public key cryptosystem. Various commands will
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
ECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
Security Analysis of DRBG Using HMAC in NIST SP 800-90
Security Analysis of DRBG Using MAC in NIST SP 800-90 Shoichi irose Graduate School of Engineering, University of Fukui hrs [email protected] Abstract. MAC DRBG is a deterministic random bit generator
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Elliptic Curve Cryptography
Elliptic Curve Cryptography Elaine Brow, December 2010 Math 189A: Algebraic Geometry 1. Introduction to Public Key Cryptography To understand the motivation for elliptic curve cryptography, we must first
CHAPTER 5. Number Theory. 1. Integers and Division. Discussion
CHAPTER 5 Number Theory 1. Integers and Division 1.1. Divisibility. Definition 1.1.1. Given two integers a and b we say a divides b if there is an integer c such that b = ac. If a divides b, we write a
Integer Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give
Ideal Class Group and Units
Chapter 4 Ideal Class Group and Units We are now interested in understanding two aspects of ring of integers of number fields: how principal they are (that is, what is the proportion of principal ideals
Short Programs for functions on Curves
Short Programs for functions on Curves Victor S. Miller Exploratory Computer Science IBM, Thomas J. Watson Research Center Yorktown Heights, NY 10598 May 6, 1986 Abstract The problem of deducing a function
Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms
Principles of Public Key Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter : Security on Network and Transport
Implementing Network Security Protocols
Implementing Network Security Protocols based on Elliptic Curve Cryptography M. Aydos, E. Savaş, and Ç. K. Koç Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331, USA {aydos,savas,koc}@ece.orst.edu
MATH10040 Chapter 2: Prime and relatively prime numbers
MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive
PYTHAGOREAN TRIPLES KEITH CONRAD
PYTHAGOREAN TRIPLES KEITH CONRAD 1. Introduction A Pythagorean triple is a triple of positive integers (a, b, c) where a + b = c. Examples include (3, 4, 5), (5, 1, 13), and (8, 15, 17). Below is an ancient
Index Calculation Attacks on RSA Signature and Encryption
Index Calculation Attacks on RSA Signature and Encryption Jean-Sébastien Coron 1, Yvo Desmedt 2, David Naccache 1, Andrew Odlyzko 3, and Julien P. Stern 4 1 Gemplus Card International {jean-sebastien.coron,david.naccache}@gemplus.com
Lattice Attacks in Cryptography: A Partial Overview
Lattice Attacks in Cryptography: A Partial Overview M. Jason Hinek School of Computer Science, University of Waterloo Waterloo, Ontario, N2L-3G1, Canada [email protected] October 22, 2004 Abstract
A new probabilistic public key algorithm based on elliptic logarithms
A new probabilistic public key algorithm based on elliptic logarithms Afonso Comba de Araujo Neto, Raul Fernando Weber 1 Instituto de Informática Universidade Federal do Rio Grande do Sul (UFRGS) Caixa
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28
Arithmetic algorithms for cryptology 5 October 2015, Paris Sieves Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Sieves 0 / 28 Starting point Notations q prime g a generator of (F q ) X a (secret) integer
Alex, I will take congruent numbers for one million dollars please
Alex, I will take congruent numbers for one million dollars please Jim L. Brown The Ohio State University Columbus, OH 4310 [email protected] One of the most alluring aspectives of number theory
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones Gwenaëlle Martinet 1, Guillaume Poupard 1, and Philippe Sola 2 1 DCSSI Crypto Lab, 51 boulevard de La Tour-Maubourg
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
Evaluation of Digital Signature Process
Evaluation of Digital Signature Process Emil SIMION, Ph. D. email: [email protected] Agenda Evaluation of digital signatures schemes: evaluation criteria; security evaluation; security of hash functions;
Public Key Cryptography. Performance Comparison and Benchmarking
Public Key Cryptography Performance Comparison and Benchmarking Tanja Lange Department of Mathematics Technical University of Denmark [email protected] 28.08.2006 Tanja Lange Benchmarking p. 1 What
A New secure email scheme Using Digital Signature with S/MIME
International Journal of Computer Networks and Communications Security VOL. 4, NO. 3, MARCH 2016, 56 62 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) A New secure
On the largest prime factor of x 2 1
On the largest prime factor of x 2 1 Florian Luca and Filip Najman Abstract In this paper, we find all integers x such that x 2 1 has only prime factors smaller than 100. This gives some interesting numerical
Mathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann Chap 12 Digital Signatures
Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann Chap 12 Digital Signatures Department of Computer Science and Information Engineering, Chaoyang University of Technology 朝 陽 科 技 大 學 資 工
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Some applications of LLL
Some applications of LLL a. Factorization of polynomials As the title Factoring polynomials with rational coefficients of the original paper in which the LLL algorithm was first published (Mathematische
Elliptic Curve Hash (and Sign)
Elliptic Curve Hash (and Sign) (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep 22-24 2008 Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 1 / 43
Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Encryption/Decryption using Public Key Cryptography Network Security Chapter 2 Basics 2.2 Public Key Cryptography
MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
Digital signatures. Informal properties
Digital signatures Informal properties Definition. A digital signature is a number dependent on some secret known only to the signer and, additionally, on the content of the message being signed Property.
CIS 5371 Cryptography. 8. Encryption --
CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.
Post-Quantum Cryptography #4
Post-Quantum Cryptography #4 Prof. Claude Crépeau McGill University http://crypto.cs.mcgill.ca/~crepeau/waterloo 185 ( 186 Attack scenarios Ciphertext-only attack: This is the most basic type of attack
= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
Digital Signature Standard (DSS)
FIPS PUB 186-4 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory National Institute
Lecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
Discrete Mathematics, Chapter 4: Number Theory and Cryptography
Discrete Mathematics, Chapter 4: Number Theory and Cryptography Richard Mayr University of Edinburgh, UK Richard Mayr (University of Edinburgh, UK) Discrete Mathematics. Chapter 4 1 / 35 Outline 1 Divisibility
IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM
NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 28 IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM Mohammad Noor
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited Jean-Sébastien Coron Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France [email protected]
ARCHIVED PUBLICATION
ARCHIVED PUBLICATION The attached publication, FIPS Publication 186-3 (dated June 2009), was superseded on July 19, 2013 and is provided here only for historical purposes. For the most current revision
Computer Science 308-547A Cryptography and Data Security. Claude Crépeau
Computer Science 308-547A Cryptography and Data Security Claude Crépeau These notes are, largely, transcriptions by Anton Stiglic of class notes from the former course Cryptography and Data Security (308-647A)
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
ELLIPTIC CURVES AND LENSTRA S FACTORIZATION ALGORITHM
ELLIPTIC CURVES AND LENSTRA S FACTORIZATION ALGORITHM DANIEL PARKER Abstract. This paper provides a foundation for understanding Lenstra s Elliptic Curve Algorithm for factoring large numbers. We give
Primality - Factorization
Primality - Factorization Christophe Ritzenthaler November 9, 2009 1 Prime and factorization Definition 1.1. An integer p > 1 is called a prime number (nombre premier) if it has only 1 and p as divisors.
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science 3796 (2005) 355 375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Quotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
RSA signatures and Rabin Williams signatures: the state of the art
RSA signatures and Rabin Williams signatures: the state of the art Daniel J. Bernstein Department of Mathematics, Statistics, and Computer Science (M/C 249) The University of Illinois at Chicago, Chicago,
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Randomized Hashing for Digital Signatures
NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department
Solving Linear Systems, Continued and The Inverse of a Matrix
, Continued and The of a Matrix Calculus III Summer 2013, Session II Monday, July 15, 2013 Agenda 1. The rank of a matrix 2. The inverse of a square matrix Gaussian Gaussian solves a linear system by reducing
