SFLASH v3, a fast asymmetric signature scheme
|
|
|
- Lauren Lawson
- 10 years ago
- Views:
Transcription
1 SFLASH v3, a fast asymmetric signature scheme Specification of SFLASH, version 3.0., 17 October 2003 The authors still recommend SFLASH-v2, see below. Nicolas T. Courtois 1, Louis Goubin 1 and Jacques Patarin 2 1 Axalto Cryptographic Research & Advanced Security, rue de la Princesse, BP 45, Louveciennes Cedex, France [email protected], [email protected] 2 PRISM, University of Versailles, France [email protected] Note: SFLASH v2 is one of the three asymmetric signature schemes recommended by the Nessie European consortium for low-cost smart cards [21, 16]. The latest implementation report shows that SFLASH v2 is the fastest signature scheme known, see [1] for details. This document is a specification of SFLASH-v3 produced for fear of SFLASH-v2 being broken (see [3]). HOWEVER after detailed analysis by Chen, Courtois and Yang, see [2], SFLASH-v2 is not broken and we still recommend the old version Sflash-v2, also recommended by Nessie, instead of this version. In this document SFLASH v3 is fully specified. In addition in the appendix we summarize all the changes in SFLASH, for readers and developers that are acquainted with the previous version(s). 1 Introduction In the present document, we describe the updated version SFLASH v3 of the SFLASH public key signature scheme proposed in [20] and already revised in [21]. SFLASH belongs to the family of multivariate public key schemes, i.e. each signature and each hash of the messages to sign are represented by some elements of a small finite field K. The SFLASH signature scheme is based on a C trapdoor function algorithm introduced in [25], with a special choice of the parameters. Known attacks on SFLASH, and important results that have a direct impact on its security, can be found in [25, 9, 8, 13, 24, 3, 2, 22, 19, 27, 26, 11, 12, 6]. SFLASH has been designed for very specific applications where the cost of classical cryptographic algorithms (RSA, Elliptic Curves, DSA, etc) becomes prohibitive: they are too slow or/and the signature size if too big. Thus SFLASH have been created to satisfy an extreme property that no standardized public key scheme have reached so far: efficiency on low-price smart cards. SFLASH is a very fast signature scheme, both for signature generation and signature verification. It is much faster than RSA and much easier to implement on smart cards without any arithmetic coprocessor. See [1] for implementation report and some concrete speed results for SFLASH v2 compared to its competitors. These results extend easily to SFLASH v3. 1
2 The price to pay for speed, and the main drawback of SFLASH, is the public key size being noticeably larger than for RSA. In SFLASH v1 and SFLASH v2 it was respectively 2.2 and 15.4 Kbytes, see [21, 20, 16] which could easily fit in low-end smart cards. For the new version SFLASH v3 it is less obvious: the size of the public key becomes 112 Kbytes. This is why the authors still do recommend SFLASH-v2. SFLASH v3 remains competitive and it should remain one of the fastest signature schemes known, that can only be rivalled by NTRU. Though SFLASH public keys are longer than NTRU, the signatures are shorter. Therefore both have their advantages. It seems that SFLASH approaches its maturity. Starting from the previous version SFLASH v2, there is no method known to distinguish the public key of SFLASH from a random system of quadratic equations over GF (2 k ) (see Section 7.2. of [10]). Solving such a system, is a famous hard problem MQ, that also underlies the security of other multivariate encryption and signature schemes. The hardness of this problem is also required for the security of many block ciphers, see [15, 5, 4], including AES, and for several stream ciphers, see [6, 7]. SFLASH was designed to have a security level of 2 80 with the present state of the art in cryptanalysis, as required in the NESSIE project. A security margin is kept with respect to this goal: the best currently known attack on SFLASH v3 requires at least operations, see [3] and in fact much more, as the estimations of [3] turn out to be over-optimistic, see [2]. 2 Notation In all the present document, will denote the concatenation operation. More precisely, if λ = (λ 0,..., λ m ) and µ = (µ 0,..., µ n ) are two strings of elements (in a given field), then λ µ denotes the string of elements (in the given field) defined by: λ µ = (λ 0,..., λ m, µ 0,..., µ n ). For a given string λ = (λ 0,..., λ m ) of bits and two integers r, s, such that 0 r s m, we denote by [λ] r s the string of bits defined by: [λ] r s = (λ r, λ r+1,..., λ s 1, λ s ). 3 Parameters of the Algorithm The SFLASH algorithm uses three finite fields. The first one, K = F 128 is precisely defined as K = F 2 [X]/(X 7 + X + 1). We will denote by π the bijection between {0, 1} 7 and K defined by: b = (b 0,..., b 6 ) {0, 1} 7, π(b) = b 6 X b 1 X + b 0 (mod X 7 + X + 1). The second one is L = K[X]/(X 67 + X 5 + X 2 + X + 1). We will denote by ϕ the bijection between K 67 and L defined by: ω = (ω 0,..., ω 66 ) K 67, ϕ(ω) = ω 66 X ω 1 X + ω 0 ( mod X 67 + X 5 + X 2 + X + 1). The SFLASH algorithm uses two affine bijections s and t from K 67 to K 67. Each of them is composed of a secret linear part S L resp. T L and of a constant part S C resp. T C. 2
3 3.1 Secret Parameters 1. A linear secret bijection from K 67 to K 67 that is represented by a square matrix with entries in K, written with respect to the canonical basis of K 67. We denote by S L this matrix ( L means linear ). 2. Another linear secret bijection from K 67 to K 67 represented by a square matrix over K denoted by T L. 3. A 80-bit secret string denoted by. 3.2 Semi-Public Parameters In addition, constant parts of s and t are specified: 1. A vector in K 67 represented by a 67 1 column matrix S C ( C means constant ) with respect to the canonical basis of K Another vector in K 67 represented by a column matrix T C. Explanation: It is illusory to make these constant parts of s and t secret, see Section 7.1 and [23]. They can be made public does not impact the security of SFLASH. However, we recommend not to publish them. First, because they are not used in signature verification process, and also in order to save space and transmission time for the public key. As a consequence, these values are neither secret (as they can be recovered, see [23]) nor public (as they are not made public). For this reason we call them semi-public. 3.3 Public Parameters The public key consists in the function G from K 67 to K 56 defined by: [ ( G(X) = t ϕ 1( F (ϕ(s(x))) ))] Here the subscript allows to pick 56 equations out of 67 (and 56 7 = 392). F is the function from L to L defined by: A L, F (A) = A By construction of the algorithm, G is a quadratic transformation over K, i.e. (Y 0,..., Y 55 ) = G(X 0,..., X 66 ) can be written, equivalently: Y 0 = P 0 (X 0,..., X 66 ). Y 55 = P 55 (X 0,..., X 66 ) with each P i being a quadratic polynomial of the form P i (X 0,..., X 66 ) = ζ i,j,k X j X k + 0 j<k<67 0 j<67 ν i,j X j + ρ i, all the elements ζ i,j,k, ν i,j and ρ i being in K. Efficient generation of keys for such multivariate schemes goes beyond the topic of this paper, see [29]. 3
4 4 Key Generation In the SFLASH scheme, the public is deduced from the secret key, as explained in section 3.2. We need only to describe how the secret key is generated. As described in section 3.1, the following secret elements have to be generated: The secret invertible matrix S L, and the secret 67 1 (column) matrix S C, all the coefficients being in K. The secret invertible matrix T L, and the secret 67 1 (column) matrix T C, all the coefficients being in K. The 80-bit secret string. 4.1 Detailed Step-by-Step Key Generation Note that, through the π transformation, generating an element of K is equivalent to generating a 7-bit string. In what follows, we call next_7bit_random_string the string of 7 bits obtained by calling 7 times the CSPRBG (we obtain first the first bit of the string, then the second bit,..., until the seventh bit). To generate all these parameters, we apply the following method, which uses a cryptographically secure pseudorandom bit generator (CSPRBG). From a seed whose entropy is at least 80 bits, this CSPRBG is supposed to produce a new random bit each time it is asked to. 1. To generate the invertible matrix S L, two methods can be used: First Method ( Trial and error ): Generate the matrix S L by repeating for i=0 to 66 for j=0 to 66 S_L[i,j]=pi(next_7bit_random_string) until we obtain an invertible matrix. Second Method (with the LU decomposition): Generate a lower triangular matrix L S and an upper triangular matrix U S, all the coefficients being in K, as follows: for i=0 to 66 for j=0 to 66 { if (i<j) then {U_S[i,j]=pi(next_7bit_random_string); L_S[i,j]=0;}; if (i>j) then {L_S[i,j]=pi(next_7bit_random_string); U_S[i,j]=0;}; if (i=j) then {repeat (z=next_7bit_random_string) until z!=(0,0,0,0,0,0,0); U_S[i,j]=pi(z); L_S[i,j]=1;}; }; 4
5 Define then S L = L S U S. 2. Generate S C by using the CSPRBG to obtain 67 new random elements of K (from the top to the bottom of the column matrix). Each of these elements of K is obtained by pi(next_7bit_random_string) 3. The generation of the invertible matrix T L, is done exactly as for S L. 4. The generation of T C is done exactly as for S C by using the CSPRBG to obtain 67 new random random elements of K. 5. Finally, generate by using the CSPRBG to obtain 80 random bits. 5 Signing a Message In the present section, we describe the signature of a message M by the SFLASH algorithm. 5.1 The Signing Algorithm The message M is given by a string of bits. Its signature S is obtained by applying successively the following operations (see figure 1): 1. Let M 0, M 1, M 2 and M 3 be the three 160-bit strings defined by: M 0 = SHA-1(M), M 1 = SHA-1(M 0 0x00), M 2 = SHA-1(M 0 0x01). M 3 = SHA-1(M 0 0x02). With 0x00 through 0x02 denoting one single 8-bit character appended to M Let V be the 392-bit string defined by: 3. Let W be the 77-bit string defined by: V = [M 1 ] [M 2 ] [M 3 ] W = [SHA-1(V )] Let Y be the string of 56 elements of K defined by: ( ) Y = π([v ] 0 6 ), π([v ] 7 13 ),..., π([v ] ). 5. Let R be the string of 11 elements of K defined by: ( ) R = π([w ] 0 6 ), π([w ] 7 13 ),..., π([w ] ). 6. Let B be the element of L defined by: ( ) B = ϕ t 1 (Y R). 5
6 7. Let A be the element of L defined by: A = F 1 (B), F being the function from L to L defined by: A L, F (A) = A Let X = (X 0,..., X 66 ) be the string of 67 elements of K defined by: X = (X 0,..., X 66 ) = s 1( ) ϕ 1 (A). 9. The signature S is the 469-bit string given by: S = π 1 (X 0 )... π 1 (X 66 ). 5.2 Computing A = F 1 (B) The function F, from L to L, is defined by: A L, F (A) = A As a consequence, A = F 1 (B) can be obtained by the following formula: A = B h, the value of the exponent h being the inverse of modulo We have h = Finding a fast method of computing A = B h is not trivial, and is outside the scope of this paper. (It can be done more than ten times faster than naive square and multiply method, and the solution for SFLASH v2 is given in [1]. ) 6 Verifying a signature Given a message M (i.e. a string of bits) and a signature S (a 259-bit string), the following algorithm is used to decide whether S is a valid signature of M or not: 1. Let M 0, M 1, M 2 and M 3 be the three 160-bit strings defined by: M 0 = SHA-1(M), M 1 = SHA-1(M 0 0x00), M 2 = SHA-1(M 0 0x01). M 3 = SHA-1(M 0 0x02). With 0x00 through 0x02 denoting one single 8-bit character appended to M Let V be the 392-bit string defined by: V = [M 1 ] [M 2 ] [M 3 ]
7 Message M SHA-1 M 0 0 M 0 1 M bits 168 bits 168 bits SHA-1 SHA-1 SHA bits 160 bits 72 / 160 total 392 bits M 0 Y SHA-1( ) 160 bits Y R B t 1 R A F 1 s 1 Signature S Figure 1: Signature generation with SFLASH 7
8 3. Let Y be the string of 56 elements of K defined by: ( ) Y = π([v ] 0 6 ), π([v ] 7 13 ),..., π([v ] ). 4. Let Y be the string of 56 elements of K defined by: ( ) Y = G π([s] 0 6 ), π([s] 7 13 ),..., π([s] ). 5. If Y equals Y, accept the signature. Otherwise reject the signature. Message M SHA-1 M 0 0 M 0 1 M bits 168 bits 168 bits SHA-1 SHA-1 SHA bits 160 bits 72 / 160 total 392 bits M 0 Signature S Y G Y Y = Y : accepted Y Y : rejected Figure 2: Signature verification with SFLASH 7 Security of SFLASH v3 SFLASH is a signature scheme based on a C trapdoor function introduced in [25]. There are three levels on which its security should be considered. 1. The security of signature schemes based on multivariate polynomials versus the security of the underlying trapdoor one-way function. This topic, as well as generic attacks on signature scheme independent on the trapdoor function, have been studied in [9]. 2. Structural attacks on C and similar multivariate trapdoor functions have been studied in [25, 8, 13, 24, 22]. Originally, C is a product of the research on repairing the original Matsumoto-Imai cryptosystem [14] with a method of removing equations introduced independently by Shamir [28] and Patarin [19]. The method itself of removing equations is analysed in [25, 8, 13, 24]. From the recent paper presented at Crypto 2003 [13], it is possible to see that, due to he fact that we are over GF (2 k ), and unlike the attacks with Gröbner bases shown for C over GF (2) in [8], it is expected that for SFLASH schemes, starting from the previous version SFLASH v2, there is no method known to distinguish them from a random system of quadratic equations over GF (2 k ). Some simulations on this can be found in Section 7.2. of [10]. 3. Then the security of SFLASH will be based mainly on the problem MQ of solving a system of quadratic equations over GF (2 k ) (see [9] to see if can be based only 8
9 on this assumption). This is a very important hard problem known in cryptography. For example, recently Murphy and Robshaw showed that the security of AES can be expressed as such a problem, see [15, 5]. It also has implications on the security of several stream ciphers, see [6, 7]. This problem MQ is however NP-complete, and is expected to be really very hard in many cases of practical relevance, see [9, 27, 26, 3, 2]. Even though attacks on such problems have known huge huge progress in the recent years, see [27, 26, 11, 12, 3, 2, 5], it is possible to see that they are limited by some algebraic properties of the ideal generated by the public polynomials, that are more or less invariant, whatever is the method used. They are also limited by the speed of well known fundamental algorithms such as linear algebra. Therefore we hope that these schemes arrive at the maturity point, where their security is fully understood and is not much lower than expected. SFLASH was designed to have a security level of 2 80 with the present state of the art in Cryptanalysis, as required in the NESSIE project. The best currently known attack on SFLASH v3 requires at least operations, see [3] but in fact much more, as the estimations of [3] turn out to be over-optimistic, see [2]. This gives still some security margin to resist future improved attacks. 7.1 Remark - Possibility of Making the Affine Parts Public This remark has been added after publication of this specification on e-print server, on October 2nd We received some criticism from W. Geiselmann, R. Steinwandt and Th. Beth about the possibility of recovering the affine parts of SFLASH v3. This result is interesting, except it is not new, see [22, 23]. We were aware of this fact at the time of specifying SFLASH v3. Yet, we claim that it does not matter at all for the security of SFLASH v3. In SFLASH, the parts S C and T C may, or may not be made public. Anyone that implements SFLASH v3 is free to publish them. However for efficiency reasons, in Section 3.2 we recommended not to publish them. In general, the current state of knowledge makes us think that, unlike what is suggested in [22, 23], not only the affine parts are not a weakness of SFLASH v3 but they in fact probably do improve the strength of SFLASH v3. One should not think that since they can be recovered they should be removed (equal to 0). We claim that they should remain random non-zero vectors: indeed, this makes some attacks more difficult, see for example [19]. To summarize: In SFLASH v1 and SFLASH v2 the parts S C and T C were random secrets, and it was discovered that they could have been made public, see [22, 23]. In SFLASH v3 the parts S C and T C are not published either. In fact, they are neither secret, as they can be recovered (see [23]), nor public, as they are not made public. We call them semi-public. 9
10 8 Summary of the characteristics of SFLASH v3 Length of the signature: 469 bits. Length of the public key: Kbytes. Length of the secret key: the secret key (7.8 Kbytes) can be generated from a small seed of 128 bits or more. Time to sign a message 1 : less than 1 ms. We expect that it should take less than 200 ms on a Infineon SLE66 component without cryptoprocessor. Time to verify a signature 1 : less than 1 ms: (i.e. approximately multiplications and additions in K). Time to generate a pair of public key/secret key: less than 1 s. (cf. [29]). Best known attack: more than 2 90 TDES computations. SFLASH v3 is specified for reference only, the authors still do recommend SFLASH v2 that has better performances. Acknowledgements We would like to thank Bo-Yin Yang, Louis Granboulan, Bart Preneel, Gwenaëlle Martinet, and all the other members of the Nessie project that by quality of their work contributed to maturing of several important branches of cryptography. 1 On a PC computer. Pessimistic estimation. 10
11 References [1] Mehdi-Laurent Akkar, Nicolas Courtois, Louis Goubin, Romain Duteuil: A Fast and Secure Implementation of Slash, PKC 2003, LNCS 2567, Springer, pp [2] Jiun-Ming Chen, Nicolas Courtois and Bo-Yin Yang: On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis, ICICS 04, LNCS 3269, pp , Springer, [3] Nicolas Courtois: Algebraic Attacks over GF (2 k ), Application to HFE Challenge 2 and Sflash-v2. In PKC 2004, LNCS 2947, pp , Springer, [4] Alex Biryukov and Christophe De Canniere: Block Ciphers and Systems of Quadratic Equations. FSE 2003, to appear in LNCS, Springer, [5] Nicolas Courtois and Josef Pieprzyk, Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, Asiacrypt 2002, LNCS 2501, pp , Springer, a preprint with a different version of the attack is available at [6] Nicolas Courtois: Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt, LNCS 2587, pp , Springer. An updated version is available at [7] Nicolas Courtois and Willi Meier: Algebraic Attacks on Stream Ciphers with Linear Feedback, Eurocrypt 2003, Warsaw, Poland, LNCS 2656, pp , Springer. An extended version is available at [8] Nicolas Courtois, Magnus Daum and Patrick Felke: On the Security of HFE, HFEv- and Quartz, PKC 2003, LNCS 2567, Springer, pp [9] Nicolas Courtois: Generic Attacks and the Security of Quartz, PKC 2003,, LNCS 2567, pp A preliminary version was presented at the second Nessie workshop, Royal Holloway, University of London, September [10] Nicolas Courtois: Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash, Draft available on [11] Jean-Charles Faugère: A new efficient algorithm for computing Gröbner bases (F 4 ), Journal of Pure and Applied Algebra 139 (1999) pp See [12] Jean-Charles Faugère: A new efficient algorithm for computing Gröbner bases without reduction to zero (F5), Workshop on Applications of Commutative Algebra, Catania, Italy, 3-6 April 2002, ACM Press. [13] Antoine Joux, Jean-Charles Faugère: Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases, Crypto 2003, LNCS 2729, pp , Springer. [14] Tsutomu Matsumoto, Hideki Imai: Public Quadratic Polynomial-tuples for efficient signature-verification and message-encryption, Eurocrypt 88, Springer 1998, pp
12 [15] S. Murphy, M. Robshaw: Essential Algebraic Structure within the AES, Crypto 2002, LNCS 2442, Springer. [16] NESSIE Portfolio of recommended cryptographic primitives, available at decision-final.pdf [17] NESSIE Security Report, revised final version 2.0, available at [18] Jacques Patarin: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt 88, In Crypto 95, Springer, LNCS 963, pp , [19] Jacques Patarin: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of Asymmetric Algorithms, Eurocrypt 96, Springer, pp The extended version can be found at [20] Jacques Patarin, Louis Goubin, Nicolas Courtois: Flash, a fast multivariate signature algorithm; Cryptographers Track Rsa Conference 2001, LNCS 2020, pp , Springer. This paper introduces FLASH and SFLASH v1. [21] The specification of Sflash v2. Available from: [22] W. Geiselmann, R. Steinwandt, Th. Beth, Attacking the Affine Parts of SFLASH, Initially presented at the second NESSIE Workshop, September 2001, Egham, UK. Published in IMA Int. Conf. 2001, LNCS 2260, Springer, pp , [23] W. Geiselmann, R. Steinwandt, and Th. Beth: Revealing the Ane Parts of SFLASHv1, SFLASHv2, and FLASH. In Santos Gonzalez Jimenez and Consuelo Martnez Lopez, editors, Actas de la VII Reunion Española de Criptologa y Seguridad de la Informacion. Tomo I, pages , [24] Henri Gilbert, Marine Minier: Cryptanalysis of SFLASH. Eurocrypt 2002, LNCS 2232, Springer, pp , [25] J. Patarin, L. Goubin, N. Courtois, C + and HM: Variations around two schemes of T. Matsumoto and H. Imai, in Advances in Cryptology, Proceedings of ASI- ACRYPT 98, LNCS n 1514, Springer, 1998, pp [26] Jacques Patarin and Nicolas Courtois About the XL Algorithm over GF (2), Cryptographers Track RSA 2003, LNCS 2612, pages , Springer [27] Adi Shamir, Jacques Patarin, Nicolas Courtois, Alexander Klimov, Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations, Eurocrypt 2000, LNCS 1807, Springer, pp [28] Adi Shamir: Efficient signature schemes based on birational permutations; Crypto 93, Springer, pp [29] Christopher Wolf: Efficient Public Key Generation for Multivariate Cryptosystems, 12
13 A Appendix - Summary of Modifications in SFLASH In this section we explain the difference between the updated version SFLASH v3 and the previous versions SFLASH v1 and SFLASH v2. A complete history of changes is given. A.1 Increasing the Number of Variables/Equations In SFLASH v1 and SFLASH v2 the big field is L = K[X]/(X 37 + X 12 + X 10 + X 2 + 1) with K = F 2 [X]/(X 7 + X + 1). As a consequence, in the public key there are 37 variables. The number of public equations is 37-11=26, as 11 equations have been removed. In SFLASH v3 the big field is L = K[X]/(X 67 + X 5 + X 2 + X + 1). The small field K = F 2 [X]/(X 7 + X + 1) remains the same. As a consequence, in the public key there are 67 variables. The number of public equations is 67-11=56, as again exactly 11 equations have been removed. A.2 Changing the Way the Message is Hashed In SFLASH v1 and SFLASH v2 the first two steps in computing the signature (and also in verifying it) were: 1 Let M 1 and M 2 be the three 160-bit strings defined by: M 1 = SHA-1(M), M 2 = SHA-1(M 1 ). 2 Let V be the 182-bit string defined by: * Note that 182 = (37 11) 7. V = [M 1 ] [M 2 ] In SFLASH v3 it is a bit more complicated: 1 Let M 0, M 1, M 2 and M 3 be the three 160-bit strings defined by: M 0 = SHA-1(M), M 1 = SHA-1(M 0 0x00), M 2 = SHA-1(M 0 0x01). M 3 = SHA-1(M 0 0x02). With 0x00 through 0x02 denoting one single 8-bit character appended to M 0. 2 Let V be the 392-bit string defined by: ** Note that 392 = (67 11) 7. V = [M 1 ] [M 2 ] [M 3 ] This modification allows the whole value V to be modelised by a random oracle, and allows to apply to SFLASH v3 the partial provable security results of [9]. 13
14 A.3 Increasing the Degree of the Internal Polynomial In SFLASH v1 and SFLASH v2 the internal polynomial is F : L L defined by: A L, F (A) = A In SFLASH v3 the internal polynomial is F : L L defined by: A L, F (A) = A This change has, as far as we know, no incidence on the security of SFLASH v3. It has been done to speed-up the signature computation by using less multiplications in L. A.4 Choosing the coefficients of s and t in GF(128) instead of GF(2) This change does not concern the current version and was done between the old versions SFLASH v1 and SFLASH v2. We recall it to make our SFLASH history complete. In SFLASH v1 the coefficients of the secret affine transformations s and t were chosen in the subfield K = GF(2) instead of the field K = GF(128). This very special property allowed to substantially decrease the size of the public key. Unfortunately it also allowed Gilbert and Minier to break SFLASH v1, see [24] for details. In SFLASH v2 and SFLASH v3 the coefficients of the secret affine transformations s and t are chosen in K = GF(128). This makes the public key bigger, but also makes attacks such as described in [24] impractical. This change also prevents the attack of Geiselmann, Steinwandt and Beth from [22], that can after all be done also in this case, see [23]. However, we claim that this attack is not a threat to the security of SFLASH, see Section 7.1. A.5 Resulting Changes in Signature Size and in Public Key Size These are a straight consequence of all the changes described above. We summarize them here: In SFLASH v1 the public key had 2.2 Kbytes. The signature length was 259 bits. In SFLASH v2 the public key had 15.4 Kbytes. The signature length was 259 bits. In SFLASH v3 the public key has Kbytes. The signature length is 469 bits. 14
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
A New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
Algebraic Attacks on Stream Ciphers with Linear Feedback
Algebraic Attacks on Stream Ciphers with Linear Feedback Nicolas T. Courtois 1 and Willi Meier 2 1 Cryptography Research, Schlumberger Smart Cards, 36-38 rue de la Princesse, BP 45, F-78430 Louveciennes
Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing
Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing Yury Lifshits July 10, 2005 Abstract The goal of the paper is to construct mathematical abstractions of different aspects of real
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Implementing Network Security Protocols
Implementing Network Security Protocols based on Elliptic Curve Cryptography M. Aydos, E. Savaş, and Ç. K. Koç Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331, USA {aydos,savas,koc}@ece.orst.edu
2010 JOURNAL OF SOFTWARE, VOL. 9, NO. 8, AUGUST 2014
2010 JOURNAL OF SOFTWARE VOL. 9 NO. 8 AUGUST 2014 Analysis of a Multivariate Public Key Cryptosystem and Its Application in Software Copy Protection Ning Huang Center of Modern Educational Technology Gannan
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
Public Key Cryptography. Performance Comparison and Benchmarking
Public Key Cryptography Performance Comparison and Benchmarking Tanja Lange Department of Mathematics Technical University of Denmark [email protected] 28.08.2006 Tanja Lange Benchmarking p. 1 What
The Advanced Encryption Standard: Four Years On
The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones Gwenaëlle Martinet 1, Guillaume Poupard 1, and Philippe Sola 2 1 DCSSI Crypto Lab, 51 boulevard de La Tour-Maubourg
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
The 128-bit Blockcipher CLEFIA Design Rationale
The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007 Sony Corporation NOTICE THIS DOCUMENT IS PROVIDED AS IS, WITH NO WARRANTIES WHATSOVER, INCLUDING ANY WARRANTY OF MERCHANTABIL-
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
ECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
The Stream Cipher HC-128
The Stream Cipher HC-128 Hongjun Wu Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium [email protected] Statement 1. HC-128 supports 128-bit
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer
Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?
Cryptography Digital Signatures Professor: Marius Zimand Digital signatures are meant to realize authentication of the sender nonrepudiation (Note that authentication of sender is also achieved by MACs.)
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Implementation of Elliptic Curve Digital Signature Algorithm
Implementation of Elliptic Curve Digital Signature Algorithm Aqeel Khalique Kuldip Singh Sandeep Sood Department of Electronics & Computer Engineering, Indian Institute of Technology Roorkee Roorkee, India
Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis
Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis by Susana Sin A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
Integer Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
Cryptography Lecture 8. Digital signatures, hash functions
Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
arxiv:1010.3163v1 [cs.cr] 15 Oct 2010
The Digital Signature Scheme MQQ-SIG Intellectual Property Statement and Technical Description 10 October 2010 Danilo Gligoroski 1 and Svein Johan Knapskog 2 and Smile Markovski 3 and Rune Steinsmo Ødegård
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Mathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Application of cube attack to block and stream ciphers
Application of cube attack to block and stream ciphers Janusz Szmidt joint work with Piotr Mroczkowski Military University of Technology Military Telecommunication Institute Poland 23 czerwca 2009 1. Papers
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Modern/Public-key cryptography started in 1976 with the publication of the following paper. W. Diffie
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Notes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
A NEW HASH ALGORITHM: Khichidi-1
A NEW HASH ALGORITHM: Khichidi-1 Abstract This is a technical document describing a new hash algorithm called Khichidi-1 and has been written in response to a Hash competition (SHA-3) called by National
Cryptography and Network Security Chapter 9
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,
Basic Algorithms In Computer Algebra
Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,
Cryptography & Network Security
Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 [email protected] Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Elliptic Curve Hash (and Sign)
Elliptic Curve Hash (and Sign) (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep 22-24 2008 Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 1 / 43
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Cryptography and Network Security
Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared
Study of algorithms for factoring integers and computing discrete logarithms
Study of algorithms for factoring integers and computing discrete logarithms First Indo-French Workshop on Cryptography and Related Topics (IFW 2007) June 11 13, 2007 Paris, France Dr. Abhijit Das Department
On the Influence of the Algebraic Degree of the Algebraic Degree of
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 1, JANUARY 2013 691 On the Influence of the Algebraic Degree of the Algebraic Degree of Christina Boura and Anne Canteaut on Abstract We present a
1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.
1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms
Principles of Public Key Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter : Security on Network and Transport
Lecture 3: One-Way Encryption, RSA Example
ICS 180: Introduction to Cryptography April 13, 2004 Lecturer: Stanislaw Jarecki Lecture 3: One-Way Encryption, RSA Example 1 LECTURE SUMMARY We look at a different security property one might require
A low-cost Alternative for OAEP
A low-cost Alternative for OAEP Peter Schartner University of Klagenfurt Computer Science System Security [email protected] Technical Report TR-syssec-11-02 Abstract When encryption messages by use
Digital Signature. Raj Jain. Washington University in St. Louis
Digital Signature Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Introduction to post-quantum cryptography
Introduction to post-quantum cryptography Daniel J. Bernstein Department of Computer Science, University of Illinois at Chicago. 1 Is cryptography dead? Imagine that it s fifteen years from now and someone
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
1 Signatures vs. MACs
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Nov. 22, 2006 Lecture Notes 17: Digital Signatures Recommended Reading. Katz-Lindell 10 1 Signatures vs. MACs Digital signatures
Notes on Factoring. MA 206 Kurt Bryan
The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor
Symmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
Security Analysis of DRBG Using HMAC in NIST SP 800-90
Security Analysis of DRBG Using MAC in NIST SP 800-90 Shoichi irose Graduate School of Engineering, University of Fukui hrs [email protected] Abstract. MAC DRBG is a deterministic random bit generator
Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
NIST Special Publication 800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Elaine Barker and Allen Roginsky Computer Security Division Information
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent
An Approach to Shorten Digital Signature Length
Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
Digital Signatures. Meka N.L.Sneha. Indiana State University. [email protected]. October 2015
Digital Signatures Meka N.L.Sneha Indiana State University [email protected] October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital
Cryptanalysis of Grain using Time / Memory / Data Tradeoffs
Cryptanalysis of Grain using Time / Memory / Data Tradeoffs v1.0 / 2008-02-25 T.E. Bjørstad The Selmer Center, Department of Informatics, University of Bergen, Pb. 7800, N-5020 Bergen, Norway. Email :
Efficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Network Security. Chapter 6 Random Number Generation
Network Security Chapter 6 Random Number Generation 1 Tasks of Key Management (1)! Generation:! It is crucial to security, that keys are generated with a truly random or at least a pseudo-random generation
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B KITCHENS The equation 1 Lines in two-dimensional space (1) 2x y = 3 describes a line in two-dimensional space The coefficients of x and y in the equation
Digital Signature Standard (DSS)
FIPS PUB 186-4 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory National Institute
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC Laxminath Tripathy 1 Nayan Ranjan Paul 2 1Department of Information technology, Eastern Academy of Science and
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
