Lecture Notes in Computer Science



Similar documents
A Secure and Efficient Conference Key Distribution System

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

A Factoring and Discrete Logarithm based Cryptosystem

Table of Contents. Bibliografische Informationen digitalisiert durch

CRYPTOGRAPHY IN NETWORK SECURITY

Improved Online/Offline Signature Schemes

Lecture 2: Complexity Theory Review and Interactive Proofs

Index Calculation Attacks on RSA Signature and Encryption

A SOFTWARE COMPARISON OF RSA AND ECC

CRYPTOG NETWORK SECURITY

CS 758: Cryptography / Network Security

SUBLIMINALFREE AUTHENTICATION AND SIGNATURE

Security for Computer Networks

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

Number Theoretic SETUPs for RSA Like Factoring Based Algorithms

The Mathematics of the RSA Public-Key Cryptosystem

Cryptography and Network Security

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Cryptography and Network Security Chapter 9

Overview of Public-Key Cryptography

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

RSA signatures and Rabin Williams signatures: the state of the art

Public Key (asymmetric) Cryptography

ETH Zurich. participants such that only certain groups of them can recover it.

Lukasz Pater CMMS Administrator and Developer

Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing

CRYPTOGRAPHY AND NETWORK SECURITY

TELECOMMUNICATION NETWORKS

Multi-Layered Cryptographic Processor for Network Security

Lecture 9: Application of Cryptography

Implementation of Elliptic Curve Digital Signature Algorithm

Symmetric Key cryptosystem

HASH CODE BASED SECURITY IN CLOUD COMPUTING

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Applied Cryptography Public Key Algorithms

LUC: A New Public Key System

The science of encryption: prime numbers and mod n arithmetic

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Computer Security: Principles and Practice

3-6 Toward Realizing Privacy-Preserving IP-Traceback

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Cryptography and Network Security Chapter 10

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

7! Cryptographic Techniques! A Brief Introduction

A blind digital signature scheme using elliptic curve digital signature algorithm

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Notes on Network Security Prof. Hemant K. Soni

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

A Fully Homomorphic Encryption Implementation on Cloud Computing

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

EXAM questions for the course TTM Information Security June Part 1

Lecture 25: Pairing-Based Cryptography

I N F O R M A T I O N S E C U R I T Y

Split Based Encryption in Secure File Transfer

VALLIAMMAI ENGINEERING COLLEGE

Properties of Secure Network Communication

Software Tool for Implementing RSA Algorithm

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

CPSC 467b: Cryptography and Computer Security

Elements of Applied Cryptography Public key encryption

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Implementing Network Security Protocols

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Pricing via Processing or Combatting Junk Mail

SECURITY IN NETWORKS

Cryptography: Authentication, Blind Signatures, and Digital Cash

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

SE 4472a / ECE 9064a: Information Security

Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection

Cryptography & Digital Signatures

Lecture Notes on Cryptography


What is network security?

The Future of Digital Signatures. Johannes Buchmann

I N F O R M A T I O N S E C U R I T Y

Data Grid Privacy and Secure Storage Service in Cloud Computing

Application of cube attack to block and stream ciphers

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction

Network Security Technology Network Management

Cryptography and Network Security

Study of algorithms for factoring integers and computing discrete logarithms

Transcription:

Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 218 Advances in Cryptology CRYPTO '85 Proceedings Ischnbcha Hochsthule FACH8ESEICH INFORMAL LLLLL2 T H E K 6 Scichgebiete:- v..: Edited by Hugh C. Williams Fachbereichsbibliothek Informatik _ TU_Darrnstadt 59361457 Springer-Verlag Berlin Heidelberg New York Tokyo

CONTENTS SECTION I: SIGNATURES AND AUTHENTICATION Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields 3 Dennis Estes, Leonard M. Adleman, Kireeti Kompella, Kevin S. McCurley, and Gary L. Miller Another Birthday Attack 14 Don Coppersmith Attacks on Some RSA Signatures 18 Wiebren de Jonge and David Chaum An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi 28 Ernest F. Brickell and John M. DeLawentis A Secure Subliminal Channel (?) : 33 Gustavus J. Simmons Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences 42 Yvo Desmedt SECTION II: PROTOCOLS On the Security of Ping-Pong Protocols When Implemented Using the RSA..'. 58 Shimon Even, Oded Goldreich, and Adi Shamir A Secure Poker Protocol that Minimizes the Effect of Player Coalitions 73 Claude Crepeau A Framework for the Study of Cryptographic Protocols 87 Richard Berger, SampathKannan, and Rene Peralta Cheating at Mental Poker 104 Don Coppersmith Security for the DoD Transmission Control Protocol 108 WhitfieldDiffie Symmetric Public-Key Encryption 128 Zvi Galil, Stuart Haber, and Mori Yung

VIII SECTION III: COPY PROTECTION Software Protection: Myth or Reality?, 140 James R. Gosler Public Protection of Software 158 A. Herzberg and S. Pinter Fingerprinting Long Forgiving Messages /. 180 G.R. Blakley, Catherine Meadows, and GB. Purdy SECTION IV: SINGLE KEY CRYPTOLOGY Cryptanalysis of DES with a Reduced Number of Rounds 192 David Chaum and Jan-Hendrik Evertse Is DES a Pure Cipher? (Results of More Cycling Experiments ondes) 212 Burt S. Kalisld,RonaldL.Rivest, andalant. Sherman A Layered Approach to the Design of Private Key Cryptosystems 227 T.E. Moore and S.E. Tavares Lifetimes of Keys in Cryptographic Key Management Systems 246 E. Okamoto and K. Nakamura Correlation Immunity and the Summation Generator 260 RainerA. Rueppel Design of Combiners to Prevent Divide and Conquer Attacks 273 T. Siegenthaler On the Security of DES 280 Adi Shamir Information Theory Without the Finiteness Assumption, II Unfolding the DES 282 GJi. Blakley SECTION V: TWO KEY CRYPTOLOGY Analysis of a Public Key Approach Based on Polynomial 340 Substitution Harriet Fell and WhitfieldDiffie Developing an RSA Chip : 350 Martin Kochanski

IX An M3 Public-Key Encryption Scheme 358 H.C. Williams Trapdoor Rings and Their Use in Cryptography 369 V. Varadharajan On Computing Logarithms Over Finite Fields 396 Taher El Gamal On Using RSA with Low Exponent in a Public Key Network 403 JohanHastad <, Lenstra's Factorisation Method Based on Elliptic Curves 409 NM. Stephens Use of Elliptic Curves in Cryptography 417 Victor S. Miller SECTION VI: RANDOMNESS AND OTHER PROBLEMS Cryptography with Cellular Automata 429 Stephen Wolfram Efficient Parallel Pseudo-Random Number Generation 433 J.H. Reifand JI>. Tygar How to Construct Pseudo-random Permutations from Pseudo-random Functions 447 Michael Luby and Charles Rackoff The Bit Security of Modular Squaring Given Partial Factorization of the Modulos 448 Benny Chor, Oded Goldreich, and Shafi Goldwasser Some Cryptographic Aspects of Womcodes 458 Philippe Godlewski and Gerard D. Cohen How to Reduce Your Enemy's Information 468 Charles H. Bennett, Gilles Brassard, and Jean-Marc Robert Encrypting Problem Instances: Or... Can you Take Advantage of Someone Without Having to Trust Him? 477 Joan Feigenbaum Divergence Bounds on Key Equivocation and Error Probability in Cryptanalysis 489 /. van Tilburg andd.e. Boekee

X SECTION VII: IMPROMPTU TALKS A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes 516 Y. Desmedt and A.M. Odlyzko On the Design "of S-boxes 523 A.F. Webster and S.E. Tavares The Real Reason for Rivest's Phenomenon 535 Don Coppersmith < The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with < 48 Bit Keys?) 537 /.-/. Quisquater, Y. Desmedt, and M. Davio Access Control at the Netherlands Postal and Telecommunications Services 543 W. Haemers Author Index 545 Keyword Index 546