Advanced Cryptography



Similar documents
CIS 5371 Cryptography. 8. Encryption --

Elements of Applied Cryptography Public key encryption

Lecture 3: One-Way Encryption, RSA Example

RSA Attacks. By Abdulaziz Alrasheed and Fatima

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Introduction. Digital Signature

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Cryptography and Network Security Chapter 9

The application of prime numbers to RSA encryption

The Mathematics of the RSA Public-Key Cryptosystem

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

A Factoring and Discrete Logarithm based Cryptosystem

Public Key Cryptography: RSA and Lots of Number Theory

Software Tool for Implementing RSA Algorithm

Cryptography: Authentication, Blind Signatures, and Digital Cash

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, Notes on Algebra

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

How To Know If A Message Is From A Person Or A Machine

Security in Distributed Systems. Network Security

An Introduction to the RSA Encryption Method

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Basic Algorithms In Computer Algebra

An Overview of Integer Factoring Algorithms. The Problem

Public Key Cryptography and RSA. Review: Number Theory Basics

RSA Encryption. Tom Davis October 10, 2003

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

CRC Press has granted the following specific permissions for the electronic version of this book:

Factoring Algorithms

Cryptography and Network Security

VoteID 2011 Internet Voting System with Cast as Intended Verification

Introduction to Hill cipher

Overview of Public-Key Cryptography

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Digital Signatures. Prof. Zeph Grunschlag

Massachusetts Institute of Technology Handout : Network and Computer Security October 9, 2003 Professor Ronald L. Rivest.

= = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

Network Security Technology Network Management

CS 758: Cryptography / Network Security

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Computing exponents modulo a number: Repeated squaring

RSA Question 2. Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true?

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Security Analysis for Order Preserving Encryption Schemes

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Communications security

Notes on Network Security Prof. Hemant K. Soni

EXAM questions for the course TTM Information Security May Part 1

Lecture 13 - Basic Number Theory.

Some practice problems for midterm 2

Lecture 15 - Digital Signatures

Solutions to Problem Set 1

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Index Calculation Attacks on RSA Signature and Encryption

Applied Cryptography Public Key Algorithms

Proofs in Cryptography

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Symmetric Key cryptosystem

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Paillier Threshold Encryption Toolbox

Signature Schemes. CSG 252 Fall Riccardo Pucella

Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann Chap 12 Digital Signatures

Cryptography Exercises

Elementary factoring algorithms

Introduction to Cryptography CS 355

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Department Informatik. Privacy-Preserving Forensics. Technical Reports / ISSN Frederik Armknecht, Andreas Dewald

Chapter 12. Digital signatures Digital signature schemes

Cryptography and Network Security

Lecture 9 - Message Authentication Codes

Public-key cryptography RSA

SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Identity-Based Encryption from the Weil Pairing

Schnorr Signcryption. Combining public key encryption with Schnorr digital signature. Laura Savu, University of Bucharest, Romania

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Lukasz Pater CMMS Administrator and Developer

Number Theory and Cryptography using PARI/GP

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY

Lecture 6 - Cryptography

DIGITAL SIGNATURES 1/1

How To Understand And Understand The History Of Cryptography

1 Message Authentication

Shor s algorithm and secret sharing

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Network Security. Omer Rana

Factoring Algorithms

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

Transcription:

Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed. Answers must be written on the exercises sheet. This exam contains 1 exercise. Answers can be either in French or English. Questions of any kind will certainly not be answered. Potential errors in these sheets are part of the exam. You have to put your full name on each page and you have to do it now.

An RSA Variant with Public Exponent 3 In this problem, we consider a special variant of RSA with public exponent e that is not coprime with ϕ(n). For simplicity, we focus on e = 3. More precisely, key generation works as follows: pick r 1 of s 2 bits at random until p = 9r 1 2 is prime pick r 2 of s 2 bits at random until q = 3r 2 1 is prime take N = pq, e = 3 public key is (N, e), secret key is (p, q) Cubic Residuosity 1. Let x Z q. How many cubic roots can we have? How to compute cubic roots in Z q? 2. Let x Z p. Show that (x 3 ) p+2 9 is a cubic root of x 3. 2

3. Given x Z p, how many cubic roots can we have in Z p? 4. By using the Jacobi symbol and its computation rules, prove that 3 is a quadratic residue in Z p. 3

5. Let j = θ 1 2 mod p where θ is a square root of 3. Show that j 3 mod p = 1. 6. Deduce all cubic roots of 1 in Z p. 4

7. Deduce a way to compute all cubic roots of cubic residues in Z p. 8. By using the Chinese Remainder Theorem, tell how many cubic roots cubic residues have in Z N and how to compute them. 5

We now denote Root(y, p, q) the function mapping any y Z N to the set of all its cubic roots using the secret key. This function will be used throughout this problem. Complexity of Cubic Roots 1. If x, y Z N are such that x y (mod N) and x3 y 3 (mod N), show that gcd(x y, N) = q. 2. Deduce that an oracle who can extract one cubic root from a cubic residue in Z N used to factor N. can be 6

Raw Encryption and Decryption We consider the message space Z N. Encryption is made as in RSA, by raising to the power e modulo N. 1. Show that decryption is ambiguous. 2. Devise a chosen ciphertext attack. 7

Encryption and Decryption on a Reduced Space Let n be such that 2 n N. Let F be a random injection from {0, 1} n to Z N which is easy to invert. We now consider the message space {0, 1} n. We define the encryption of x by F(x) e mod N. 1. How can we decrypt now? 2. What is the probability (over the choice of F) that there exists x such that decrypting the encryption of x does not produce x? 8

3. Show that key recovery is equivalent to factoring numbers like N. 4. What can we now say about the decryption problem? 5. Give at least one Boolean function on the plaintext that is not a hard core bit. 9

Probabilistic Variant Let n and k be integers such that k < n. We now consider that the message space is a binary code of length n and dimension k. We consider a symmetric encryption scheme over the plaintext/ciphertext space {0, 1} n and keyspace K defined by SymEnc and SymDec algorithms. Let H be a random function from Z N to K. To encrypt a codeword x, we first pick a random r Z N and we compute y = SymEnc H(r)(x) and z = r e mod N. The ciphertext is (y, z). 1. How to decrypt? 2. Assuming that the symmetric encryption is ideal and that K is large enough, what is the probability that decryption is ambiguous? 3. Recall what is an adversary against the semantic security. 10

4. Assume that we have an adversary A playing the semantic security game against our new cryptosystem. We assume that the symmetric encryption scheme is an ideal cipher, that is, H(r) fully specifies a random permutation over {0, 1} n. We further assume that function H is only available through an oracle O, that is, nobody can reliably compute H(r) without querying the oracle O with r to get H(r) in return. This way, A may query the oracle O while playing the semantic security game. (a) Show that if A does not query O with the r chosen by the challenger, the advantage of A in the semantic game is zero. (b) By simulating O and several parts of the semantic game, deduce that if the advantage of A is ε, we can transform A in an algorithm which given z = r 3 mod N for a random r can deduce r or other cubic roots of z with probability ε. 11

(c) Deduce that if the advantage of A is ε, we can factor N with probability ε. (d) Deduce that if factoring N is hard, if the symmetric encryption is ideal, and if H is a random oracle, this cryptosystem is semantically secure. 12