A practical attack to Bouftass's cryptosystem

نویسنده

  • Yang Zhang
چکیده

In public key cryptography, the security of traditional methods is based on number theoretic problems, and suffers from high computational cost due to problems such as dealing with large numbers. Each user in a public key system has a pair of cryptographic keys, consisting a public key and a private key. These are related through a hard mathematical inversion problem, so that the private key cannot be feasibly derived from the public key. A standard implementation of public key cryptography is based on the Diffie-Hellman key agreement protocol[1]. This protocol allows two users, Alice and Bob, to exchange a secret key over an insecure communication channel. It can be described as following: 1. Alice and Bob openly agree upon a large prime p and g ∈ Zp. 2. Alice randomly chooses the secret integer a ∈ [1, p − 1]. 3. Alice computes A = g mod p, and publishes A.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems

Recently G. Jakimoski and L. Kocarev cryptanalzed two chaotic cryptosystems without using chaotic synchronization – Baptista cryptosystem and Alvarez cryptosystem. As a result, they pointed out that neither of the two cryptosystems are secure to known-plaintext attacks. In this letter, we re-study the performance of Jakimoski-Kocarev attack on Baptista cryptosystem and find that it is not effic...

متن کامل

Masking Large Keys in Hardware: A Masked Implementation of McEliece

Instantiations of the McEliece cryptosystem which are considered computationally secure even in a post-quantum era still require hardening against side channel attacks for practical applications. Recently, the first differential power analysis attack on a McEliece cryptosystem successfully recovered the full secret key of a state-of-the-art FPGA implementation of QC-MDPC McEliece. In this work ...

متن کامل

On the computational complexity of finding a minimal basis for the guess and determine attack

Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...

متن کامل

Timing Attack Prospect for RSA Cryptanalysts Using Genetic Algorithm Technique

This paper presents an approach to cryptanalysis of RSA cryptosystem based on the application of genetic algorithm. The search utilizes the idea of timing attack as computation time information may leak due to different modular operations throughout the RSA encoding. This approach suggests a speed up process, aiming at reducing the required number of plaintext-ciphertext samples needed for a su...

متن کامل

A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack

We study elliptic curve cryptosystems by first investigating the schemes defined over Zp and show that the scheme is provably secure against adaptive chosen cipher-text attack under the decisional DiffieHellman assumption. Then we derive a practical elliptic curve cryptosystem by making use of some nice elliptic curve where the decisional DiffieHellman assumption is reserved.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1605.00987  شماره 

صفحات  -

تاریخ انتشار 2016