On the Validity of the Φ-Hiding Assumption in Cryptographic Protocols

نویسندگان

  • Christian Schridde
  • Bernd Freisleben
چکیده

Most cryptographic protocols, in particular asymmetric protocols, are based on assumptions about the computational complexity of mathematical problems. The Φ-Hiding assumption is such an assumption. It states that if p1 and p2 are small primes exactly one of which divides φ(N), where N is a number whose factorization is unknown and φ is Euler’s totient function, then there is no polynomialtime algorithm to distinguish which of the primes p1 and p2 divides φ(N) with a probability significantly greater than 1/2. In this paper, it will be shown that the Φ-Hiding assumption is not valid when applied to a modulus N = PQ, where P,Q > 2 are primes, e > 0 is an integer and P hides the prime in question. This indicates that cryptographic protocols using such moduli and relying on the Φ-Hiding assumption must be handled with care.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Validity of the phi-Hiding Assumption in Cryptographic Protocols

Most cryptographic protocols, in particular asymmetric protocols, are based on assumptions about the computational complexity of mathematical problems. The Φ-Hiding assumption is such an assumption. It states that if p1 and p2 are small primes exactly one of which divides φ(N), where N is a number whose factorization is unknown and φ is Euler’s totient function, then there is no polynomialtime ...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009