Some Remarks on Williams’ Public-key Crypto Functions
نویسنده
چکیده
In 1984, H.C. Williams introduced a public key cryptosystem whose security is as intractable as factorization. That is, the system is provably as difficult to break as it is to find the factors of the modulus n = pq. By utilizing properties of the Lucas functions, this proposal is the only factorization equivalent scheme that is known which does not impose any restrictions on the primes used in the modulus. However, Williams anticipates several restrictions on the messages without further analyzing if these are always fulfilled. By investigating simple numerical examples we found that any message not meeting these criteria cannot be encrypted and most likely directly exposes a factor of the modulus during the encryption process. We analyze this problem encountered in the original scheme and establish the exact number of such ‘dangerous’ messages. Moreover, we provide a simple modification of the Williams’ system which minimizes these difficulties. The modification does not complicate the system in any way. Evaluation of the proposed system can be obtained in exactly the same number of steps as in the original system. The results obtained will demonstrate that the possible lack of security due to the ‘dangerous’ messages is negligibly small for large moduli.
منابع مشابه
SOME REMARKS ON WEAKLY INVERTIBLE FUNCTIONS IN THE UNIT BALL AND POLYDISK
We will present an approach to deal with a problem of existence of (not) weakly invertible functions in various spaces of analytic functions in the unit ball and polydisk based on estimates for integral operators acting between functional classes of different dimensions.
متن کاملSome Remarks on Lucas-Based Cryptosystems
We review the well-known relation between Lucas sequences and exponentiation. This leads to the observation that certain public-key cryptosystems that are based on the use of Lucas sequences have some elementary properties their re-inventors were apparently not aware of. In particular, we present a chosen-message forgery for ‘LUC’ (cf. [21; 25]), and we show that ‘LUCELG’ and ‘LUCDIF’ (cf. [22,...
متن کاملBreaking the Rabin-Williams digital signature system implementation in the Crypto++ library
This paper describes a bug in the implementation of the RabinWilliams digital signature in the Crypto++ framework. The bug is in the misuse of blinding technique that is aimed at preventing timing attacks on the digital signature system implementation, but eventually results in an opportunity to find the private key having only two different signatures of the same message. The CVE identifier of...
متن کاملC-Class Functions and Remarks on Fixed Points of Weakly Compatible Mappings in G-Metric Spaces Satisfying Common Limit Range Property
In this paper, using the contexts of C-class functions and common limitrange property, common fixed point result for some operator are obtained.Our results generalize several results in the existing literature. Some examplesare given to illustrate the usability of our approach.
متن کاملMany-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems
Citation Bellare, Mihi, Shai Halevi, Amit Sahai, and Salil Vadhan. 1998. Many-to-one trapdoor functions and their relation to public-key cryptosystems. In Advances in Cryptology--Proceedings of CRYPTO '98, 18th Annual International Conference, Santa Barbara, California,August 23-27, 1998, ed. Hugo Krawczyk, Berlin: Springer.H. Krawczyk, editor, 283-299. Advances in Cryptology CRYPTO `98, Lectur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004